Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/10/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
MSI APP Player.exe
Resource
win11-20240802-en
General
-
Target
MSI APP Player.exe
-
Size
1.1MB
-
MD5
98341684249edae864b1ed61c1b0fd7c
-
SHA1
788c46a8814f5f39e56aa408711179bab5be398f
-
SHA256
ab28a0f279d19c9c0c507a677b74616971f3e443277f0709bb619feffe40daf7
-
SHA512
1c7695754dfa5ebe0a06023ba4795571e68cd02ffa30c2648633aec468dc4aacef59b281e10fe86401d0eeca4d36f64a3e32cdb697afa6e780c6ddb8eb588f58
-
SSDEEP
24576:HivtCX8jrlikZ3NzhXV0Oy5zCsP2/KzFazfA4hUlIiKPQk/sy:CtCX8nl9XxV07zCukz4BwUy
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 2612 netsh.exe 4772 netsh.exe 3140 netsh.exe 276 netsh.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\cef\locales\id.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\Search\History_ButtonDelete_pressed.svg BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libanaglyph_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\xplugins\StrategyPlugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\msvcp140_codecvt_ids.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\access\libudp_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libblend_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libposterize_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\cef\locales\he.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\cef\locales\sl.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\translations\qtwebengine_locales\nb.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\Cloud Game.exe BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_output\libwgl_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\translations\qtwebengine_locales\vi.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\access\libudp_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_chroma\libi420_yuy2_sse2_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_chroma\libyuvp_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\cef\locales\pl.pak BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\image\browser_loading.gif BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\Search\Promotes_Title.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\wallet\logo.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\xplugins\BrowserWeb3Plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_output\libyuv_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\www\localization\index.js BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\codec\libflac_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libadjust_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libextract_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\librotate_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\language\id.qm BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\imageformats\qicns.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\access\libhttps_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\codec\libflac_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\translations\qtwebengine_locales\ja.pak BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\translations\qtwebengine_locales\nl.pak BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\translations\qt_ca.qm BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\misc\libvod_rtsp_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\www\js BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\close_main.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\CloudMode\Icon_popular.svg BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\image\web3\tutorial.png BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libgaussianblur_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\api-ms-win-core-timezone-l1-1-0.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_chroma\libi420_nv12_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\cef\locales\lv.