Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    109s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 02:06

General

  • Target

    BlueStacks10Installer_10.41.501.1001_native_7f08208f3f1d0145b5d9f9ad3fb65883_MzsxNSwwOzUsMTsxNSw0OzE.exe

  • Size

    912KB

  • MD5

    1e04e52e6350fccae205836ceb331f38

  • SHA1

    15cb90096c3e0fbacb2ff1cab022bb385ea59eef

  • SHA256

    d5f4a1ee1638cc486dfdbf69f83e3459b37f26f5bdb046bd6b090147dec0d873

  • SHA512

    a49b47684be14d467dbbe65f2f7ff7ba93ee0af6d302050c186cad786dfdabbd39e97c11565e065b2463fa58cd430b695244cc2d05ff2e4e891a888423875cd2

  • SSDEEP

    12288:WivtCXQd0gjKX7zuqGKY5Ha3z1cNoaMt7bi7xgjL4kKaCHZMptFiquFhIK75cZm:WivtCXWeGKY8f7bi7qLERHSPuFqecZm

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 13 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.501.1001_native_7f08208f3f1d0145b5d9f9ad3fb65883_MzsxNSwwOzUsMTsxNSw0OzE.exe
    "C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.501.1001_native_7f08208f3f1d0145b5d9f9ad3fb65883_MzsxNSwwOzUsMTsxNSw0OzE.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\BlueStacksInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\BlueStacksInstaller.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\HD-CheckCpu.exe" --cmd checkHypervEnabled
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3468
      • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\HD-CheckCpu.exe" --cmd checkSSE4
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1356
      • C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.501.1013_nxt.exe
        "C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.501.1013_nxt.exe" -s
        3⤵
        • Checks computer location settings
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\BlueStacks X\green.vbs"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c green.bat
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:7720
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall delete rule name="BlueStacksWeb"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:7764
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall delete rule name="Cloud Game"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:7860
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="BlueStacksWeb" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\BlueStacksWeb.exe"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:7904
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="Cloud Game" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\Cloud Game.exe"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:7996
      • C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.501.1001_native_7f08208f3f1d0145b5d9f9ad3fb65883_MzsxNSwwOzUsMTsxNSw0OzE.exe
        "C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.501.1001_native_7f08208f3f1d0145b5d9f9ad3fb65883_MzsxNSwwOzUsMTsxNSw0OzE.exe" -versionMachineID=f761a91b-a553-4658-87e7-2a6c4a1c29be -machineID=c7abbf63-520c-4eae-b508-e1fb5b041aee -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Pie64 -imageToLaunch=Pie64 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.41.501.1001 -country=GB -skipBinaryShortcuts -isWalletFeatureEnabled
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:9096
        • C:\Users\Admin\AppData\Local\Temp\7zS88324599\BlueStacksInstaller.exe
          "C:\Users\Admin\AppData\Local\Temp\7zS88324599\BlueStacksInstaller.exe" -versionMachineID=f761a91b-a553-4658-87e7-2a6c4a1c29be -machineID=c7abbf63-520c-4eae-b508-e1fb5b041aee -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Pie64 -imageToLaunch=Pie64 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.41.501.1001 -country=GB -skipBinaryShortcuts -isWalletFeatureEnabled
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:8600
          • C:\Users\Admin\AppData\Local\Temp\7zS88324599\HD-CheckCpu.exe
            "C:\Users\Admin\AppData\Local\Temp\7zS88324599\HD-CheckCpu.exe" --cmd checkHypervEnabled
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:8712
  • C:\Program Files (x86)\BlueStacks X\BlueStacks X.exe
    "C:\Program Files (x86)\BlueStacks X\BlueStacks X.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Program Files (x86)\BlueStacks X\BlueStacksWeb.exe
      BlueStacksWeb.exe --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,NetworkServiceInProcess,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,InstalledApp,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --mojo-platform-channel-handle=3732 /prefetch:1
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:6828
    • C:\Program Files (x86)\BlueStacks X\BlueStacksWeb.exe
      BlueStacksWeb.exe --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,NetworkServiceInProcess,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,InstalledApp,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3748 /prefetch:1
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\BlueStacks X\BlueStacks X.exe

