Analysis
-
max time kernel
200s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 22:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bluestacks.com/download.html
Resource
win10v2004-20240802-en
General
-
Target
https://www.bluestacks.com/download.html
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 8 IoCs
pid Process 7256 netsh.exe 7292 netsh.exe 7372 netsh.exe 8516 netsh.exe 8600 netsh.exe 8644 netsh.exe 8900 netsh.exe 5216 netsh.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BSX-Setup-5.21.580.1017_nxt.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BlueStacksInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Bootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BlueStacksServices.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BlueStacksServices.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe -
Executes dropped EXE 32 IoCs
pid Process 4972 BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe 5264 BlueStacksInstaller.exe 5408 HD-CheckCpu.exe 5536 HD-CheckCpu.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 840 BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe 5408 Bootstrapper.exe 5568 BlueStacksInstaller.exe 6412 7zr.exe 6552 7zr.exe 5348 BlueStacksServicesSetup.exe 9576 HD-ForceGPU.exe 9628 HD-GLCheck.exe 9732 HD-GLCheck.exe 4536 HD-GLCheck.exe 9864 HD-GLCheck.exe 3620 HD-GLCheck.exe 9892 HD-GLCheck.exe 6124 BlueStacksServices.exe 2060 HD-CheckCpu.exe 9972 7zr.exe 2528 BlueStacksServices.exe 5148 BlueStacksServices.exe 7332 BlueStacksServices.exe 9900 7zr.exe 7868 7zr.exe 5564 7zr.exe 8460 HD-GLCheck.exe 8392 HD-GLCheck.exe 8436 HD-GLCheck.exe 8828 HD-CheckCpu.exe 5680 7zr.exe -
Loads dropped DLL 64 IoCs
pid Process 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\electron.app.BlueStacks Services = "C:\\Users\\Admin\\AppData\\Local\\Programs\\bluestacks-services\\BlueStacksServices.exe --hidden" BlueStacksServices.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\storage.json BlueStacksServices.exe File opened for modification C:\Windows\system32\storage.json BlueStacksServices.exe -
Enumerates processes with tasklist 1 TTPs 15 IoCs
pid Process 7080 tasklist.exe 7100 tasklist.exe 9016 tasklist.exe 7088 tasklist.exe 6432 tasklist.exe 6812 tasklist.exe 7588 tasklist.exe 396 tasklist.exe 5860 tasklist.exe 9404 tasklist.exe 9568 tasklist.exe 1164 tasklist.exe 6384 tasklist.exe 6804 tasklist.exe 9024 tasklist.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BlueStacks X\7z.exe BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files\BlueStacks_nxt\BlueStacksUninstaller.exe 7zr.exe File created C:\Program Files\BlueStacks_nxt\HD-Bridge-Native.dll 7zr.exe File created C:\Program Files\BlueStacks_nxt\libagora-soundtouch.dll 7zr.exe File created C:\Program Files (x86)\BlueStacks X\image\Gallery\pre_disabled.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\translations\qtwebengine_locales\hu.pak BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\plugins\meta_engine\libfolder_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\image\NowBux\NoResult.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\codec\libschroedinger_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\video_chroma\libi420_rgb_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\HD-DiskCompaction.exe 7zr.exe File created C:\Program Files\BlueStacks_nxt\translations\qtwebengine_locales\da.pak 7zr.exe File created C:\Program Files (x86)\BlueStacks X\image\MyGames\back_hover.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\image\TypeIndicator\home_hover.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\image\TypeIndicator\MyGame_on.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\plugins\mux\libmux_wav_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\plugins\video_chroma\libyuy2_i422_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\CloudGame\TitlebarBack.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\image\Guide\BG.png BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\Search\mini_and.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\Search\mini_cloud.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\HD-Astcdecoder_SSE20.dll 7zr.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\NowBux BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\image\NowBux\Info.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\wallet\topbar_icon.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\stream_filter\libcache_read_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\NOTICE.html 7zr.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\Search\History_ButtonDelete_normal.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\translations\qtwebengine_locales\id.pak BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files\BlueStacks_nxt\HD-Astcdecoder_AVX1.dll 7zr.exe File created C:\Program Files (x86)\BlueStacks X\translations\qtwebengine_locales\cs.pak BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\Qt6Svg.dll 7zr.exe File opened for modification C:\Program Files (x86)\BlueStacks X\mediaservice BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\account\Choose_img7.png BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\translations\qtwebengine_locales\sv.pak BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\access\libaccess_concat_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\plugins\codec\liba52_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\Qt5Compat\GraphicalEffects\qtgraphicaleffectsplugin.dll 7zr.exe File created C:\Program Files (x86)\BlueStacks X\translations\qtwebengine_locales\sk.pak BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\audio_filter\libparam_eq_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\codec\libavcodec_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\Assets\installer_bg_blurred.png 7zr.exe File opened for modification C:\Program Files\BlueStacks_nxt\HD-ForceGPU.exe 7zr.exe File created C:\Program Files (x86)\BlueStacks X\image\MyGames\tip_ico.