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\MyGames\mygames_Android_on.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\radioButton\unselected_disabled.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\language\ko.qm BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\audio_filter\libscaletempo_pitch_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\codec\libaraw_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libpuzzle_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\cef\locales\lv.pak BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\LocalAPK\icon_upload.svg BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\image\SideBar\left_arrow.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\translations\qt_zh_CN.qm BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\www\js\language.js BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libgradfun_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_chroma\libi420_rgb_sse2_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\image\Promote BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\image\LocalAPK\close_pressed.svg BSX-Setup-5.12.120.6303_msi5.exe File opened for modification C:\Program Files (x86)\BlueStacks X_msi5\image\MyGames\next_disable.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\www\js\localize.js BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\plugins\video_filter\libvhs_plugin.dll BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\MyGames\Card_Elliptical_gradient.svg BSX-Setup-5.12.120.6303_msi5.exe File created C:\Program Files (x86)\BlueStacks X_msi5\image\MyGames\muti_pressed.svg BSX-Setup-5.12.120.6303_msi5.exe -
Executes dropped EXE 9 IoCs
pid Process 4504 BlueStacksInstaller.exe 4172 HD-CheckCpu.exe 1044 HD-CheckCpu.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 9184 BlueStacksInstaller.exe 5448 HD-CheckCpu.exe 1964 MSI App Player.exe 6348 BlueStacksWeb.exe 6200 BlueStacksWeb.exe -
Loads dropped DLL 64 IoCs
pid Process 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI App Player.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD-CheckCpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BSX-Setup-5.12.120.6303_msi5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD-CheckCpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueStacksWeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI APP Player.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlueStacksWeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI APP Player.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSI App Player.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSI App Player.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ MSI App Player.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSI App Player.exe -
Modifies registry class 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\ = "URL:MSI App Player Protocol Handler" BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\shell\open BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell MSI App Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\open MSI App Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player BSX-Setup-5.12.120.6303_msi5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\DefaultIcon\ = "C:\\Program Files (x86)\\BlueStacks X_msi5\\MSI App Player.exe,0" BSX-Setup-5.12.120.6303_msi5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\shell\open\ BSX-Setup-5.12.120.6303_msi5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\shell\open\command\ = "\"C:\\Program Files (x86)\\BlueStacks X_msi5\\MSI App Player.exe\" -open \"%1\"" BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX MSI App Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\shell BSX-Setup-5.12.120.6303_msi5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\shell\ BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\shell\open\command BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlueStacksX\shell\open\command MSI App Player.