    Filesize

    477KB

    MD5

    9dd611ebe7727e0b463fb45ff3b41f92

    SHA1

    173d26f7a210c9cf3529cd627f28123e934dd220

    SHA256

    47992095de76b0093ebffda68ad85046499af283671f7604838238b575585c3a

    SHA512

    d26c12fcd73c2e6c347143ffd1f9b53b52b80c70c54451c39e3abe85dd5cc4edf098f43ebf5d2cb380e29e627c9fbfdba5ee82bc4068e1dd44e14fd12f33e9d4

  • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_disabled.svg

    Filesize

    569B

    MD5

    e7fdf6a9c8cae1fc1108dc5a803a1905

    SHA1

    2853f9ff5e63685ebb1449dcf693176b17e4ab60

    SHA256

    8ee5aa84139b2ea5549f7272523aeb203d73954c5ccdcf6f7407bf1a3469f13e

    SHA512

    a6388b24926934e20ccf7fcab41bd219dc6c0053428481d7f466bf89f26bf1a36fdff716a9ddd9ab268df73b04dff1449c6bac1f5c707e31ae2ee71c2087e0d9

  • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_hover.svg

    Filesize

    653B

    MD5

    76166804e6ce35e8a0c92917b8abc071

    SHA1

    8bd38726a11a9633ac937b9c6f205ce5d36348b0

    SHA256

    1bca2e912184b8168ee8961de68d1d839f4f9827fde6f48ab100fb61e82eff90

    SHA512

    93c4f1af7e9f89091a207ab308e05ddd4c92406c039f7465d3b8aca7e0cc7a6c922a22e1eee2f5c88db5e89016ef69294b2a0905d7d6a90fd32835bc11929005

  • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_normal.svg

    Filesize

    569B

    MD5

    3221ac69d7facd8aa90ffa15aea991b0

    SHA1

    e0571f30f4708ec78addc726a743679ca0f05e45

    SHA256

    92aeae68e9e0973d9e0dc575941f1cb2e24afd0574341a46b870be7384eaa537

    SHA512

    5e2de0abfe60a4db16ea5e8739260c19962fbfc60869a77bde6ab3547ad8ee3ad88e74e97da31fa23be096afddad018e431d152d6d0fa21a75357a11dacb1328

  • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_pressed.svg

    Filesize

    653B

    MD5

    dfddf8d0788988c3e48fcbfb2a76cd20

    SHA1

    463bb61f0012289e860c32f1885a3a8f57467f2e

    SHA256

    9585f41eb6202e89f2087266fa31852d7f41ca8cc659b907c96753fe165f937d

    SHA512

    e708c5114c60f7574589d6a56c9faedda26ee4a40f0eeb25f5e12eadcf790f24fdbf393fa0aa6ad449b5337d625b092d6f8822472fa8a6ce1339aca59c50c3ca

  • C:\Users\Admin\AppData\Local\BlueStacks X\Log\log.txt

    Filesize

    447B

    MD5

    e487b94ba8805ce2f9e2d1edb1a9945d

    SHA1

    1116709392a53bb8d51f91062f22957e58d1fecc

    SHA256

    996a95caca60914451b0f2b6d732a6cd25aec6924facb600e60c47b452bd4aee

    SHA512

    6202a7f1203ce258f147528667d511884c5622c0764da71d4db5465095faff94b52db512ae4b96ca1b256726161ebb89bd7262d1ea6801b49459e8031ca7f95f

  • C:\Users\Admin\AppData\Local\BlueStacks X\Log\log.txt

    Filesize

    1KB

    MD5

    5779172a4003f4aef09cf482780147f3

    SHA1

    de57152e9ffd2eb4e503477bf22bc9e6a86ed002

    SHA256

    dc750971071257a2462e6791923309abf9f4a34e54f2ebfcb4aad367db0ad476

    SHA512

    55d756a38c5f02d5a74c2f27c63802b888398f1ac6fc706bcb7819269ad8ba8906973c0ea40b0a23e79c4e5713d72c3d00807b50b11382d28399163bffa3d16f