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\Tutorial\InstantPlay\Icon_title.png BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\audio_filter\libugly_resampler_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files\BlueStacks_nxt\imageformats\qjpeg.dll 7zr.exe File created C:\Program Files (x86)\BlueStacks X\image\account\Choose_img1.png BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\stream_filter\libprefetch_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\video_filter\libedgedetection_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files\BlueStacks_nxt\translations\qtwebengine_locales\ta.pak 7zr.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\wallet\logo.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\aws\aws-c-http.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\Qt5Quick.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files\BlueStacks_nxt\Assets\powered_by_bs.png 7zr.exe File opened for modification C:\Program Files\BlueStacks_nxt\QtWebEngine 7zr.exe File created C:\Program Files (x86)\BlueStacks X\image\MyGames\NavigatorForward_Click.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\image\MyGames\Shadow_under_those_cards.png BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\image\TypeIndicator\Marketplace_on.svg BSX-Setup-5.21.580.1017_nxt.exe File opened for modification C:\Program Files (x86)\BlueStacks X\imageformats\qjpeg.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\plugins\codec\libflac_plugin.dll BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files\BlueStacks_nxt\translations\qtwebengine_locales\it.pak 7zr.exe File created C:\Program Files (x86)\BlueStacks X\image\TypeIndicator\MyGame.svg BSX-Setup-5.21.580.1017_nxt.exe File created C:\Program Files (x86)\BlueStacks X\bearer\qgenericbearer.dll BSX-Setup-5.21.580.1017_nxt.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5500 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 24 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD-CheckCpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD-CheckCpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BSX-Setup-5.21.580.1017_nxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueStacksServicesSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7zr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD-CheckCpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD-CheckCpu.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BlueStacksInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BlueStacksInstaller.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\DefaultIcon\ = "C:\\Program Files (x86)\\BlueStacks X\\BlueStacks X.exe,0" BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs BlueStacksServices.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs\ = "URL:bstsrvs" BlueStacksServices.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX BSX-Setup-5.21.580.1017_nxt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\ = "URL:BlueStacksX Protocol Handler" BSX-Setup-5.21.580.1017_nxt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\URL Protocol BSX-Setup-5.21.580.1017_nxt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\open\command\ = "\"C:\\Program Files (x86)\\BlueStacks X\\BlueStacks X.exe\" -open \"%1\"" BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs\shell\open BlueStacksServices.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\DefaultIcon BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings BSX-Setup-5.21.580.1017_nxt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs\URL Protocol BlueStacksServices.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs\shell\open\command BlueStacksServices.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\ BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\open BSX-Setup-5.21.580.1017_nxt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\open\ BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\open\command BSX-Setup-5.21.580.1017_nxt.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs\shell BlueStacksServices.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\bstsrvs\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\bluestacks-services\\BlueStacksServices.exe\" \"%1\"" BlueStacksServices.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 501149.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 4672 msedge.exe 4672 msedge.exe 4012 identity_helper.exe 4012 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 5264 BlueStacksInstaller.exe 5264 BlueStacksInstaller.exe 5264 BlueStacksInstaller.exe 5264 BlueStacksInstaller.exe 5264 BlueStacksInstaller.exe 5264 BlueStacksInstaller.exe 5264 BlueStacksInstaller.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 5916 BSX-Setup-5.21.580.1017_nxt.exe 7480 msedge.exe 7480 msedge.exe 7480 msedge.exe 7480 msedge.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5408 Bootstrapper.exe 5568 BlueStacksInstaller.exe 5568 BlueStacksInstaller.exe 5348 BlueStacksServicesSetup.exe 5348 BlueStacksServicesSetup.exe 7088 tasklist.exe 7088 tasklist.exe 5568 BlueStacksInstaller.exe 5568 BlueStacksInstaller.exe 5568 BlueStacksInstaller.exe 5568 BlueStacksInstaller.exe 5568 BlueStacksInstaller.exe 5568 BlueStacksInstaller.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5264 BlueStacksInstaller.exe Token: SeSecurityPrivilege 5916 BSX-Setup-5.21.580.1017_nxt.exe Token: SeDebugPrivilege 5408 Bootstrapper.exe Token: SeDebugPrivilege 5568 BlueStacksInstaller.exe Token: SeRestorePrivilege 6412 7zr.exe Token: 35 6412 7zr.exe Token: SeSecurityPrivilege 6412 7zr.exe Token: SeSecurityPrivilege 6412 7zr.exe Token: SeRestorePrivilege 6552 7zr.exe Token: 35 6552 7zr.exe Token: SeSecurityPrivilege 6552 7zr.exe Token: SeSecurityPrivilege 6552 7zr.exe Token: SeDebugPrivilege 7088 tasklist.exe Token: SeSecurityPrivilege 5348 BlueStacksServicesSetup.exe Token: SeRestorePrivilege 9972 7zr.exe Token: 35 9972 7zr.exe Token: SeSecurityPrivilege 9972 7zr.exe Token: SeSecurityPrivilege 9972 7zr.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeDebugPrivilege 9404 tasklist.exe Token: SeDebugPrivilege 9568 tasklist.