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3761892313-3378554128-2287991803-1000\{6C5C6B54-3545-4170-872A-5E029A567FAA} MSI App Player.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\URL Protocol BSX-Setup-5.12.120.6303_msi5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSI App Player\DefaultIcon BSX-Setup-5.12.120.6303_msi5.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 MSI App Player.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 MSI App Player.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280 MSI App Player.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280\Blob = 0300000001000000140000009e99a48a9960b14926bb7f3b02e22da2b0ab72801400000001000000140000009c5f00dfaa01d7302b3888a2b86d4a9cf2119183040000000100000010000000c6150925cfea5941ddc7ff2a0a5066920f00000001000000200000008408d5e5010ab8da67eb33a7d79ace944dd0ac103ae6ead3ff30dec571066b0319000000010000001000000014d4b19434670e6dc091d154abb20edc5c000000010000000400000000080000180000000100000010000000fd960962ac6938e0d4b0769aa1a64e265900000001000000160000005200530041002f0053004800410032003500360000004b0000000100000044000000420036003600320034003000420030004600360043003800340042004400340038003500370041004200410036003000430046003500430045003400410030005f000000200000000100000079040000308204753082035da003020102020900a70e4a4c3482b77f300d06092a864886f70d01010b05003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3039303930323030303030305a170d3334303632383137333931365a308198310b30090603550406130255533110300e060355040813074172697a6f6e61311330110603550407130a53636f74747364616c6531253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e313b303906035504031332537461726669656c6420536572766963657320526f6f7420436572746966696361746520417574686f72697479202d20473230820122300d06092a864886f70d01010105000382010f003082010a0282010100d50c3ac42af94ee2f5be19975f8e8853b11f3fcbcf9f20136d293ac80f7d3cf76b763863d93660a89b5e5c0080b22f597ff687f9254386e7691b529a90e171e3d82d0d4e6ff6c849d9b6f31a56ae2bb67414ebcffb26e31aba1d962e6a3b5894894756ff25a093705383da847414c3679e04683adf8e405a1d4a4ecf43913be756d60070cb52ee7b7dae3ae7bc31f945f6c260cf1359022b80cc3447dfb9de90656d02cf2c91a6a6e7de8518497c664ea33a6da9b5ee342eba0d03b833df47ebb16b8d25d99bce81d1454632967087de020e494385b66c73bb64ea6141acc9d454df872fc722b226cc9f5954689ffcbe2a2fc4551c75406017850255398b7f050203010001a381f03081ed300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604149c5f00dfaa01d7302b3888a2b86d4a9cf2119183301f0603551d23041830168014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7304f06082b0601050507010104433041301c06082b060105050730018610687474703a2f2f6f2e7373322e75732f302106082b060105050730028615687474703a2f2f782e7373322e75732f782e63657230260603551d1f041f301d301ba019a0178615687474703a2f2f732e7373322e75732f722e63726c30110603551d20040a300830060604551d2000300d06092a864886f70d01010b05000382010100231de38a57ca7de917794cf11e55fdcc536e3e470fdfc655f2b20436ed801f53c45d34286bbec755fc67eacb3f7f90b233cd1b58108202f8f82ff51360d405cef18108c1dda775974f18b96ddef7939108ba7e402cedc1eabb769e3306771d0d087f53dd1b64ab8227f169d54d5eaef4a1c375a758442df23c7098acba69b695777f0f315e2cfca0873a4769f0795ff41454a4955e1178126027ce9fc277ff2353775dbaffea59e7dbcfaf9296ef249a35107a9c91c60e7d99f63f19dff57254e115a907597b83bf522e468cb20064761c48d3d879e86e56ccae2c0390d7193899e4ca09195bff0796b0a87f3449df56a9f7b05fed33ed8c47b730035df4038c MSI App Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C MSI App Player.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 MSI App Player.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 5c000000010000000400000000080000190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c7e00000001000000080000000000042beb77d5017a000000010000000c000000300a06082b060105050703097f000000010000000c000000300a06082b060105050703091d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c990b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d0400000001000000100000003e455215095192e1b75d379fb187298a200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 MSI App Player.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A MSI App Player.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1964 MSI App Player.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4504 BlueStacksInstaller.exe 4504 BlueStacksInstaller.exe 4504 BlueStacksInstaller.exe 4504 BlueStacksInstaller.exe 4504 BlueStacksInstaller.exe 4504 BlueStacksInstaller.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 4360 BSX-Setup-5.12.120.6303_msi5.exe 9184 BlueStacksInstaller.exe 9184 BlueStacksInstaller.exe 9184 BlueStacksInstaller.exe 9184 BlueStacksInstaller.exe 9184 BlueStacksInstaller.exe 9184 BlueStacksInstaller.exe 6200 BlueStacksWeb.exe 6348 BlueStacksWeb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1964 MSI App Player.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4504 BlueStacksInstaller.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 BlueStacksInstaller.exe Token: SeSecurityPrivilege 4360 BSX-Setup-5.12.120.6303_msi5.exe Token: SeDebugPrivilege 9184 BlueStacksInstaller.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 MSI App Player.exe 1964 MSI App Player.exe 1964 MSI App Player.exe 1964 MSI App Player.exe 1964 MSI App Player.exe 1964 MSI App Player.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 660 wrote to memory of 4504 660 MSI APP Player.exe 78 PID 660 wrote to memory of 4504 660 MSI APP Player.exe 78 PID 4504 wrote to memory of 4172 4504 BlueStacksInstaller.exe 81 PID 4504 wrote to memory of 4172 4504 BlueStacksInstaller.exe 81 PID 4504 wrote to memory of 4172 4504 BlueStacksInstaller.exe 81 PID 4504 wrote to memory of 1044 4504 BlueStacksInstaller.exe 83 PID 4504 wrote to memory of 1044 4504 BlueStacksInstaller.exe 83 PID 4504 wrote to memory of 1044 4504 BlueStacksInstaller.exe 83 PID 4504 wrote to memory of 4360 4504 BlueStacksInstaller.exe 86 PID 4504 wrote to memory of 4360 4504 BlueStacksInstaller.exe 86 PID 4504 wrote to memory of 4360 4504 BlueStacksInstaller.exe 86 PID 4504 wrote to memory of 8216 4504 BlueStacksInstaller.exe 87 PID 4504 wrote to memory of 8216 4504 BlueStacksInstaller.exe 87 PID 4504 wrote to memory of 8216 4504 BlueStacksInstaller.exe 87 PID 8216 wrote to memory of 9184 8216 MSI APP Player.exe 88 PID 8216 wrote to memory of 9184 8216 MSI APP Player.exe 88 PID 9184 wrote to memory of 5448 9184 BlueStacksInstaller.exe 89 PID 9184 wrote to memory of 5448 9184 BlueStacksInstaller.exe 89 PID 9184 wrote to memory of 5448 9184 BlueStacksInstaller.exe 89 PID 4360 wrote to memory of 5112 4360 BSX-Setup-5.12.120.6303_msi5.exe 91 PID 4360 wrote to memory of 5112 4360 BSX-Setup-5.12.120.6303_msi5.exe 91 PID 4360 wrote to memory of 5112 4360 BSX-Setup-5.12.120.6303_msi5.exe 91 PID 5112 wrote to memory of 2300 5112 WScript.exe 92 PID 5112 wrote to memory of 2300 5112 WScript.exe 92 PID 5112 wrote to memory of 2300 5112 WScript.exe 92 PID 2300 wrote to memory of 2612 2300 cmd.exe 94 PID 2300 wrote to memory of 2612 2300 cmd.exe 94 PID 2300 wrote to memory of 2612 2300 cmd.exe 94 PID 2300 wrote to memory of 4772 2300 cmd.exe 95 PID 2300 wrote to memory of 4772 2300 cmd.exe 95 PID 2300 wrote to memory of 4772 2300 cmd.exe 95 PID 2300 wrote to memory of 3140 2300 cmd.exe 97 PID 2300 wrote to memory of 3140 2300 cmd.exe 97 PID 2300 wrote to memory of 3140 2300 cmd.exe 97 PID 2300 wrote to memory of 276 2300 cmd.exe 98 PID 2300 wrote to memory of 276 2300 cmd.exe 98 PID 2300 wrote to memory of 276 2300 cmd.exe 98 PID 4504 wrote to memory of 1964 4504 BlueStacksInstaller.exe 99 PID 4504 wrote to memory of 1964 4504 BlueStacksInstaller.exe 99 PID 4504 wrote to memory of 1964 4504 BlueStacksInstaller.exe 99 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101 PID 1964 wrote to memory of 6348 1964 MSI App Player.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSI APP Player.exe"C:\Users\Admin\AppData\Local\Temp\MSI APP Player.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\7zS49227F77\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS49227F77\BlueStacksInstaller.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\7zS49227F77\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS49227F77\HD-CheckCpu.exe" --cmd checkHypervEnabled3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49227F77\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS49227F77\HD-CheckCpu.exe" --cmd checkSSE43⤵
- Executes dropped EXE
PID:1044
-
-
C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.12.120.6303_msi5.exe"C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.12.120.6303_msi5.exe" -s3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\BlueStacks X_msi5\green.vbs"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c green.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="BlueStacksWeb"6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Cloud Game"6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="BlueStacksWeb" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X_msi5\BlueStacksWeb.exe"6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Cloud Game" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X_msi5\Cloud Game.exe"6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:276
-
-
-
-
-
C:\Users\Admin\AppData\Local\BlueStacksSetup\MSI APP Player.exe"C:\Users\Admin\AppData\Local\BlueStacksSetup\MSI APP Player.exe" -versionMachineID=2f3fd398-05bb-45d9-890f-c2ab0f8cb88c -machineID=a6a4181a-f2be-4474-ba3f-9c4d395bae3e -pddir="C:\ProgramData\BlueStacks_msi5" -defaultImageName=Nougat32 -imageToLaunch=Nougat32 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.0.30.6340 -country=GB -skipBinaryShortcuts3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8216 -
C:\Users\Admin\AppData\Local\Temp\7zS81004FD8\BlueStacksInstaller.exe"C:\Users\Admin\AppData\Local\Temp\7zS81004FD8\BlueStacksInstaller.exe" -versionMachineID=2f3fd398-05bb-45d9-890f-c2ab0f8cb88c -machineID=a6a4181a-f2be-4474-ba3f-9c4d395bae3e -pddir="C:\ProgramData\BlueStacks_msi5" -defaultImageName=Nougat32 -imageToLaunch=Nougat32 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.0.30.6340 -country=GB -skipBinaryShortcuts4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9184 -
C:\Users\Admin\AppData\Local\Temp\7zS81004FD8\HD-CheckCpu.exe"C:\Users\Admin\AppData\Local\Temp\7zS81004FD8\HD-CheckCpu.exe" --cmd checkHypervEnabled5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5448
-
-
-
-
C:\Program Files (x86)\BlueStacks X_msi5\MSI App Player.exe"C:\Program Files (x86)\BlueStacks X_msi5\MSI App Player.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\BlueStacks X_msi5\BlueStacksWeb.exeBlueStacksWeb.exe --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,NetworkServiceInProcess,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,InstalledApp,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --mojo-platform-channel-handle=3700 /prefetch:14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6348
-
-
C:\Program Files (x86)\BlueStacks X_msi5\BlueStacksWeb.exeBlueStacksWeb.exe --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,NetworkServiceInProcess,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,InstalledApp,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3776 /prefetch:14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6200
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD502645676b1a9762d796be495f5c91e91
SHA1e4c8d748ecceab30a77c929ec7a5c3df4f4eacf4
SHA256b260fe85b6793142572efa6827b6ae0312ffc6b79f1de2cb03e4b88a9a9bbbd3
SHA5121b50c1399cd0a37983ebfcbf0e538e2eb481da15dcc3a7d93b201c78915489e539d6eed17c95b366af97a042f90a3350726b585e07b5e4901e20facca25d7ba0
-
Filesize
569B
MD5e7fdf6a9c8cae1fc1108dc5a803a1905
SHA12853f9ff5e63685ebb1449dcf693176b17e4ab60
SHA2568ee5aa84139b2ea5549f7272523aeb203d73954c5ccdcf6f7407bf1a3469f13e
SHA512a6388b24926934e20ccf7fcab41bd219dc6c0053428481d7f466bf89f26bf1a36fdff716a9ddd9ab268df73b04dff1449c6bac1f5c707e31ae2ee71c2087e0d9
-
Filesize
653B
MD5d3dd013e3dca616d3a6c08a6c1b3fd10
SHA11a7a729c4c24710847068e55541390137b29b7c3
SHA2567b191722443d02f3716db38c73ba789fa9cb2adca7c9d2868f59d46eb3f54c52
SHA512d12bc66bf17bf255dece58b5212b4076d1e0007e2d3fe887afbb2c779372be69d2a285df5a01872aa9c7f7a3128000abe489b775fdf1ced0bb744f0d9a83c3eb
-
Filesize
569B
MD53221ac69d7facd8aa90ffa15aea991b0
SHA1e0571f30f4708ec78addc726a743679ca0f05e45
SHA25692aeae68e9e0973d9e0dc575941f1cb2e24afd0574341a46b870be7384eaa537
SHA5125e2de0abfe60a4db16ea5e8739260c19962fbfc60869a77bde6ab3547ad8ee3ad88e74e97da31fa23be096afddad018e431d152d6d0fa21a75357a11dacb1328
-
Filesize
653B
MD502766d9659c7cdcf0c2b079065882df5
SHA1db83f76c1aa3af76de79d5374f7f2442f84225f6
SHA256cfa710391fdf13a97b5d5e202b535eb8367ceda61ed0589fd11f33a10408890d
SHA5129c9040a44d7ad5fcdbee78d4d38007fb61d0954ee94e1f246bbfe0a9f79970cbd29335e3cd4e1a4f9212c83991eadad0bc4f8d5e74c700978f80f553329c726c
-
Filesize
3KB
MD5d3132a0af18f61d3caddd9500c09365c
SHA1fe6ffe81125bc9cc77224e495bde80493f740141
SHA256fb45b68d054668e91b214c94cf1e062d87c9bf6cc3d8c04fba161848cb9e4c52
SHA512ce685bc9830eea4149650aac587a1000a28880c52b00780aedf7f5b4238d963c816114c454dba40dd2d04cbf458c6d6e0451e810409d875b484b60b75d728445
-
Filesize
4KB
MD5581390dd5b38f5b197e7ff5655744ba0
SHA1426df0fb3ba36f5d6860f322b834fbae6b7aac64
SHA256080b70fbe56990912cb06b3ea99ccc9d0bf632b76427e81277b2aca15b696e5c
SHA512d232a000b28083b19014afe7506a6e3323d1769f86e9983b66ec8527a455ba2703387eb07fd0cf00562a3c9dcee57eaae0ecdd6cd66a8c56586f8a29b8fc3441
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
244KB
MD5229f8aea79d2e549cc2daccbb6404e65
SHA13c0f1f826b032dd4a902968a4cb29cb68f3c41bf
SHA2562c95c387a1f60ad967b066610648051d4b337920adf342e480fb20a4aaa9ac2f
SHA512b2b14a6ef95b2a64f3d9d5839287d28b7e95afa78f7ab74be97e43b9ae3caa2aef69fab037c47c56ba62beb263ed3abe9896d51fef231e540aa771c941bae077
-
Filesize
164KB
MD558c2792457abbd7cb5eb8eeff69bb457
SHA172f44d46fa129ec82c238cf6ce6e9d0a6ad27c45
SHA2560d226b76bc35cc209faaec4fa28e83be3db9cc3a7f45d1bd1dbd018526423924
SHA5122c680d9aec47f414912ee60f1b0305f67df1e7181a62a0240c3db36cc16aec78fa5d4d340cb8038167c9c8de46ddc5bc61d17404f894c352689d11ecf75ee540
-
Filesize
57KB
MD5bbc4187abbb2f9a9ae9900c932a5765c
SHA189a3cb9f9c8a0c45405e63b3732c43ba9c144e22
SHA25657e1bdb4cb31bd97a6766042daef89d87ff179f625d0dea038c96351b24b9949
SHA5126860f1f7e776dd8368b5dc6c38485b390b5ceaec4a17c41a4661821f7287a21cd32a8d159c3f0f287c723b83adca5ff930c816d2402e66ddaf2fe52ed59f8e42
-
Filesize
81KB
MD5c6a432755115cd10432bf3a5cd1c09f4
SHA146c9e67a41a72c15db9f280adc0c989cfef93bd4
SHA256a667b801f675c0187d64938b48c193172d2ef233b0be3c2239392773a3966f43
SHA51214095a538662176584ad7b65895327c31d68209dd419e4e3701b9bffbc97eb2005e239efe47d7b64663771c228f7948d64e58440a2fbce4ea641f6a4d4872884
-
Filesize
389KB
MD544e793965fc21f4d7a2df10b87a1523e
SHA16c53e1c21a9ce5a039d1346117b5633e0efc3938
SHA2567de1d80122686b079332c36890f3a0f74a3bd675969936452f137c8b51d06090
SHA51285ab41d8d53ce0f7364fa698d7c55749f9f69cf0af86905e4ead01b1a465c738dfcb2a08b8a546d61a6962daacd275800b78d7d62f031c16e32274e44073968b
-
Filesize
69KB
MD5d7423ad5e5fcc0d5c21df952ae65001e
SHA14e3d75f62345eebba74a60b10aee0a6ec8fc7db8
SHA25614c6ce9596d8532cece793dc91a474eeeb9213e261934a26b5fecb5c97cb4dab
SHA512c0fc94b340d64570cc408aac1d9654b782fafac01768f7277ba5d8ccb69df9d6f5e718b0586de7844a943a4c1b69894376fcd4be246801eea09a8e4223a3654f
-
Filesize
51KB
MD546c679a3023496f18b0cd0c78f6cfe2f
SHA1ae97a79f92f44c54983bfdfeb1c5db725468302d
SHA256cf3cdb9dddfc1bc5c534a7cf4822f21456421a5e000b4eea6d7d44ed8c09a167
SHA512e0f9c90d06b5e880ce27d3abaedf3d206556ae43bfea36b56f8d018066da81730b8648578dc9d56264672197665b8de848dbe69c15faaa5b097abe126182d31e