  • C:\Users\Admin\AppData\Local\BlueStacks X\Log\log.txt

    Filesize

    4KB

    MD5

    399e90e3b32de2c4b85b2bf79d3c3595

    SHA1

    30ab9b809c3c28b0abffa9db377b236bcb29d119

    SHA256

    6c652209224c8bbdae79607998793da90394592abdfe1f01224f90cc23b21b1e

    SHA512

    4057d068a90a9adfc0c6dbbffb4c8bc50e070ddf3afffecf0c61156f63eafeb25f460738f11adbb67653f523342dc35e53e408e34dca03b971ed28c72648f3b0

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\backicon.png

    Filesize

    15KB

    MD5

    7ff5dc8270b5fa7ef6c4a1420bd67a7f

    SHA1

    b224300372feaa97d882ca2552b227c0f2ef4e3e

    SHA256

    fa64884054171515e97b78aaa1aad1ec5baa9d1daf9c682e0b3fb4a41a9cb1c1

    SHA512

    f0d5a842a01b99f189f3d46ab59d2c388a974951b042b25bbce54a15f5a3f386984d19cfca22ba1440eebd79260066a37dfeff6cb0d1332fca136add14488eef

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\change_hover.png

    Filesize

    310B

    MD5

    57092634754fc26e5515e3ed5ca7d461

    SHA1

    3ae4d01db9d6bba535f5292298502193dfc02710

    SHA256

    8e5847487da148ebb3ea029cc92165afd215cdc08f7122271e13eb37f94e6dc1

    SHA512

    553baf9967847292c8e9249dc3b1d55069f51c79f4d1d3832a0036e79691f433a3ce8296a68c774b5797caf7000037637ce61b8365885d2a4eed3ff0730e5e2a

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\close_red.png

    Filesize

    15KB

    MD5

    93216b2f9d66d423b3e1311c0573332d

    SHA1

    5efaebec5f20f91f164f80d1e36f98c9ddaff805

    SHA256

    d0b6d143642d356b40c47459a996131a344cade6bb86158f1b74693426b09bfb

    SHA512

    922a7292de627c5e637818556d25d9842a88e89f2b198885835925679500dfd44a1e25ce79e521e63c4f84a6b0bd6bf98e46143ad8cee80ecdbaf3d3bc0f3a32

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\custom.png

    Filesize

    17KB

    MD5

    03b17f0b1c067826b0fcc6746cced2cb

    SHA1

    e07e4434e10df4d6c81b55fceb6eca2281362477

    SHA256

    fbece8bb5f4dfa55dcfbf41151b10608af807b9477e99acf0940954a11e68f7b

    SHA512

    67c78ec01e20e9c8d9cdbba665bb2fd2bb150356f30b88d3d400bbdb0ae92010f5d7bcb683dcf6f895722a9151d8e669d8bef913eb6e728ba56bb02f264573b2

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\installer_bg.jpg

    Filesize

    78KB

    MD5

    3478e24ba1dd52c80a0ff0d43828b6b5

    SHA1

    b5b13bbf3fb645efb81d3562296599e76a2abac0

    SHA256

    4c7471c986e16de0cd451be27d4b3171e595fe2916b4b3bf7ca52df6ec368904

    SHA512

    5c8c9cc76d6dbc7ce482d0d1b6c2f3d48a7a510cd9ed01c191328763e1bccb56daeb3d18c33a9b10ac7c9780127007aa13799fa82d838de27fbe0a02ad98119d

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\installer_logo.png

    Filesize

    14KB

    MD5

    e33432b5d6dafb8b58f161cf38b8f177

    SHA1

    d7f520887ce1bfa0a1abd49c5a7b215c24cbbf6a

    SHA256

    9f3104493216c1fa114ff935d23e3e41c7c3511792a30b10a40b507936c0d183

    SHA512

    520dc99f3176117ebc28da5ef5439b132486ef67d02fa17f28b7eab0c59db0fa99566e44c0ca7bb75c9e7bd5244e4a23d87611a55c841c6f9c9776e457fb1cbf