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeDebugPrivilege 7588 tasklist.exe Token: SeDebugPrivilege 1164 tasklist.exe Token: SeRestorePrivilege 9900 7zr.exe Token: 35 9900 7zr.exe Token: SeSecurityPrivilege 9900 7zr.exe Token: SeSecurityPrivilege 9900 7zr.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeRestorePrivilege 7868 7zr.exe Token: 35 7868 7zr.exe Token: SeSecurityPrivilege 7868 7zr.exe Token: SeSecurityPrivilege 7868 7zr.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeRestorePrivilege 5564 7zr.exe Token: 35 5564 7zr.exe Token: SeSecurityPrivilege 5564 7zr.exe Token: SeSecurityPrivilege 5564 7zr.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeDebugPrivilege 6432 tasklist.exe Token: SeDebugPrivilege 6384 tasklist.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe Token: SeShutdownPrivilege 6124 BlueStacksServices.exe Token: SeCreatePagefilePrivilege 6124 BlueStacksServices.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe 6124 BlueStacksServices.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3620 HD-GLCheck.exe 8392 HD-GLCheck.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 3528 4672 msedge.exe 82 PID 4672 wrote to memory of 3528 4672 msedge.exe 82 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2044 4672 msedge.exe 83 PID 4672 wrote to memory of 2576 4672 msedge.exe 84 PID 4672 wrote to memory of 2576 4672 msedge.exe 84 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85 PID 4672 wrote to memory of 8 4672 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.bluestacks.com/download.html1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9984b46f8,0x7ff9984b4708,0x7ff9984b47182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Users\Admin\Downloads\BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe"C:\Users\Admin\Downloads\BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\7zSC635C8E7\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zSC635C8E7\BlueStacksInstaller.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5264 -
C:\Users\Admin\AppData\Local\Temp\7zSC635C8E7\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zSC635C8E7\HD-CheckCpu.exe" --cmd checkHypervEnabled4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5408
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC635C8E7\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zSC635C8E7\HD-CheckCpu.exe" --cmd checkSSE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536
-
-
C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.580.1017_nxt.exe"C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.580.1017_nxt.exe" -s4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\BlueStacks X\green.vbs"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c green.bat6⤵
- System Location Discovery: System Language Discovery
PID:10224 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="BlueStacksWeb"7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5216
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Cloud Game"7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:7256
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="BlueStacksWeb" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\BlueStacksWeb.exe"7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:7292
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Cloud Game" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\Cloud Game.exe"7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:7372
-
-
-
-
-
C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe"C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe" -versionMachineID=e3cdd246-2eb2-4bfc-b956-c42cfd868cd8 -machineID=88272f6e-7114-4523-bf3a-b14fc78eeef8 -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Pie64 -imageToLaunch=Pie64 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.41.580.1012 -country=GB -skipBinaryShortcuts -isWalletFeatureEnabled4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\Bootstrapper.exe" -versionMachineID=e3cdd246-2eb2-4bfc-b956-c42cfd868cd8 -machineID=88272f6e-7114-4523-bf3a-b14fc78eeef8 -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Pie64 -imageToLaunch=Pie64 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.41.580.1012 -country=GB -skipBinaryShortcuts -isWalletFeatureEnabled5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5408 -
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\BlueStacksInstaller.exe" -versionMachineID="e3cdd246-2eb2-4bfc-b956-c42cfd868cd8" -machineID="88272f6e-7114-4523-bf3a-b14fc78eeef8" -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName="Pie64" -imageToLaunch="Pie64" -appToLaunch="bsx" -bsxVersion="10.41.580.1012" -country="GB" -skipBinaryShortcuts -isWalletFeatureEnabled -parentpath="C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.580.1012_native_1097447614da6bce58b50b94b340a79d_MzsxNSwwOzUsMTsxNSw0OzE1LA==.exe" -md5=1097447614da6bce58b50b94b340a79d -app64=6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" x "C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\CommonInstallUtils.zip" -o"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\" -aoa7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" x "C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\QtRedistx64.zip" -o"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\" -aoa7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-ForceGPU.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-ForceGPU.exe" 1 "C:\Program Files\BlueStacks_nxt"7⤵
- Executes dropped EXE
PID:9576
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe" 1 27⤵
- Executes dropped EXE
PID:9628
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe" 4 27⤵
- Executes dropped EXE
PID:9732
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe" 2 27⤵
- Executes dropped EXE
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe" 1 17⤵
- Executes dropped EXE
PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe" 4 17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe" 2 17⤵
- Executes dropped EXE
PID:9892
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-CheckCpu.exe" --cmd checkSSE47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" x "C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\PF.zip" -o"C:\Program Files\BlueStacks_nxt" -aoa7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9972
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" x "C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\QtRedistx64.zip" -o"C:\Program Files\BlueStacks_nxt" -aoa7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9900
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" x "C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\PD.zip" -o"C:\ProgramData\BlueStacks_nxt" -aoa7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7868
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" x "C:\ProgramData\Pie64_5.21.580.1017.exe" -o"C:\ProgramData\BlueStacks_nxt\Engine\Pie64" -aoa7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\\HD-GLCheck.exe" 27⤵
- Executes dropped EXE
PID:8460
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\\HD-GLCheck.exe" 37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:8392
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-GLCheck.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\\HD-GLCheck.exe" 17⤵
- Executes dropped EXE
PID:8436
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh.exe" advfirewall firewall delete rule name="BlueStacks Service"7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8516
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh.exe" advfirewall firewall add rule name="BlueStacks Service" dir=in action=allow program="C:\Program Files\BlueStacks_nxt\HD-Player.exe" enable=yes7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8600
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh.exe" advfirewall firewall delete rule name="BlueStacksAppplayerWeb"7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8644
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh.exe" advfirewall firewall add rule name="BlueStacksAppplayerWeb" dir=in action=allow program="C:\Program Files\BlueStacks_nxt\BlueStacksAppplayerWeb.exe" enable=yes7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:8900
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\HD-CheckCpu.exe" --cmd checkSSE37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8828
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c "sc.exe delete BlueStacksDrv_nxt"7⤵PID:9152
-
C:\Windows\system32\sc.exesc.exe delete BlueStacksDrv_nxt8⤵
- Launches sc.exe
PID:5500
-
-
-
C:\Windows\SYSTEM32\reg.exe"reg.exe" EXPORT HKLM\Software\BlueStacks_nxt "C:\Users\Admin\AppData\Local\Temp\oaq140lv.3hr\RegHKLM.txt"7⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe"C:\Users\Admin\AppData\Local\Temp\7zS8434E6F9\7zr.exe" a "C:\Users\Admin\AppData\Local\Temp\Installer.zip" -m0=LZMA:a=1 "C:\Users\Admin\AppData\Local\Temp\oaq140lv.3hr\*"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5680
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17036668370310031421,11228333824808327448,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:7480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
-
C:\ProgramData\BlueStacksServicesSetup.exe"C:\ProgramData\BlueStacksServicesSetup.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5348 -
C:\Windows\SysWOW64\cmd.execmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq BlueStacksServices.exe" | find "BlueStacksServices.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7132 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq BlueStacksServices.exe"3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7088
-
-
C:\Windows\SysWOW64\find.exefind "BlueStacksServices.exe"3⤵
- System Location Discovery: System Language Discovery
PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe"C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --hidden --initialLaunch1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6124 -
C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe"C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1724,i,1508148425156125603,2224675423393223177,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
PID:2528
-
-
C:\Windows\system32\cscript.execscript.exe2⤵PID:4180
-
-
C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe"C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --mojo-platform-channel-handle=1996 --field-trial-handle=1724,i,1508148425156125603,2224675423393223177,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
PID:5148
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\BlueStacksServices2⤵PID:920
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\BlueStacksServices2⤵PID:4188
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regPutValue.wsf A2⤵PID:4604
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regPutValue.wsf A2⤵PID:2660
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"2⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe"C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --app-user-model-id=com.bluestacks.services --app-path="C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2656 --field-trial-handle=1724,i,1508148425156125603,2224675423393223177,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
PID:7332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:6092
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:9568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:3128
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:9404
-
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"2⤵PID:9220
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"2⤵PID:4908
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"2⤵PID:4232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:9632
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:9728
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt2⤵PID:9780
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt2⤵PID:6072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:6340
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:6328
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6432
-
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"2⤵PID:6548
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt2⤵PID:6620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:6676
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
PID:7080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:5600
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
PID:7100
-
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"2⤵PID:7036
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt2⤵PID:7068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:6904
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
PID:6812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:4444
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
PID:6804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:8936
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
PID:9024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:8940
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
PID:9016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""2⤵PID:5796
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq BlueStacks X.exe"3⤵
- Enumerates processes with tasklist
PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""2⤵PID:5752
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq HD-Player.exe"3⤵
- Enumerates processes with tasklist
PID:5860
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD59063a25772a72c2b97519f6cfbf18001
SHA1973f17a935fad003d8965ae36ff08dadd32ad366
SHA256a5b4faf41eb40438f83c2629d71456fd7aab3f36ea863ae9476936f30da6c9d7
SHA512697431101835522017bc3304cada539986531aa9e335eb2fdbeb6cea10a34729dc2e9da4466c071cedb16da1c6b65b14a72fa4a43179d583038f054078d7a5a2
-
Filesize
569B
MD5e7fdf6a9c8cae1fc1108dc5a803a1905
SHA12853f9ff5e63685ebb1449dcf693176b17e4ab60
SHA2568ee5aa84139b2ea5549f7272523aeb203d73954c5ccdcf6f7407bf1a3469f13e
SHA512a6388b24926934e20ccf7fcab41bd219dc6c0053428481d7f466bf89f26bf1a36fdff716a9ddd9ab268df73b04dff1449c6bac1f5c707e31ae2ee71c2087e0d9
-
Filesize
653B
MD576166804e6ce35e8a0c92917b8abc071
SHA18bd38726a11a9633ac937b9c6f205ce5d36348b0
SHA2561bca2e912184b8168ee8961de68d1d839f4f9827fde6f48ab100fb61e82eff90
SHA51293c4f1af7e9f89091a207ab308e05ddd4c92406c039f7465d3b8aca7e0cc7a6c922a22e1eee2f5c88db5e89016ef69294b2a0905d7d6a90fd32835bc11929005
-
Filesize
569B
MD53221ac69d7facd8aa90ffa15aea991b0
SHA1e0571f30f4708ec78addc726a743679ca0f05e45
SHA25692aeae68e9e0973d9e0dc575941f1cb2e24afd0574341a46b870be7384eaa537
SHA5125e2de0abfe60a4db16ea5e8739260c19962fbfc60869a77bde6ab3547ad8ee3ad88e74e97da31fa23be096afddad018e431d152d6d0fa21a75357a11dacb1328
-
Filesize
653B
MD5dfddf8d0788988c3e48fcbfb2a76cd20
SHA1463bb61f0012289e860c32f1885a3a8f57467f2e
SHA2569585f41eb6202e89f2087266fa31852d7f41ca8cc659b907c96753fe165f937d
SHA512e708c5114c60f7574589d6a56c9faedda26ee4a40f0eeb25f5e12eadcf790f24fdbf393fa0aa6ad449b5337d625b092d6f8822472fa8a6ce1339aca59c50c3ca
-
Filesize
812KB
MD5fbaba140f30a11e5ff4f97d921de6d45
SHA1d12360b79d9fe7ddc5380a22539dc7d4768ff5f3
SHA2564889c0826c633c0291264d37834363be90ee39d07fcea228494ed151386dcb16
SHA512cd18bb1b057b1b077fde372ca5f98701614b196b692ac42ec56e5b839535022d884a2cd9b6bf644a520c6f48f12f673574a24e60580c70c695067b66442ea7a5
-
Filesize
538B
MD5ce144d2aab3bf213af693d4e18f87a59
SHA1df59dc3dbba88bdc5ffc25f2e5e7b73ac3de5afa
SHA256d8e502fab00b0c6f06ba6abede6922ab3b423fe6f2d2f56941dabc887b229ad3
SHA5120f930edd485a0d49ef157f6cc8856609c087c91b77845adeb5cc8c8a80ebc7ec5416df351ffa1af780caad884dbb49dcc778b0b30de6fb7c85ffef22d7220ebe
-
Filesize
412B
MD5ea22933e94c7ab813b639627f2b38286
SHA1c5358c5cb7fb1a0744c775f8148c2376928fb509
SHA256d7c79677d2ef897fa0ad1efc90e916c46da29f571208f78f24505603b7165c20
SHA512ba447a1aedec49419e2b4a8de85c6047886f1a5ebb94f1c45e205a3780c6826f412a3892e97115b35e43839f43e346f3c72ffbf0c57d57f6d26b360ae61b3964
-
Filesize
15KB
MD56db7460b73a6641c7621d0a6203a0a90
SHA1d39b488b96f3e5b5fe93ee3eecb6d28bb5b03cf3
SHA256d5a7e6fc5e92e0b29a4f65625030447f3379b4e3ac4bed051a0646a7932ce0cd
SHA512a0e6911853f51d73605e8f1a61442391fad25ff7b50a3f84d140d510fd98e262c971f130fb8a237a63704b8162c24b8440a5f235f51a5c343389f64e67c1c852
-
Filesize
15KB
MD55ceab43aa527bc146f9453a1586ddf03
SHA188ffb3cadccb54d4be3aabf31cf4d64210b5f553
SHA2567c625ae4668cc03e37e4ffc478b87eace06b49b77e71e3209f431c23d98acdd0
SHA5128a5c81c048fb7d02b246ed23a098ae5f95cdf6f4ca58fd3d30e4fe3001c933444310ca6391096cfaeed86b13f568236f84df4ea9a3d205c0677e31025616f19e
-
Filesize
9KB
MD57a2e5c21140aa8269c2aafd207f5dbaa
SHA14e0d9e7e1b09e67eba10100d73dc51623517821e
SHA2563d2afe5236ec813d9e8063bc43eb34b88c2155784e1bce19c6a533c32767af35
SHA51263f512559f2068a9702c7c527c126f6017cd8d1d16af52e41b884aa9a64ff4294a57243ec78c3a416f70fb6178a79877d68345357725ff92c935709a2ef8adde
-
Filesize
192B
MD5e50df2a0768f7fc4c3fe8d784564fea3
SHA1d1fc4db50fe8e534019eb7ce70a61fd4c954621a
SHA256671f26795b12008fbea1943143f660095f3dca5d925f67d765e2352fd7ee2396
SHA512c87a8308a73b17cbdd179737631fb1ba7fdaeb65e82263f6617727519b70a81266bb695867b9e599c1306ee2cf0de525452f77ce367ca89bf870ea3ae7189998
-
Filesize
176B
MD562d7f14c26608f8392537d68f43dece1
SHA1add4f30e7c3af4f7622e6bc55d960db612f3bb0a
SHA256a631e26bd5b6ea19c8c65b766a056c92ba8a47e1483768dcf12b05293c9a7a0d
SHA512e41210a78e6076954f75a2f73c0f7628e8604a09ecbb1d2ee0972741d4ef1d814b366828977c02944736b03ed116bc559a2ae47ddb7cbc6f4e54578c8263edf4
-
Filesize
392B
MD5ca0a329097316832e4a6ea5d870c9268
SHA14a36b93361d3dc9df9b00313f2c2b394be9e1e72
SHA2564b7df915d706af6459c38d75b09c5e14f951842ae0678078400f204ad1c7a7c2
SHA51251f9a874e84f130be4fa29fcc4bc934105318234b5dd9ceedaf569e3f0e6b38e29f3bec056044724476ae24295a510b16d8a737b994fd6f1268609defa315271
-
Filesize
169KB
MD5456729be55744776e175ede83e591a63
SHA14479fe3ec05bf5bb128c02f570355c09a8eae044
SHA256ececf497383978c59a7a181a4618bf7e75dd21567d4e609396864357a4ca3b08
SHA512f2f0e20db036a0e826abc52ea03273509bfe6651a89c418a477710dab2fe33c47f9ce9ba8e70c51cdc11a6eb0848eb75ae06e3fb5a515b8caafe3caf86ee8b44
-
Filesize
223KB
MD562d951d77febc7d4af2bf3000812bf09
SHA1ad40be18be2445131e1223555de2c43a0df01090
SHA256b35b5de6cc0a72fbf7176e5fc7f9457f46001330fa69dd172762d6fb0f7872f2
SHA51245e2ee6e28062017f3daeabf8aeb3c2a14baea530a2280150dcf61f2c8f642011689bcaa8b21a5e0e6efc19552ab1948e8f47f75556d4b4489bd3f3ba9ff6b2c
-
Filesize
131KB
MD5169706218f98a42594a8c5c5a65771fe
SHA1b8ded94180212578d86a031eb71ef93dcffe1a26
SHA2563803045963af064936d7071c178de8e40854968b3d3f9171c57a182c869f3697
SHA5121c3f18ed0a24ffa78fe938826eb88531eb8be134d6f209b87d7af5d0e8c4829f01947d7b0048996b9755562bbb7f52e000bcd15d07d646cacb2989ac881ce448
-
Filesize
447B
MD5b09525b48c0023f893d6b64d06add4b1
SHA110ecd439ea04e02eefe17f6c110d0c0a78a1db21
SHA256caa2a8fe9b282939a21b86f8f61fb0c9452222cc3409f06cbb0dcc45613aca8e
SHA512c6f5a7014c24133eb576708ca17d15becf2b45ec278b3f94e5275e47c78cf0f2eb8bb1a17d277d1a665039f38f2e25faf830e275f426b0a94c6a3da096b6204f
-
Filesize
577B
MD547ff3e4cc15b8c4a07e3ceb6cb619b62
SHA10318e54c613b8ff00f54d843e90ef88310c1a96f
SHA2564786cfb7c98edcf01d6b670abf19c50891d56a4de87b96a5e17be142b1af666a
SHA5120212bd7f6cee390d3bc221a22189b75407fa660a0951c7f768645bf97e7b61ee86fa9b1de6f546ff1151560dcb3b071db8c14a7b08b0e771b539a817b31b154e
-
Filesize
480B
MD522efccf38e15df945962ac85ac3aa3b7
SHA1b94a8615dc92982e1637680446896080f97c2564
SHA2560ec39ed4bf89a341f1b5aea56d0e99ff5c923b9c3a6a81adeb9ff21764136f92
SHA51241a4dbb57abed1a16aa84c72c202da461ca45cbaf68f69a10cb3e5529e8dff659e89f7f4459d1e2e8f3549c6fd51f23fc8422f86667577ebed5ab5df149c79ee
-
Filesize
26KB
MD57dc7a16b5e42818c9249db888ca17075
SHA142f6b065b90017078fca7161cc4c26ae530dfbdd
SHA256e696f4f231acef534d62ec9d99a3f4fc7b74a1c1deb3f9bbbeb4e94194bd9747
SHA512f2706e0bb348a691d3cdc9d05ff4f71979804628547a41386aab068b008fe4933b8689500b5e45abf6afa6b6f1db3024ade2846659b2664b37b724fac5416a74
-
Filesize
14KB
MD59fb07e066cc2f213a64d35a97a8c2922
SHA1a70db989f5c562bc69caad89a1402c8ad7c9b80e
SHA25665e7b0f37b5e2aa805ac8d57969804d803430186f34e9703ca9fa09ba908ef90
SHA51281680bff55b475a62a4bf29a8c219230b84894c1165f60e372209a5aacdba8e4819c3dfb76f3b55c15d472ababeabf0cd4b30c04e7daa26df63c8a5101970c3c
-
Filesize
22KB
MD5defbcf66edf5e18b0b13c8062fdfeff8
SHA18c807de19b131831b72325455f1bcc3ead0a09cb
SHA256a9d87275086fd2d700d588f45c3121eb6a75c64a2e6c4a8714a61032403cdb03
SHA512a30e142679e942932d82fb8179a9f8ca2cd5882577de64e8e4c38eb84c99e359235346c35b6237133159288261b0f6e9032dc6b14f512e2a431f093187e1447a
-
Filesize
22KB
MD5412ce0feb5a656c908775da52043c31d
SHA154a35431dc77d66fde2c828f10372142926b4c47
SHA2567db48c44d717c50011a2fe2d8f5eb0214c817c7eef5bf1f656feb70270a53458
SHA5122209d911c91d21ceb44a8e9375fefa9b5ea55cb800f49f709a7baaa56d52a94f5711fce850d880394f6ae78d23d0e3f1a5727514b970f940d0b670e2e978a997
-
Filesize
23KB
MD52625613573f48fa7eaa813d7fc16b63c
SHA1a57a1cd71dbf2dbabe8bc873839adb2005f54c7b
SHA25608062a8ae430d89af04c9d090506dd6e380490387eb2909f356a47c01540b271
SHA5128a443771fbea7708479412c5d6c336e5e74745e097118712fbecc279277ecc2ff693ddc8e576f91c6b61ff658d7a576cd37c5b084d5116bc9606434fbfc4222b
-
Filesize
20KB
MD57e8631459def09a456900fa9d3cba360
SHA1b5204153e26b303598c473e7e92b01a87818787f
SHA2569620d50148651dc75d3741eb12a8a23fbdeb5efc29f1be24842fc37d01b71f8a
SHA512f813863475538f763733b0668f3b5cd7d4b6f7132c1a9df3b4665907fe6280d6d8c9dd4f6e3e06bfee7f90a2a527f7cd66bd647f08b8203664395f31321cf84b
-
Filesize
21KB
MD5444e991f12d84ad04baf6c8eeccc7a9d
SHA1f4bec5e01161d6f5cc9107f2cba325cc9b0ef325
SHA2564b1f6e0fbc834a783ab8230e678bfd1506ae6c18b0ac0a5bef1d8344b5b2531f
SHA512ff61397322d86f36a225e9be7444c643e2760a556311c97b230583b0b2788208d11f723e500c3d291d55d076b5cb0a52d92b50a8b1fdfe348fd61341b915f855
-
Filesize
25KB
MD5cb5797745966bfbded96d28cf53e2f93
SHA11cdc380338f076c608a4143cb685e4cab2bee916
SHA25625fbeecfbeec0b2a8ad45f8b7da31c4eb6fdbe413f46e75f40cd22d874c8f7c3
SHA512f42ef0a3566f02a4487daf50725c186a0cd8c03850c569eb0cf4134ad2c2004135730ff8f672207bf12837980fe722c4581bb0c6c1eea5dcc9014da5719901b7
-
Filesize
22KB
MD5299768cf839ca0926344233731549181
SHA1773aa661c5bbc1a92a41b2f02e59bf1d78b4b142
SHA256883cf4af6b2124bb70f51d683c7a1f4b3cecccc4ea61163b8c4ea967155ea839
SHA5120de4317aa9139b415d4d10aba7f64cbfe39f0417e2d19dd8e69ada7d0915a81f71be242caebf5e019a2638d6d0457c042493c80ea0d24c2dd43c18bfe76dd2c2
-
Filesize
21KB
MD5c61810a689ad52145f3b644b3e4b01e9
SHA1ee7f7229aeea4a0ec6e18805b69d0ff928afbf87
SHA256c5cdf3696ccd6e3e600483836c81b290e5270984fd7ca12becafedea42cd64e4
SHA51279dcf55c6ac864764fa4c614667053c99cd37f408b2b573ce18077fd09ba70877b3cbbd1f57b680ba6e9b5ed5a4d257f11d12c67a0b56dc9a099bf2584e0c393
-
Filesize
21KB
MD5f7ec10775c6fa5d5ab49531ec7910ed4
SHA19d3b8f8474328725097de234a961b32b2e1dc9ba
SHA256909f5b1bbfd2cc1779dda1bf4f481c1d6ae1e1af3d9902c1518a535962860668
SHA512d7d8ea4c15d54d9e4a2b75e4962ac9b81a316d23803c64c8925ffe6348b200fe21d445c6a0b0bd1a5b0a7e413bd5f5ad8935ee15cc56485886a5f4b29e51963b
-
Filesize
30KB
MD5a7748f70870a0f2cf2e5804d05f433fb
SHA1ee74469bbfa6e5d04043dae2a2cdec1a777c5b28
SHA256f74bceefe2a7e7d39650128096f9b97aca5e929fa67e451bfa8238d7b90cea34
SHA512122025652c05ba9336b339db79b925b781862a635cdb0c8d5db0adacfeb6e0e43ef85c283d417f119d8622640d0ed15cdc6d915749ee3cc1a4f89b062ae71075
-
Filesize
35KB
MD5bfb84603722e804e4697a52285b867b2
SHA15840e5e93319f981dc0f6df4c7d7be23547f6655
SHA25698f156d8184c10d504189eab0077aeac8687e1d6714d0bb228704d660e01446d
SHA512e26cc6ab7087a252471cd6233e3baa9d9a66c0a7a0b3703987b31ff4f91f89d00854d8d970f3090b2d90155d5eb5f724a096badddbc6a4dca7dd1a53fad6ffd5
-
Filesize
21KB
MD52ddee14b7986e234a208189d650a2e4d
SHA1ab60bc9393258e556c7ac20a8d68f632ad44ea6d
SHA256fd9c690e597fc7d8b3bbcba7e39816087c424227f89bf3107da7d16d444fb3dd
SHA512116d06a37e836d4f48b59aa9cf4164e1ba4abc081e62adfc6f3c8d112f46b57c060381dd2fc361fb83a162ab12f915408df193bdac405490e3014bc0effecc9c
-
Filesize
24KB
MD52ffe813470cfedf7384207e61dabf1df
SHA11673c446a89a41afff299acd0f74b4df65cc29c1
SHA256e666975aa6894c7d5230eb44a6ee85564cac7a51188ed05b77059beb60545ac1
SHA5123288001e68c5533ae092460d7bcb20ca42c37c04fbdfd412c1046ba41f0582ca3a135f136303125f680165c401536b9bacf6d6435e10ec1477d7f9b45942c34c
-
Filesize
18KB
MD51eee99faa98b0385fd8077acdf53e81e
SHA13191f6c03d6fd3b4db1944e3e7b3a8b85ef20dde
SHA2567d245f9271426eb08f976a83e8b229e9a830f51674e47b6bfc2181716ec0ecf5
SHA512d2c116c7c56d7fd6154c2ab856adccba5848ba1fe1ce5ae38fd740e388cae77f095feaf90d4161527a4b3c99c129374156f85033c18f3293defde33f78708691
-
Filesize
18KB
MD53ab7d825111b89950d8ca4b3da1c00c1
SHA1cdf4ec4344598ca9593665465497d370a35aa178
SHA256dd286cac4e14fe69877e4c2f35eab8352de125f7dc757f47e4fc8329572460ce
SHA512ac0c2dfc6a963a88657304c83d9f00cdadb5735f208571e72d43c410d767ff6c2cd05c4fcfeb5d4c7f8882e079608e8eeee8b1aea1e2cb6442f78cafaa8ffd09
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1ef69a92-34b0-42f2-857a-bbca26f2117d.tmp
Filesize699B
MD5287bbdd797c474f280f05fccfae9b78d
SHA19cf2ebcd6be4f0e76060971f38c559eba8a5ae75
SHA2568d923b5d11ad61854bd37a143d0033e0f31a9f683e952a390bb11cbf296e289b
SHA5122a038ac3765f3cd33c246ed16e6dc45c3a55e3ae625fa83aaf7125217946ff8d84c097775846e9cb7633501d0d961046bcb1e849c185c903513edfbb0386df7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD531d95f5da70c4c1529106c2c801fa47f
SHA18e413eaefc51bf1828c879ea329097fd1d292c33
SHA2561d043f1f5eb519850e28b416dd6d739bdcdf06084c77391da08a810fd573cc17
SHA512a058f5dc9f41ad2d53c50eb35fe1aaafea151bb1a635e064a6466cbfec6cae7e180449211ed6ad7b4f0585f161d785038d10e36801d7fe54b083d46a6f80e783
-
Filesize
2KB
MD5f3f611a52c75ddcb993b58f05eeacf1f
SHA1dd80bfae75dc0510d9cc39f6ff807117e80617f3
SHA256ed792f6ab9318846af9592d18b48b2e94891c413f714492b2da04fffc583e56d
SHA51225e28b03cded107994f78a6c9198babfd050eade231c594c08bff3323ad8e88ea32471c2d6e922350c4282ef4f699eb94779def5ecf1cc0bc827a4c7286950db
-
Filesize
5KB
MD529e86b5ba228158d91f3d0cf33810b4f
SHA1bd04352431a0a5b727368989ff960688d6579c2b
SHA256665cc584992a9a4595b616b877dd97ebeab7147b90ebddf86356f3bb01925b85
SHA512faef6ebaeb6cfe5b3efb077527ff08d915eb885186df1a7f186e53e97bdcad1d13582a2fe25086ab64094e633c35149c9ba622e7ea867b236c78ebb595e5fcbd
-
Filesize
6KB
MD5de1849a111680f01b2d74facdee8cd4c
SHA164180169aa6f7fb91ebcbaa420bccd2661c592a2
SHA2561f61db3b96ec81338db6227642c6fd51b8ef6801f30682f5028da522e0b00608
SHA5127a18f01a5cd0dcab1fad6db68009d89ac78fe7187c0747fe746ddb2192c6b01a17d2bc153c08219b782d94b799db76494cdf099dc01b7236c8d876e72dbac849
-
Filesize
6KB
MD5e96f7e91b358967f3b7cd4b6c80215f8
SHA15b6dd9ae33fcb57f5dd5e1b0b297950e842eccaa
SHA256277b18d79fd0b912af205a3f128f53cf823884051f67d48ede70a7f984cae235
SHA5126e9a11c0071b19ddec9752d0502f337fc5135df775e97f5e6b4fdfcd3d6ab9764579b5b9399d1ca09b76578db263f339b08baca39eced8b6c9cb0e200474c568
-
Filesize
371B
MD51fccf378450b5724a0c64462a0218e0f
SHA18352c2fc7989a142776563a99b81d230bc359ffb
SHA2563c6e54eb35d4649378111b22f38b7f2c42d5c99a88c5eea43f8f89e749e72d14
SHA5122525414775147034503930543559c33cb86a7123fffeae7f39623711073a57c8a6e6816e11992d788b4d0508b8b0362941a2ed382a0d17e7e05a33eaee66921c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51956a47fc86e0580d612cdd09f5dfbfb
SHA11ec239435373c709fb3872128f992e0b72855724
SHA25644336f4b59dea7539f6860cd947995526ba7b7907180cb5ca7244f3d60b8935c
SHA512d5eef5aa5d37f1417f7290ef7db7d7c786d12c1f65a975d432a6937611454c956dbe5f5c1fb30c05f600e3b089897d259a1ff58b4370164ea513aee67f1090ae
-
Filesize
10KB
MD5ad852620523bbdb695f850c2a5b5fe6f
SHA1f08a8eacab5c6a87a7bf5c9bb18e9caf02747cb4
SHA2569f130409b3258d59b9815a60b943175591d974d6072f3b7e2f19901dd3164311
SHA512c4c2434624250353a160958e0d33c83f239d37217212433bc319e1bc481c35fc560ef77ce91f1e4a4d7cb1b4187a4b4556ea8f99f6063f3ddd9a34258fc6dfe9
-
Filesize
670B
MD526eb04b9e0105a7b121ea9c6601bbf2a
SHA1efc08370d90c8173df8d8c4b122d2bb64c07ccd8
SHA2567aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157
SHA5129df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68
-
Filesize
212B
MD51504b80f2a6f2d3fefc305da54a2a6c2
SHA1432a9d89ebc2f693836d3c2f0743ea5d2077848d
SHA2562f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6
SHA512675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94
-
Filesize
153KB
MD59ec0358d06315158e7c1b70b992512a6
SHA16b28a0f86b9f5e6fdb8e178e4259dda8c8eb39f1
SHA256dc75be84836e90f14dc37733f2c8d3a48cbc9f987f956eca43d2940358f463f6
SHA51287aea203564dfc72d4837f5b6801a3ec9eb0448e0c3577bf768bcaf56ef87f706eeb552042946c22f1daa1b5772c11342b0ef96a44dd2f892f3e66f7c0d8bfc0
-
Filesize
15KB
MD57ff5dc8270b5fa7ef6c4a1420bd67a7f
SHA1b224300372feaa97d882ca2552b227c0f2ef4e3e
SHA256fa64884054171515e97b78aaa1aad1ec5baa9d1daf9c682e0b3fb4a41a9cb1c1
SHA512f0d5a842a01b99f189f3d46ab59d2c388a974951b042b25bbce54a15f5a3f386984d19cfca22ba1440eebd79260066a37dfeff6cb0d1332fca136add14488eef
-
Filesize
310B
MD557092634754fc26e5515e3ed5ca7d461
SHA13ae4d01db9d6bba535f5292298502193dfc02710
SHA2568e5847487da148ebb3ea029cc92165afd215cdc08f7122271e13eb37f94e6dc1
SHA512553baf9967847292c8e9249dc3b1d55069f51c79f4d1d3832a0036e79691f433a3ce8296a68c774b5797caf7000037637ce61b8365885d2a4eed3ff0730e5e2a
-
Filesize
15KB
MD593216b2f9d66d423b3e1311c0573332d
SHA15efaebec5f20f91f164f80d1e36f98c9ddaff805
SHA256d0b6d143642d356b40c47459a996131a344cade6bb86158f1b74693426b09bfb
SHA512922a7292de627c5e637818556d25d9842a88e89f2b198885835925679500dfd44a1e25ce79e521e63c4f84a6b0bd6bf98e46143ad8cee80ecdbaf3d3bc0f3a32
-
Filesize
17KB
MD503b17f0b1c067826b0fcc6746cced2cb
SHA1e07e4434e10df4d6c81b55fceb6eca2281362477
SHA256fbece8bb5f4dfa55dcfbf41151b10608af807b9477e99acf0940954a11e68f7b
SHA51267c78ec01e20e9c8d9cdbba665bb2fd2bb150356f30b88d3d400bbdb0ae92010f5d7bcb683dcf6f895722a9151d8e669d8bef913eb6e728ba56bb02f264573b2
-
Filesize
78KB
MD53478e24ba1dd52c80a0ff0d43828b6b5
SHA1b5b13bbf3fb645efb81d3562296599e76a2abac0
SHA2564c7471c986e16de0cd451be27d4b3171e595fe2916b4b3bf7ca52df6ec368904
SHA5125c8c9cc76d6dbc7ce482d0d1b6c2f3d48a7a510cd9ed01c191328763e1bccb56daeb3d18c33a9b10ac7c9780127007aa13799fa82d838de27fbe0a02ad98119d
-
Filesize
14KB
MD5e33432b5d6dafb8b58f161cf38b8f177
SHA1d7f520887ce1bfa0a1abd49c5a7b215c24cbbf6a
SHA2569f3104493216c1fa114ff935d23e3e41c7c3511792a30b10a40b507936c0d183
SHA512520dc99f3176117ebc28da5ef5439b132486ef67d02fa17f28b7eab0c59db0fa99566e44c0ca7bb75c9e7bd5244e4a23d87611a55c841c6f9c9776e457fb1cbf
-
Filesize
113B
MD538b539a1e4229738e5c196eedb4eb225
SHA1f027b08dce77c47aaed75a28a2fce218ff8c936c
SHA256a064f417e3c2b8f3121a14bbded268b2cdf635706880b7006f931de31476bbc2
SHA5122ce433689a94fae454ef65e0e9ec33657b89718bbb5a038bf32950f6d68722803922f3a427278bad432395a1716523e589463fcce4279dc2a895fd77434821cc
-
Filesize
279B
MD503903fd42ed2ee3cb014f0f3b410bcb4
SHA1762a95240607fe8a304867a46bc2d677f494f5c2
SHA256076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1
SHA5128b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857
-
Filesize
15KB
MD5b2e7f40179744c74fded932e829cb12a
SHA1a0059ab8158a497d2cf583a292b13f87326ec3f0
SHA2565bbb2f41f9f3a805986c3c88a639bcc22d90067d4b8de9f1e21e3cf9e5c1766b
SHA512b95b7ebdb4a74639276eaa5c055fd8d9431e2f58a5f7c57303f7cf22e8b599f6f2a7852074cf71b19b49eb31cc9bf2509aedf41d608981d116e49a00030c797c
-
Filesize
629KB
MD55ca709d612937dfbd2a439adc039bae6
SHA11f281122bdbbb72a0a7896469e95818ab5479220
SHA256d69b526abce93cc839c0729d21845a357dd94723316a3f90f95d869c32fca4d0
SHA5123be39f04e800e0f0e87006bed39bb285950f835c4109644969685238fda17450328bb8fecef37427faa8496f8055f4360f4fc8fbe3ad8b53c23b9e1ed2a6bd2d
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
200KB
MD581234fd9895897b8d1f5e6772a1b38d0
SHA180b2fec4a85ed90c4db2f09b63bd8f37038db0d3
SHA2562e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c
SHA5124c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16
-
Filesize
411KB
MD5f5fd966e29f5c359f78cb61a571d1be4
SHA1a55e7ed593b4bc7a77586da0f1223cfd9d51a233
SHA256d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156
SHA512d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be
-
Filesize
20KB
MD5a1e3293265a273080e68501ffdb9c2fc
SHA1add264c4a560ce5803ca7b19263f8cd3ed6f68f0
SHA2561cb847f640d0b2b363ce3c44872c4227656e8d2f1b4a5217603a62d802f0581f
SHA512cb61083dc4d7d86f855a4cc3fe7c4938232a55188ad08b028a12445675fbff6188bb40638bd1ce4e6077f5bfc94449c145118c8f9b8929d4e9c47ed74cf7bece
-
Filesize
80KB
MD5c3e6bab4f92ee40b9453821136878993
SHA194493a6b3dfb3135e5775b7d3be227659856fbc4
SHA256de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6
SHA512a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895
-
Filesize
24KB
MD52b7007ed0262ca02ef69d8990815cbeb
SHA12eabe4f755213666dbbbde024a5235ddde02b47f
SHA2560b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d
SHA512aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
6KB
MD5ec0504e6b8a11d5aad43b296beeb84b2
SHA191b5ce085130c8c7194d66b2439ec9e1c206497c
SHA2565d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
SHA5123f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
Filesize
12KB
MD536c81676ada53ceb99e06693108d8cce
SHA1d31fa4aebd584238b3edc4768dd5414494610889
SHA256a9e4f7ec65670d2ce375ffaf09b6d07f4cd531132ca002452287a4d540154a38
SHA5121300de7b3e1ac9e706e0aad0b70e3e2a21db8c860e05b314a52e63dd66b5dffdf6be1e38ab6ede13bfd3a64631cc909486bf4b1403e7d821e3b566edc514c63c
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
9KB
MD5f7b92b78f1a00a872c8a38f40afa7d65
SHA1872522498f69ad49270190c74cf3af28862057f2
SHA2562bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e
SHA5123ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79
-
Filesize
3.0MB
MD5e0b3238e186b1fdcc19e65fa82c020c6
SHA178cde21524703e9b16817fd1ca977fa867c9bb1b
SHA25622dae5f8d0cbf192d84cf78f962b0bde90c7300c8e9c23ff890ce996d60a082d
SHA51286aa445c9b06f8d58dab314ea3b1dd34143fa4679e85ca5508c96ed662a0edad319312093c9243ccd36edb2f8a023cef66af88a9c1bc04a54548b88b367baac4
-
Filesize
434KB
MD595f6f6ab9509bc366ab9215defe4251a
SHA1e3f4a6effd6ca5838cfe91a01967cb72edcc7b0b
SHA256a896a9ece055d334d431cd0f856113ab925d9ee86d2dee383c0bfbbef11a5b50
SHA512a853f70d2ea7f384df99be067724bf3ca73c63f3c3573c112f5528fc86a96bd34509d934b038e2a81833f3abb3eedbc5894921291139100e01df6e35696c0ecc
-
Filesize
129KB
MD5e26654c1714e322a5bcc20e39447cf14
SHA1fd74ff2e2051f0b433b27910b45a278fd86ae6c0
SHA25699d366490cb46cd9512970294c62ae2e68e1407cc0858b797e52b173ee81d339
SHA512786b96e06bd2671146863dc6587d959ad3cc02cc347ea4fd7a752c847a399939b2c8c8b186cc2de222ab98cca0a4de4620778e38d53696b37fc844f88a29edc0
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
188B
MD5f35bb5de95abe6b017471559b4ae3e75
SHA1c44e711ba65ece77c820f02e64bc6c13d6821a59
SHA256a9844e1f7f7f67e3c7f6d768c978e035d25a6338ffaf59c7b04463e82a4d0500
SHA51256de4ded5a34ae6c4f7b7f96a0e3cee66f42d46d91e2fc9bba568f7ad4ce0de20b2213fc4e289b378f1d59b9f5fe6ece4f0f8a5ee256730a13c268b4cda970ba
-
Filesize
188B
MD503f4f309bc110eee49f288500295ed3d
SHA18280fdc226ddc64cc565606a5faf48ed9513fb95
SHA256275cb2d3f76d5d7ebef16abd9e083a6c15810a4b25aa5ecf84114b5c020de4e8
SHA512066526d88c5f1f789baa0d74e95ef813e14c050069e5ab05fd3f417f5953ea943317bac4b7839b6454d0a84328ebae822c12ca66c28bca1d7a350ba389f5ea6f
-
Filesize
57B
MD583ce5f864f546b2b7f47e11fe717105a
SHA1273e86cee5a912a9f46570c62024f2988a39410b
SHA256c78c31ad1c3f8a1b5aed63e65d0369965e2cc53396a8c59f5f76978da99db874
SHA512087e03b575f98bbd77861d4eec33dfe7fec5a345dc6156333249273c4453c38d6143920a3d9804b02cb6f0c9fa54447d4301ffdd71954b8fe041196fd7d63ab7
-
Filesize
1KB
MD5f4e1dae4f807e69a68678c46a708d65e
SHA1b7f26da4d01a259a59b6ee0a86f3770e43aecf6c
SHA256ff915ed297d9d14e4d38e87e88131ce6eae520af62af5d495cd9f55be3198b11
SHA512e4f0f1e0ebe110ee707a8a97dbeee83a7959e2c15692b661b77189770d60ff664689769682fa6476057bee4de58e242dc16add16ebb2f23152b73fce5e950596
-
Filesize
92B
MD553e145d34db7f2fe9821de4c7270a587
SHA179a0efcf613e6c695414d8518bf0589bd0cfe5f8
SHA256b5d02b96a6d8fb23dd9201cdc9c22437a97b8022cb1cf72b4c63e02f263a9079
SHA51285e67ab420bc9d7e8b429a8cd360d628110c6aeaeab9dcfdb6b44a0737a11e46f6e2b123f27c95a5ccd009eba0b736edca610807f5e02606a386879e0dbf76af
-
Filesize
119B
MD54e0917644ceea160bbfd91dd09b854cc
SHA1799c290bdc7e62eb6a982c6439cc29b4591af511
SHA25601a49b062752cc1275ba237b16f5d32d286a8d68c0f1c07d426bdd5c65b71650
SHA512bbf812d5d7db4bcf29a1fd146b33327139bbe9b1802ef7f274fe6d1d5e8b792b4b86777cdbfaa5c956e6179888ed7a8271cb629348fdfb4bf4278aa12c11b13e
-
Filesize
913KB
MD5f1bb3d158ae71c6e53bd8b57561cf884
SHA1aaed1e9200eac90a1bb7bb2faef792bdc1f9f8a6
SHA256d96d4767376191859f5738ced9e0c65e85497f34949d3e598bb34b98e04c9542
SHA5124f7270869e2f62d9b521c0c8330f577c5654ca0799e4a73efe13ebf8f5cf56bfd23e7a05698acac53721c4ec830cc928d046b6c6d4fb84a75d257751199390ee