-
Filesize
201KB
MD5762d651b3659b78aaadd643672f395b4
SHA1475f84a6cb0eda14d196ffae0b05ff224aa25ca1
SHA256b15960fc83e52326bab2318e7d9966a7e2bb749f909a20ec8c79de9e67136588
SHA512a3d62d4841571c5d0a89dc9ca17f3080be8a86e83aa059ba7e2c9e3dd57e7b65ea940f3713fb00f82207914a6a390d138c600a7c8f3cb7c3b1066dee297285df
-
Filesize
65KB
MD5ff8ea563b62ed7f75ce2111cbb99ba21
SHA140b3d1d58be6c4541e09dcc06eab478b655ccf7e
SHA2562532e1afec6209476b87e3c5efc66d83c020a0491cd3c76fb7df9383017e5a11
SHA512f62b26c420cd3a3d60cf361d7313d3742ffb6906cfbd856c8f7d55cd22469be6fce7ae85760acf4696d82e40e01771a95ea48dfbe449318707549e6cae821eb2
-
Filesize
118KB
MD58eab831074a5c3ba808096aa08365c15
SHA1137b86a463f39db6b45bace79ff3187998c0e247
SHA256175aa9c83bf429db91313711fd74b20f0e143486f8e1ec4754b4a04b83d8b850
SHA512e95535132dff4a6ba658932f22024579ad548696491696abd9c6de95752dc1bbafa13ef4cc9e67b6082e9806f201bae7dc5edc2592c7c783aac9a659ce2515e9
-
C:\Users\Admin\AppData\Local\MSI App Player\cache\pcGames\net.wooga.junes_journey_hidden_object_mystery_game
Filesize62KB
MD5e4f93f980309a23162ce2a9e08d46ba8
SHA12b564a0b038a5151762bee0cf617b75912036b97
SHA2564c9c9a4a39686db7d4e510429ef2f500596fb2f5658adb14992b8e219ee26a2a
SHA5127996266438c55d19060d407758200af7540fb88d674fad7f65523d7de353b01bd66002f3c161abd0e53f188bf81ed470516f98bf4e72213b2bf704bf9152c61a
-
Filesize
778B
MD5bb32b6c0cb2fd3b9329f0813e1b4239d
SHA1241b75e5e21aa3e7a6aae5066de65d65db49651f
SHA25677533707194f691af85e6c990d852b949c09018378c8f9d87763b54b1c118f67
SHA512e3aa89c3ba19f4d0a26fc6f3fd725c5201f3609b7e3f91bd8fa1fe95aa8cfdac5d684893ccac3e81b290ad241c048264d12bb1c6aa4b9646e604879b54bb9d33
-
Filesize
659B
MD5f5273eda49f641257ccb5fc5235cee80
SHA1ac2f52d7a0b34facc5cebf4745fb72e15c0e5c8d
SHA256fc88b72393b58799ad747a988b76c1b9d8ce3dbaedfd0463e74d6a33be0878b6
SHA51295457d926dbb7dbcd7c5b30fe6ec45634ab7c0f3dbd5820c8956d21d33a0f5feddc36e0d52d40abbb8b0ba07c005e4594dd56dab1cb278ee3104ec14d8ca921f
-
Filesize
1KB
MD53759fdf92c29556e5740a6282507e1f9
SHA123960cb0edd610083edd8f817c03add5e883453d
SHA2568cd75e91be69cf7cc6e6979c14b394a11fe683be7b62d5163da1073bb568b7d9
SHA512d0773ead77552514a2cd7fd7e55abe730579b4fab24981eb976ac43a821fc5a06ae02626e48dff83a58acb37db23d5527444faf5d4b7cb2fc78df33b065b80d3
-
Filesize
580B
MD507c7f00c7498d32e8045c1a0eda0727d
SHA1bebf52df35cf5a95dd6ff5da778b83c5eafeb052
SHA2568eaab641d186f93f50d2d2bbae6ac5b3c937ca30665bf916321a35c83253eca3
SHA512142752b1ab40a23f654293a15e075321020322fc0f19efdab93e69716cc0ff5dc2148a83f7db149b7dcd8c30b7f542c0f89ac52bd50470e756b07b00ec78f5b9
-
Filesize
353KB
MD549875ca1499a58b4ca9abda4d34adea5
SHA1091155113dd5cf955211fd7a932ecba32f8bf136
SHA25615bde105d61a562560d354614e0254dc4259000d8f610b32be8a965bf26829ca
SHA51208cf0ce98b4c31f5879789f9458f14526fa3483096efd5feeca0f9b477456d80eb542a1e2f5823593e6d7d4d9d106bae0a7a7f096bacb638ee6fcfc67e13623a
-
Filesize
19KB
MD57ad11e07d8f30571debb2a69f77833c2
SHA16351d8968889c6a636abafa2a989b788fd477822
SHA256fe59d96de7342bcbfea62564e92d8e27530fc52c16399399be5f1d6c45340246
SHA5127bc37d326a0d0fcf80231b2e69f3491f7ea8a714fa70b91d5606f9a03054b2c9113b4caf5bb5c980f53c5c73a769a11d1634660cd7c1e1e213124d6b55b2fbc6
-
Filesize
157B
MD5857bcef475b0d4c1d669bf47a143e85e
SHA1072746be2f79c9571ec9b7e3b702a8cdef5a2b66
SHA2568e6e37b79756bfebb943d51d3571926fe4992748c4a673bbb6d78b22e87bc7f6
SHA512b7e236edefe3f4aceefd912f2b6cfcecee034125ff082d3bac5fdf6db57c89dc2dfb4a96897529aed8834a423529680cc0ba1c94d497eb8d9c4f450ff70cf79c
-
Filesize
279B
MD503903fd42ed2ee3cb014f0f3b410bcb4
SHA1762a95240607fe8a304867a46bc2d677f494f5c2
SHA256076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1
SHA5128b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857
-
Filesize
355B
MD5f4c65de79fb292fd6104eb1a160ca09b
SHA152173df03e93433d88b50ebcd7d3bdbc32bd4165
SHA2569ea14db4e8d39be52c9b55a39119d5f95dc331a0559d38de44fd8e72e8677718
SHA512db4bca2ed5582efe9ca27ec67bff59ed2a66c471dc4e4247818e3b79838b57a00cd69d92b709c3a7e0628d7c9e9508335aff877279d30741de18226f0626dced
-
Filesize
321B
MD58b3031b63549708b7ef422da8dfc42a5
SHA146407a76af6ac9887a15bd682533922c4b2d09da
SHA2568355a9b447991ed53c3e1c768f397b622f9535faadb26913e4f2298cc3621c5c
SHA51297b2fe161483b90abafc0bff3e4839f357aa3c0765b1d5d54e5210fcd9d543480eb4ff3671f2706def344ccc83548fe8d064b9ba1bb15abae9e718b87b91298d
-
Filesize
599KB
MD5bb2236d5046a01067d4be45e5a188900
SHA1da71f9f9b3d6b5eb3bc63a43bb21d6ca6aa94846
SHA256b1c4692a370d1871a77d4308d2c65f5507168caf0508e14d9b12bea218f4ba84
SHA5127cf34504b82248275049e272e1afaa5f47d3981f656d7cb9e4791f63823b2dceeadee9f51ada834e7f41467195b93fbc05747067e9786b921787c8fb5c621b90
-
Filesize
324B
MD51b456d88546e29f4f007cd0bf1025703
SHA1e5c444fcfe5baf2ef71c1813afc3f2c1100cab86
SHA256d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb
SHA512c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6
-
Filesize
200KB
MD581234fd9895897b8d1f5e6772a1b38d0
SHA180b2fec4a85ed90c4db2f09b63bd8f37038db0d3
SHA2562e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c
SHA5124c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16
-
Filesize
411KB
MD5f5fd966e29f5c359f78cb61a571d1be4
SHA1a55e7ed593b4bc7a77586da0f1223cfd9d51a233
SHA256d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156
SHA512d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be
-
Filesize
18KB
MD52e67781c074a702af42f2c2259a9e94d
SHA1c40ec186835abd9e8cd1976b0005e57e17c672f2
SHA256858f09be7e462198c0e77b2b84de544158789f53eff200be78eab70a6acadd1a
SHA5124adbf7cb6f1621ed1d3904beaad55eb5229475c9007c7ba41720d9dcc9b3f63c849b9a5cd9aaf86c5a063693b80c1b39fdf41eb2b026f35cd15a5d92d5ce843a
-
Filesize
79KB
MD551e4b1a661b3e96697b54899cb2317de
SHA11cacf6e055023cd2cd7100e2537a6d2dee7d9a84
SHA25687bbd881c9603d6032564b787a85a1c040fc1a2c216f25a1b0b62e26fedcdf69
SHA51255dbe855478a32ba78f15b0611847f609279fe262a7940c024a09378d58e1b84397038847aad03cd113ab5d1e4026fb323fb07d3024e0470f40eefa18949e7d3
-
Filesize
670B
MD526eb04b9e0105a7b121ea9c6601bbf2a
SHA1efc08370d90c8173df8d8c4b122d2bb64c07ccd8
SHA2567aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157
SHA5129df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68
-
Filesize
212B
MD51504b80f2a6f2d3fefc305da54a2a6c2
SHA1432a9d89ebc2f693836d3c2f0743ea5d2077848d
SHA2562f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6
SHA512675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94
-
Filesize
11KB
MD54908fd4ede7b20e3bddb898a4b1dfe87
SHA19eb6b8adea38282ea5e113d86179b15d71f270d7
SHA256b7997801ed63a13e23b0f93f1efd36e8b1d0259a3da7f1932c90a869c2295d58
SHA512478f868c5f72dc54ce31f89eaec6539d0c149bc272ad300d83b61296589ad847001e5c31cf0d5c3f831bfbba3bca3e8469e0c84edf1ef625ef0486ebf6a69c43
-
Filesize
19KB
MD555b1f5fb63896e30d78a14aa4aa3b8df
SHA1e881520cb5c147ab50705529783fe93720d05acc
SHA2567d31195d18d166c76d3ad56044d73ab76c5bd19e92be10c46648c58b776396fa
SHA512239b385f90796a6eb848262d0fd5faeb8cf8bc157e5efecc101d3dca21eb02faabdec835758945d52adc5f410a12c2939c0b926e007c83a250f70d6cd0fc8220
-
Filesize
18KB
MD5a687ad6a55a325cf425fc3d0119a018c
SHA140d32e19ca4943a22f92203d70467911c9a286f3
SHA2569933f4a2f589b874e782eee6fd0518529bdcb9baf2bc72eb6166ff664fdfcb8f
SHA51299b5a9a7762b325b4f8ae355eafbc65b68b73db686fee285f26285fbabcff5caeed77d7ea867133e5160f714f0329e0555faf85ae36a17a874eab175e3630020
-
Filesize
2.5MB
MD5ba8314d202dd3ae7db3b3392d4ec8fe7
SHA165c0499d8c87ab33279413ca83a5231fb4f7f265
SHA25660546e5917de51b290c1b45acaf33f50bdf9aef8bbd3aabfe28975028fc4d7fc
SHA51211ce3b764674b9847866ba760f07137613634395799c0a613da3362f03e514c07318a2ed088daf91a01753a53ce293479e7fcb336a9681d9add349f5e46778f0
-
Filesize
432KB
MD5509715e6a06460142f777ac80652f50b
SHA152ffc1f903015467dc28d7707e6e6f558526e20a
SHA25656cb147d8ada5d266f1e0f7e8745b00cd4756d426ab043bb66a045f98898032f
SHA512afc620f0a007e8055426e971e16d498a030ef8cc7e34f4218b6baed0e204a6da5719751d504033b51f03f803e54f6675d61e1d53996903a73e1f52b4f09f4d0e