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\installer_minimize.png

    Filesize

    113B

    MD5

    38b539a1e4229738e5c196eedb4eb225

    SHA1

    f027b08dce77c47aaed75a28a2fce218ff8c936c

    SHA256

    a064f417e3c2b8f3121a14bbded268b2cdf635706880b7006f931de31476bbc2

    SHA512

    2ce433689a94fae454ef65e0e9ec33657b89718bbb5a038bf32950f6d68722803922f3a427278bad432395a1716523e589463fcce4279dc2a895fd77434821cc

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\loader.png

    Filesize

    279B

    MD5

    03903fd42ed2ee3cb014f0f3b410bcb4

    SHA1

    762a95240607fe8a304867a46bc2d677f494f5c2

    SHA256

    076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1

    SHA512

    8b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Assets\setpath.png

    Filesize

    15KB

    MD5

    b2e7f40179744c74fded932e829cb12a

    SHA1

    a0059ab8158a497d2cf583a292b13f87326ec3f0

    SHA256

    5bbb2f41f9f3a805986c3c88a639bcc22d90067d4b8de9f1e21e3cf9e5c1766b

    SHA512

    b95b7ebdb4a74639276eaa5c055fd8d9431e2f58a5f7c57303f7cf22e8b599f6f2a7852074cf71b19b49eb31cc9bf2509aedf41d608981d116e49a00030c797c

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\BlueStacksInstaller.exe

    Filesize

    627KB

    MD5

    90f0e1ff5d78ab353e727d5b2b5d7bf7

    SHA1

    93115af687d0e81b280194e4bb905973f8faa0fc

    SHA256

    9db932a1accfa976adda89c81a446036fbd25a8bbde61a8d5b15119d5f3dbd2c

    SHA512

    72fbc9095966b133e078c8fe3b7bb4f26b3ecfa78863ba5db2d804fca0d8bfb059e722343b633b77a96a3873a062dae6a6faa1789528aafe6369c2b2acf1fe37

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\BlueStacksInstaller.exe.config

    Filesize

    324B

    MD5

    1b456d88546e29f4f007cd0bf1025703

    SHA1

    e5c444fcfe5baf2ef71c1813afc3f2c1100cab86

    SHA256

    d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb

    SHA512

    c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\HD-CheckCpu.exe

    Filesize

    200KB

    MD5

    81234fd9895897b8d1f5e6772a1b38d0

    SHA1

    80b2fec4a85ed90c4db2f09b63bd8f37038db0d3

    SHA256

    2e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c

    SHA512

    4c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\JSON.dll

    Filesize

    411KB

    MD5

    f5fd966e29f5c359f78cb61a571d1be4

    SHA1

    a55e7ed593b4bc7a77586da0f1223cfd9d51a233

    SHA256

    d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156

    SHA512

    d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\Locales\i18n.en-US.txt

    Filesize

    20KB

    MD5

    a1e3293265a273080e68501ffdb9c2fc

    SHA1

    add264c4a560ce5803ca7b19263f8cd3ed6f68f0

    SHA256

    1cb847f640d0b2b363ce3c44872c4227656e8d2f1b4a5217603a62d802f0581f

    SHA512

    cb61083dc4d7d86f855a4cc3fe7c4938232a55188ad08b028a12445675fbff6188bb40638bd1ce4e6077f5bfc94449c145118c8f9b8929d4e9c47ed74cf7bece

  • C:\Users\Admin\AppData\Local\Temp\7zS4399EC87\ThemeFile

    Filesize

    80KB

    MD5

    c3e6bab4f92ee40b9453821136878993

    SHA1

    94493a6b3dfb3135e5775b7d3be227659856fbc4

    SHA256

    de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6

    SHA512

    a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895

  • C:\Users\Admin\AppData\Local\Temp\7zS88324599\Assets\exit_close.png

    Filesize

    670B

    MD5

    26eb04b9e0105a7b121ea9c6601bbf2a

    SHA1

    efc08370d90c8173df8d8c4b122d2bb64c07ccd8

    SHA256

    7aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157

    SHA512

    9df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68

  • C:\Users\Admin\AppData\Local\Temp\7zS88324599\Assets\minimize_progress.png

    Filesize

    212B

    MD5

    1504b80f2a6f2d3fefc305da54a2a6c2

    SHA1

    432a9d89ebc2f693836d3c2f0743ea5d2077848d

    SHA256

    2f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6

    SHA512

    675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94

  • C:\Users\Admin\AppData\Local\Temp\nsx247C.tmp\BgWorker.dll

    Filesize

    12KB

    MD5

    36c81676ada53ceb99e06693108d8cce

    SHA1

    d31fa4aebd584238b3edc4768dd5414494610889

    SHA256

    a9e4f7ec65670d2ce375ffaf09b6d07f4cd531132ca002452287a4d540154a38

    SHA512

    1300de7b3e1ac9e706e0aad0b70e3e2a21db8c860e05b314a52e63dd66b5dffdf6be1e38ab6ede13bfd3a64631cc909486bf4b1403e7d821e3b566edc514c63c

  • C:\Users\Admin\AppData\Local\Temp\nsx247C.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • C:\Users\Admin\AppData\Local\Temp\nsx247C.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f7b92b78f1a00a872c8a38f40afa7d65

    SHA1

    872522498f69ad49270190c74cf3af28862057f2

    SHA256

    2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

    SHA512

    3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

  • C:\Users\Admin\AppData\Local\Temp\nsx247C.tmp\nsDui.dll

    Filesize

    3.0MB

    MD5

    10384be026fff6f65fec9325827542b5

    SHA1

    cdabf289b87da6e7a7f5448e1258c31a132405b3

    SHA256

    6a26e1251040793c0d214260e024e890a04af9c86fa595636fa068fb449e6f15

    SHA512

    1753ddaf1bd2d9b8fbd6cef21dfa5c911aaeda9c2c01089660f7e602903a267ef20d08a8bfe21abb3f0cfe05265f170974837a8a4c7d7538f613d7ecfef93eaa

  • C:\Users\Admin\AppData\Local\Temp\nsx247C.tmp\nsis7z.dll

    Filesize

    434KB

    MD5

    95f6f6ab9509bc366ab9215defe4251a

    SHA1

    e3f4a6effd6ca5838cfe91a01967cb72edcc7b0b

    SHA256

    a896a9ece055d334d431cd0f856113ab925d9ee86d2dee383c0bfbbef11a5b50

    SHA512

    a853f70d2ea7f384df99be067724bf3ca73c63f3c3573c112f5528fc86a96bd34509d934b038e2a81833f3abb3eedbc5894921291139100e01df6e35696c0ecc

  • memory/1856-12429-0x00007FF90EEF0000-0x00007FF90F9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1856-12611-0x00007FF90EEF0000-0x00007FF90F9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1856-128-0x000000001CBD0000-0x000000001CC38000-memory.dmp

    Filesize

    416KB

  • memory/1856-134-0x00007FF90EEF0000-0x00007FF90F9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1856-8756-0x00007FF90EEF3000-0x00007FF90EEF5000-memory.dmp

    Filesize

    8KB

  • memory/1856-126-0x0000000000530000-0x00000000005D0000-memory.dmp

    Filesize

    640KB

  • memory/1856-129-0x00007FF90EEF0000-0x00007FF90F9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1856-135-0x00007FF90EEF0000-0x00007FF90F9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1856-150-0x0000000021960000-0x0000000021968000-memory.dmp

    Filesize

    32KB

  • memory/1856-140-0x000000001D4C0000-0x000000001D4F8000-memory.dmp

    Filesize

    224KB

  • memory/1856-12430-0x00007FF90EEF0000-0x00007FF90F9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1856-138-0x000000001E110000-0x000000001E638000-memory.dmp

    Filesize

    5.2MB

  • memory/1856-125-0x00007FF90EEF3000-0x00007FF90EEF5000-memory.dmp

    Filesize

    8KB

  • memory/1856-141-0x000000001D490000-0x000000001D49E000-memory.dmp

    Filesize

    56KB

  • memory/2356-12654-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB