Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 19:13

General

  • Target

    BlueStacksInstaller_5.21.600.1019_native_37af3e2585987908aa6f7b6cf80f61e7_MDs1LDM7MTUsMTsxNSw0OzE1LA==.exe

  • Size

    913KB

  • MD5

    86b016ee6a71a5219f56779885f691ef

  • SHA1

    1a40a93403e1004f7f8033c5afee8196db16700a

  • SHA256

    a56fd8aa5ffdaddaf58e4fbe8cbb2359fd11f2a93f34d9d0df610baf96972207

  • SHA512

    9f9860782ad93a3a43a9d4509635ac5a08317d3ee60ae314ebdaf4b61855c0a697ca0e5561b5452040763bec719394baaaa1ac4c23c00842be4806ab4dde42a7

  • SSDEEP

    12288:tivtCXQd0gjKX7zuqGKY5Ha3z1cNoaMq+zfxUEwOwGPaGb4hmsLBeJs0RXfGPtRF:tivtCXWeGKY81Oq8wX5RXfGPTSKdvaU

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 17 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlueStacksInstaller_5.21.600.1019_native_37af3e2585987908aa6f7b6cf80f61e7_MDs1LDM7MTUsMTsxNSw0OzE1LA==.exe
    "C:\Users\Admin\AppData\Local\Temp\BlueStacksInstaller_5.21.600.1019_native_37af3e2585987908aa6f7b6cf80f61e7_MDs1LDM7MTUsMTsxNSw0OzE1LA==.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\BlueStacksInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\BlueStacksInstaller.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\HD-CheckCpu.exe" --cmd checkHypervEnabled
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4868
      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\HD-CheckCpu.exe" --cmd checkSSE4
        3⤵
        • Executes dropped EXE
        PID:2312
      • C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.600.1019_nxt.exe
        "C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.600.1019_nxt.exe" -s
        3⤵
        • Checks computer location settings
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\BlueStacks X\green.vbs"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:6412
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c green.bat
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:6488
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall delete rule name="BlueStacksWeb"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6572
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall delete rule name="Cloud Game"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6648
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="BlueStacksWeb" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\BlueStacksWeb.exe"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6720
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="Cloud Game" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\Cloud Game.exe"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:6784
      • C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacksInstaller_5.21.600.1019_native_37af3e2585987908aa6f7b6cf80f61e7_MDs1LDM7MTUsMTsxNSw0OzE1LA==.exe
        "C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacksInstaller_5.21.600.1019_native_37af3e2585987908aa6f7b6cf80f61e7_MDs1LDM7MTUsMTsxNSw0OzE1LA==.exe" -versionMachineID=6b110b44-8474-4776-8873-6ac16999d922 -machineID=fe173be2-e75e-401d-b1fb-ded775d6e875 -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Nougat32 -imageToLaunch=Nougat32 -isSSE4Available=1 -appToLaunch=bs5 -bsxVersion=10.41.600.1015 -country=GB -isWalletFeatureEnabled
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:6956
        • C:\Users\Admin\AppData\Local\Temp\7zSC2B3B979\BlueStacksInstaller.exe
          "C:\Users\Admin\AppData\Local\Temp\7zSC2B3B979\BlueStacksInstaller.exe" -versionMachineID=6b110b44-8474-4776-8873-6ac16999d922 -machineID=fe173be2-e75e-401d-b1fb-ded775d6e875 -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Nougat32 -imageToLaunch=Nougat32 -isSSE4Available=1 -appToLaunch=bs5 -bsxVersion=10.41.600.1015 -country=GB -isWalletFeatureEnabled
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:7404
          • C:\Users\Admin\AppData\Local\Temp\7zSC2B3B979\HD-CheckCpu.exe
            "C:\Users\Admin\AppData\Local\Temp\7zSC2B3B979\HD-CheckCpu.exe" --cmd checkHypervEnabled
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:7524
  • C:\ProgramData\BlueStacksServicesSetup.exe
    "C:\ProgramData\BlueStacksServicesSetup.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:7612
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq BlueStacksServices.exe" | find "BlueStacksServices.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:7704
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq BlueStacksServices.exe"
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:7756
      • C:\Windows\SysWOW64\find.exe
        find "BlueStacksServices.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:7764
  • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
    "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --hidden --initialLaunch
    1⤵
    • Adds Run key to start application
    • Checks computer location settings
    • Drops file in System32 directory
    • Executes dropped EXE
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5760
    • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
      "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1736,i,316497326302899999,948044775098825017,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
      • Executes dropped EXE
      PID:5916
    • C:\Windows\system32\cscript.exe
      cscript.exe
      2⤵
        PID:5932
      • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
        "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --mojo-platform-channel-handle=1780 --field-trial-handle=1736,i,316497326302899999,948044775098825017,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
        • Executes dropped EXE
        PID:5856
      • C:\Windows\system32\cscript.exe
        cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\BlueStacksServices
        2⤵
          PID:6036
        • C:\Windows\system32\cscript.exe
          cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\BlueStacksServices
          2⤵
            PID:8384
          • C:\Windows\system32\cscript.exe
            cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regPutValue.wsf A
            2⤵
              PID:8292
            • C:\Windows\system32\cscript.exe
              cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regPutValue.wsf A
              2⤵
                PID:9864
              • C:\Windows\system32\cscript.exe
                cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                2⤵
                  PID:8448
                • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
                  "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --app-user-model-id=com.bluestacks.services --app-path="C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2700 --field-trial-handle=1736,i,316497326302899999,948044775098825017,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                  2⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  PID:8608
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                  2⤵
                    PID:9424
                    • C:\Windows\system32\tasklist.exe
                      tasklist /FI "IMAGENAME eq HD-Player.exe"
                      3⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:9796
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                    2⤵
                      PID:9388
                      • C:\Windows\system32\tasklist.exe
                        tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                        3⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:9744
                    • C:\Windows\system32\cscript.exe
                      cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                      2⤵
                        PID:9476
                      • C:\Windows\system32\cscript.exe
                        cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                        2⤵
                          PID:9496
                        • C:\Windows\system32\cscript.exe
                          cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                          2⤵
                            PID:9516
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                            2⤵
                              PID:10076
                              • C:\Windows\system32\tasklist.exe
                                tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                3⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:10204
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                              2⤵
                                PID:8952
                                • C:\Windows\system32\tasklist.exe
                                  tasklist /FI "IMAGENAME eq HD-Player.exe"
                                  3⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:9048
                              • C:\Windows\system32\cscript.exe
                                cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                2⤵
                                  PID:9028
                                • C:\Windows\system32\cscript.exe
                                  cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                  2⤵
                                    PID:10148
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                    2⤵
                                      PID:2096
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:896
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                      2⤵
                                        PID:4488
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist /FI "IMAGENAME eq HD-Player.exe"
                                          3⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:548
                                      • C:\Windows\system32\cscript.exe
                                        cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                                        2⤵
                                          PID:6272
                                        • C:\Windows\system32\cscript.exe
                                          cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                          2⤵
                                            PID:6348
                                          • C:\Windows\system32\cscript.exe
                                            cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                                            2⤵
                                              PID:6380
                                            • C:\Windows\system32\cscript.exe
                                              cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                              2⤵
                                                PID:4896
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                2⤵
                                                  PID:6612
                                                  • C:\Windows\system32\tasklist.exe
                                                    tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                    3⤵
                                                    • Enumerates processes with tasklist
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2272
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                  2⤵
                                                    PID:6580
                                                    • C:\Windows\system32\tasklist.exe
                                                      tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                      3⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6684
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                    2⤵
                                                      PID:6524
                                                      • C:\Windows\system32\tasklist.exe
                                                        tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                        3⤵
                                                        • Enumerates processes with tasklist
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3664
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                      2⤵
                                                        PID:6520
                                                        • C:\Windows\system32\tasklist.exe
                                                          tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                          3⤵
                                                          • Enumerates processes with tasklist
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3152
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                        2⤵
                                                          PID:2628
                                                          • C:\Windows\system32\tasklist.exe
                                                            tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                            3⤵
                                                            • Enumerates processes with tasklist
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5060
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                          2⤵
                                                            PID:6852
                                                            • C:\Windows\system32\tasklist.exe
                                                              tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                              3⤵
                                                              • Enumerates processes with tasklist
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4556
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                            2⤵
                                                              PID:5412
                                                              • C:\Windows\system32\tasklist.exe
                                                                tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                                3⤵
                                                                • Enumerates processes with tasklist
                                                                PID:7012
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                              2⤵
                                                                PID:6880
                                                                • C:\Windows\system32\tasklist.exe
                                                                  tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                                  3⤵
                                                                  • Enumerates processes with tasklist
                                                                  PID:7004
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                                2⤵
                                                                  PID:7076
                                                                  • C:\Windows\system32\tasklist.exe
                                                                    tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                                    3⤵
                                                                    • Enumerates processes with tasklist
                                                                    PID:3396
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                                  2⤵
                                                                    PID:2072
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                                      3⤵
                                                                      • Enumerates processes with tasklist
                                                                      PID:7172

                                                                Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Program Files (x86)\BlueStacks X\BlueStacks X.exe

                                                                        Filesize

                                                                        481KB

                                                                        MD5

                                                                        39ed2ccd44b675779a3c52d770959590

                                                                        SHA1

                                                                        edcec83de7a2c152ce07e444ddcd2382deca6e33

                                                                        SHA256

                                                                        03d75c338a4ae5c94bba108783a41fff403a91bb08fbe6d9c82856b092e72f35

                                                                        SHA512

                                                                        9fd7843c944a5e642a4136823664a7e981305baa7e6ca7d2646a8a8669aa62b41203e3e9babb4c789e80bccd888e6041cba13b047c9904d3a21d037221cd2cc8

                                                                      • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_disabled.svg

                                                                        Filesize

                                                                        569B

                                                                        MD5

                                                                        e7fdf6a9c8cae1fc1108dc5a803a1905

                                                                        SHA1

                                                                        2853f9ff5e63685ebb1449dcf693176b17e4ab60

                                                                        SHA256

                                                                        8ee5aa84139b2ea5549f7272523aeb203d73954c5ccdcf6f7407bf1a3469f13e

                                                                        SHA512

                                                                        a6388b24926934e20ccf7fcab41bd219dc6c0053428481d7f466bf89f26bf1a36fdff716a9ddd9ab268df73b04dff1449c6bac1f5c707e31ae2ee71c2087e0d9

                                                                      • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_hover.svg

                                                                        Filesize

                                                                        653B

                                                                        MD5

                                                                        76166804e6ce35e8a0c92917b8abc071

                                                                        SHA1

                                                                        8bd38726a11a9633ac937b9c6f205ce5d36348b0

                                                                        SHA256

                                                                        1bca2e912184b8168ee8961de68d1d839f4f9827fde6f48ab100fb61e82eff90

                                                                        SHA512

                                                                        93c4f1af7e9f89091a207ab308e05ddd4c92406c039f7465d3b8aca7e0cc7a6c922a22e1eee2f5c88db5e89016ef69294b2a0905d7d6a90fd32835bc11929005

                                                                      • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_normal.svg

                                                                        Filesize

                                                                        569B

                                                                        MD5

                                                                        3221ac69d7facd8aa90ffa15aea991b0

                                                                        SHA1

                                                                        e0571f30f4708ec78addc726a743679ca0f05e45

                                                                        SHA256

                                                                        92aeae68e9e0973d9e0dc575941f1cb2e24afd0574341a46b870be7384eaa537

                                                                        SHA512

                                                                        5e2de0abfe60a4db16ea5e8739260c19962fbfc60869a77bde6ab3547ad8ee3ad88e74e97da31fa23be096afddad018e431d152d6d0fa21a75357a11dacb1328

                                                                      • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_pressed.svg

                                                                        Filesize

                                                                        653B

                                                                        MD5

                                                                        dfddf8d0788988c3e48fcbfb2a76cd20

                                                                        SHA1

                                                                        463bb61f0012289e860c32f1885a3a8f57467f2e

                                                                        SHA256

                                                                        9585f41eb6202e89f2087266fa31852d7f41ca8cc659b907c96753fe165f937d

                                                                        SHA512

                                                                        e708c5114c60f7574589d6a56c9faedda26ee4a40f0eeb25f5e12eadcf790f24fdbf393fa0aa6ad449b5337d625b092d6f8822472fa8a6ce1339aca59c50c3ca

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\backicon.png

                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        7ff5dc8270b5fa7ef6c4a1420bd67a7f

                                                                        SHA1

                                                                        b224300372feaa97d882ca2552b227c0f2ef4e3e

                                                                        SHA256

                                                                        fa64884054171515e97b78aaa1aad1ec5baa9d1daf9c682e0b3fb4a41a9cb1c1

                                                                        SHA512

                                                                        f0d5a842a01b99f189f3d46ab59d2c388a974951b042b25bbce54a15f5a3f386984d19cfca22ba1440eebd79260066a37dfeff6cb0d1332fca136add14488eef

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\change_hover.png

                                                                        Filesize

                                                                        310B

                                                                        MD5

                                                                        57092634754fc26e5515e3ed5ca7d461

                                                                        SHA1

                                                                        3ae4d01db9d6bba535f5292298502193dfc02710

                                                                        SHA256

                                                                        8e5847487da148ebb3ea029cc92165afd215cdc08f7122271e13eb37f94e6dc1

                                                                        SHA512

                                                                        553baf9967847292c8e9249dc3b1d55069f51c79f4d1d3832a0036e79691f433a3ce8296a68c774b5797caf7000037637ce61b8365885d2a4eed3ff0730e5e2a

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\close_red.png

                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        93216b2f9d66d423b3e1311c0573332d

                                                                        SHA1

                                                                        5efaebec5f20f91f164f80d1e36f98c9ddaff805

                                                                        SHA256

                                                                        d0b6d143642d356b40c47459a996131a344cade6bb86158f1b74693426b09bfb

                                                                        SHA512

                                                                        922a7292de627c5e637818556d25d9842a88e89f2b198885835925679500dfd44a1e25ce79e521e63c4f84a6b0bd6bf98e46143ad8cee80ecdbaf3d3bc0f3a32

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\custom.png

                                                                        Filesize

                                                                        17KB

                                                                        MD5

                                                                        03b17f0b1c067826b0fcc6746cced2cb

                                                                        SHA1

                                                                        e07e4434e10df4d6c81b55fceb6eca2281362477

                                                                        SHA256

                                                                        fbece8bb5f4dfa55dcfbf41151b10608af807b9477e99acf0940954a11e68f7b

                                                                        SHA512

                                                                        67c78ec01e20e9c8d9cdbba665bb2fd2bb150356f30b88d3d400bbdb0ae92010f5d7bcb683dcf6f895722a9151d8e669d8bef913eb6e728ba56bb02f264573b2

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\installer_bg.jpg

                                                                        Filesize

                                                                        78KB

                                                                        MD5

                                                                        3478e24ba1dd52c80a0ff0d43828b6b5

                                                                        SHA1

                                                                        b5b13bbf3fb645efb81d3562296599e76a2abac0

                                                                        SHA256

                                                                        4c7471c986e16de0cd451be27d4b3171e595fe2916b4b3bf7ca52df6ec368904

                                                                        SHA512

                                                                        5c8c9cc76d6dbc7ce482d0d1b6c2f3d48a7a510cd9ed01c191328763e1bccb56daeb3d18c33a9b10ac7c9780127007aa13799fa82d838de27fbe0a02ad98119d

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\installer_logo.png

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        e33432b5d6dafb8b58f161cf38b8f177

                                                                        SHA1

                                                                        d7f520887ce1bfa0a1abd49c5a7b215c24cbbf6a

                                                                        SHA256

                                                                        9f3104493216c1fa114ff935d23e3e41c7c3511792a30b10a40b507936c0d183

                                                                        SHA512

                                                                        520dc99f3176117ebc28da5ef5439b132486ef67d02fa17f28b7eab0c59db0fa99566e44c0ca7bb75c9e7bd5244e4a23d87611a55c841c6f9c9776e457fb1cbf

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\installer_minimize.png

                                                                        Filesize

                                                                        113B

                                                                        MD5

                                                                        38b539a1e4229738e5c196eedb4eb225

                                                                        SHA1

                                                                        f027b08dce77c47aaed75a28a2fce218ff8c936c

                                                                        SHA256

                                                                        a064f417e3c2b8f3121a14bbded268b2cdf635706880b7006f931de31476bbc2

                                                                        SHA512

                                                                        2ce433689a94fae454ef65e0e9ec33657b89718bbb5a038bf32950f6d68722803922f3a427278bad432395a1716523e589463fcce4279dc2a895fd77434821cc

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\loader.png

                                                                        Filesize

                                                                        279B

                                                                        MD5

                                                                        03903fd42ed2ee3cb014f0f3b410bcb4

                                                                        SHA1

                                                                        762a95240607fe8a304867a46bc2d677f494f5c2

                                                                        SHA256

                                                                        076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1

                                                                        SHA512

                                                                        8b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Assets\setpath.png

                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        b2e7f40179744c74fded932e829cb12a

                                                                        SHA1

                                                                        a0059ab8158a497d2cf583a292b13f87326ec3f0

                                                                        SHA256

                                                                        5bbb2f41f9f3a805986c3c88a639bcc22d90067d4b8de9f1e21e3cf9e5c1766b

                                                                        SHA512

                                                                        b95b7ebdb4a74639276eaa5c055fd8d9431e2f58a5f7c57303f7cf22e8b599f6f2a7852074cf71b19b49eb31cc9bf2509aedf41d608981d116e49a00030c797c

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\BlueStacksInstaller.exe

                                                                        Filesize

                                                                        629KB

                                                                        MD5

                                                                        0d021ad9fc86a22215cd014b088f307e

                                                                        SHA1

                                                                        531e18244b9a43798562c1297c09ccc0239adb61

                                                                        SHA256

                                                                        c14eb1c61d737e195ce06cb84ba2b05925dcf36ac35c1078f260e423b1ad3485

                                                                        SHA512

                                                                        e5d977d5a3f5a5888e054521168a9ac22712892d5aea225a6f545e9be885deef1983fbcd963927367b2d7439c18b2e6c71a6b143a924a41f5acabc76e0a6e993

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\BlueStacksInstaller.exe.config

                                                                        Filesize

                                                                        324B

                                                                        MD5

                                                                        1b456d88546e29f4f007cd0bf1025703

                                                                        SHA1

                                                                        e5c444fcfe5baf2ef71c1813afc3f2c1100cab86

                                                                        SHA256

                                                                        d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb

                                                                        SHA512

                                                                        c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\HD-CheckCpu.exe

                                                                        Filesize

                                                                        200KB

                                                                        MD5

                                                                        81234fd9895897b8d1f5e6772a1b38d0

                                                                        SHA1

                                                                        80b2fec4a85ed90c4db2f09b63bd8f37038db0d3

                                                                        SHA256

                                                                        2e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c

                                                                        SHA512

                                                                        4c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\JSON.dll

                                                                        Filesize

                                                                        411KB

                                                                        MD5

                                                                        f5fd966e29f5c359f78cb61a571d1be4

                                                                        SHA1

                                                                        a55e7ed593b4bc7a77586da0f1223cfd9d51a233

                                                                        SHA256

                                                                        d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156

                                                                        SHA512

                                                                        d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\Locales\i18n.en-US.txt

                                                                        Filesize

                                                                        20KB

                                                                        MD5

                                                                        a1e3293265a273080e68501ffdb9c2fc

                                                                        SHA1

                                                                        add264c4a560ce5803ca7b19263f8cd3ed6f68f0

                                                                        SHA256

                                                                        1cb847f640d0b2b363ce3c44872c4227656e8d2f1b4a5217603a62d802f0581f

                                                                        SHA512

                                                                        cb61083dc4d7d86f855a4cc3fe7c4938232a55188ad08b028a12445675fbff6188bb40638bd1ce4e6077f5bfc94449c145118c8f9b8929d4e9c47ed74cf7bece

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS4A3DDAA7\ThemeFile

                                                                        Filesize

                                                                        80KB

                                                                        MD5

                                                                        c3e6bab4f92ee40b9453821136878993

                                                                        SHA1

                                                                        94493a6b3dfb3135e5775b7d3be227659856fbc4

                                                                        SHA256

                                                                        de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6

                                                                        SHA512

                                                                        a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC2B3B979\Assets\exit_close.png

                                                                        Filesize

                                                                        670B

                                                                        MD5

                                                                        26eb04b9e0105a7b121ea9c6601bbf2a

                                                                        SHA1

                                                                        efc08370d90c8173df8d8c4b122d2bb64c07ccd8

                                                                        SHA256

                                                                        7aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157

                                                                        SHA512

                                                                        9df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68

                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC2B3B979\Assets\minimize_progress.png

                                                                        Filesize

                                                                        212B

                                                                        MD5

                                                                        1504b80f2a6f2d3fefc305da54a2a6c2

                                                                        SHA1

                                                                        432a9d89ebc2f693836d3c2f0743ea5d2077848d

                                                                        SHA256

                                                                        2f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6

                                                                        SHA512

                                                                        675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94

                                                                      • C:\Users\Admin\AppData\Local\Temp\nso33B9.tmp\Registry.dll

                                                                        Filesize

                                                                        24KB

                                                                        MD5

                                                                        2b7007ed0262ca02ef69d8990815cbeb

                                                                        SHA1

                                                                        2eabe4f755213666dbbbde024a5235ddde02b47f

                                                                        SHA256

                                                                        0b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d

                                                                        SHA512

                                                                        aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca

                                                                      • C:\Users\Admin\AppData\Local\Temp\nso33B9.tmp\StdUtils.dll

                                                                        Filesize

                                                                        100KB

                                                                        MD5

                                                                        c6a6e03f77c313b267498515488c5740

                                                                        SHA1

                                                                        3d49fc2784b9450962ed6b82b46e9c3c957d7c15

                                                                        SHA256

                                                                        b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

                                                                        SHA512

                                                                        9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

                                                                      • C:\Users\Admin\AppData\Local\Temp\nso33B9.tmp\System.dll

                                                                        Filesize

                                                                        12KB

                                                                        MD5

                                                                        0d7ad4f45dc6f5aa87f606d0331c6901

                                                                        SHA1

                                                                        48df0911f0484cbe2a8cdd5362140b63c41ee457

                                                                        SHA256

                                                                        3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                                                                        SHA512

                                                                        c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

                                                                      • C:\Users\Admin\AppData\Local\Temp\nso33B9.tmp\WinShell.dll

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        1cc7c37b7e0c8cd8bf04b6cc283e1e56

                                                                        SHA1

                                                                        0b9519763be6625bd5abce175dcc59c96d100d4c

                                                                        SHA256

                                                                        9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

                                                                        SHA512

                                                                        7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nso33B9.tmp\nsExec.dll

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        ec0504e6b8a11d5aad43b296beeb84b2

                                                                        SHA1

                                                                        91b5ce085130c8c7194d66b2439ec9e1c206497c

                                                                        SHA256

                                                                        5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

                                                                        SHA512

                                                                        3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

                                                                      • C:\Users\Admin\AppData\Local\Temp\nso33B9.tmp\nsis7z.dll

                                                                        Filesize

                                                                        424KB

                                                                        MD5

                                                                        80e44ce4895304c6a3a831310fbf8cd0

                                                                        SHA1

                                                                        36bd49ae21c460be5753a904b4501f1abca53508

                                                                        SHA256

                                                                        b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

                                                                        SHA512

                                                                        c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\BgWorker.dll

                                                                        Filesize

                                                                        12KB

                                                                        MD5

                                                                        36c81676ada53ceb99e06693108d8cce

                                                                        SHA1

                                                                        d31fa4aebd584238b3edc4768dd5414494610889

                                                                        SHA256

                                                                        a9e4f7ec65670d2ce375ffaf09b6d07f4cd531132ca002452287a4d540154a38

                                                                        SHA512

                                                                        1300de7b3e1ac9e706e0aad0b70e3e2a21db8c860e05b314a52e63dd66b5dffdf6be1e38ab6ede13bfd3a64631cc909486bf4b1403e7d821e3b566edc514c63c

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\System.dll

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        959ea64598b9a3e494c00e8fa793be7e

                                                                        SHA1

                                                                        40f284a3b92c2f04b1038def79579d4b3d066ee0

                                                                        SHA256

                                                                        03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

                                                                        SHA512

                                                                        5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\nsDialogs.dll

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        f7b92b78f1a00a872c8a38f40afa7d65

                                                                        SHA1

                                                                        872522498f69ad49270190c74cf3af28862057f2

                                                                        SHA256

                                                                        2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

                                                                        SHA512

                                                                        3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\nsDui.dll

                                                                        Filesize

                                                                        3.0MB

                                                                        MD5

                                                                        11b5dc4c5f5c61593479b90e588903e7

                                                                        SHA1

                                                                        18af8549ace57f3d59afa251887a4dc8a4001bbb

                                                                        SHA256

                                                                        8580d6533654e42473fb6f4b5aedf1add6875ed3f84d1e44d7741fef38628aa0

                                                                        SHA512

                                                                        65b96f113b727dd3f563dbb8fc182896540ab94cae166a145c752791d9f5cd358c8e98e694de5bb8bc6a077941421353bde711456d4ee9b2ba7dda543b04b8c6

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\nsis7z.dll

                                                                        Filesize

                                                                        434KB

                                                                        MD5

                                                                        95f6f6ab9509bc366ab9215defe4251a

                                                                        SHA1

                                                                        e3f4a6effd6ca5838cfe91a01967cb72edcc7b0b

                                                                        SHA256

                                                                        a896a9ece055d334d431cd0f856113ab925d9ee86d2dee383c0bfbbef11a5b50

                                                                        SHA512

                                                                        a853f70d2ea7f384df99be067724bf3ca73c63f3c3573c112f5528fc86a96bd34509d934b038e2a81833f3abb3eedbc5894921291139100e01df6e35696c0ecc

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.exc

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        f3b25701fe362ec84616a93a45ce9998

                                                                        SHA1

                                                                        d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                        SHA256

                                                                        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                        SHA512

                                                                        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                      • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        5deaa05a55e71b8482ec6623bf8d3a4f

                                                                        SHA1

                                                                        df49273aa0428cbb998f5ee442b6360b7d9c4b97

                                                                        SHA256

                                                                        4d933442260bd35d7e96c4c1a18409b586d55fb396b6b6acdb2af3751ce48774

                                                                        SHA512

                                                                        cb46fbe92a8f0b6611fc3ade7394bab8777c0e727ee7e7d69734325b77ec801f9fb555ac45493b1bb08ed0dd12b1c61d1c3b29f760d3e79a469694cbb1dad8c1

                                                                      • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                                        Filesize

                                                                        57B

                                                                        MD5

                                                                        51b8737d49c01c3041402fdda00aec3d

                                                                        SHA1

                                                                        8c1616efad46c8b95900533cbac5167476da8ba8

                                                                        SHA256

                                                                        89f4cfb46bbd6b14c21e77d4608db9560f8a5853d2fecd63a8d9b7f58cb9c6bb

                                                                        SHA512

                                                                        305d03734bd5df29e6cd6ab23c7462e1e8bbaf3721dead0417012442923a28ef4349c33454ed0e94d30d6b80898d4ee7ad2bb46c516bc165d81b673431182b9e

                                                                      • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                                        Filesize

                                                                        119B

                                                                        MD5

                                                                        ec12bd498ab4d286db0ea55b9dae4ba2

                                                                        SHA1

                                                                        f3a228c7bc0fc7172352db1cc148ea97747e1320

                                                                        SHA256

                                                                        532cd180359234cc0ff8b2f9c297683db647b8af1f2828fa7534c8d934d21734

                                                                        SHA512

                                                                        a839841da0d56cb7c5948c528ab46ba14d0d9bf57415230f81e105a6bd30707eb894f80201f1e7dba32a73372eb63bcb42bf1030712268bc231fe870490e88ca

                                                                      • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json.tmp-11797328545a284e

                                                                        Filesize

                                                                        92B

                                                                        MD5

                                                                        eac1e45ec32239cb6daefd5b2c432a83

                                                                        SHA1

                                                                        405efd5ad2fdc7334c912aeae2a3fbade79144ed

                                                                        SHA256

                                                                        b44159321b7c4ce1abb7b1d9e46e969a7b64a48e37def4b05f0d9d502e208034

                                                                        SHA512

                                                                        521b1666295d731f19f45acca185d444e8234961d6bb360e355f8b5bebd94e09b5a7059ea93af6cfbaf9930a771e86903fad86425497ef86adb565b6c6685ebf

                                                                      • C:\Windows\System32\storage.json

                                                                        Filesize

                                                                        5B

                                                                        MD5

                                                                        75d803935059785011954267bdb0814c

                                                                        SHA1

                                                                        2e7c964d7f6d9abae2aee4bcfc2c3a64f9fb4b38

                                                                        SHA256

                                                                        1245552f1e44239aa0dfdc7aa0af24ac1e588d66abaee3ad10ddcb82a229f2ef

                                                                        SHA512

                                                                        6bd607670a9f1702c193f672802678e790bbf3fa385043c08f5eeea7ea7598ee20cc8660f36711e1ecce7c29090b505a938b5b4ab23d1bddad7d94f2c22f39e7

                                                                      • memory/2120-138-0x000000001DE70000-0x000000001E398000-memory.dmp

                                                                        Filesize

                                                                        5.2MB

                                                                      • memory/2120-140-0x000000001DDB0000-0x000000001DDE8000-memory.dmp

                                                                        Filesize

                                                                        224KB

                                                                      • memory/2120-156-0x00007FF91CDF0000-0x00007FF91D8B1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2120-9756-0x00007FF91CDF0000-0x00007FF91D8B1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2120-125-0x00007FF91CDF3000-0x00007FF91CDF5000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/2120-155-0x00007FF91CDF0000-0x00007FF91D8B1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2120-154-0x00007FF91CDF3000-0x00007FF91CDF5000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/2120-150-0x0000000021740000-0x0000000021748000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/2120-141-0x000000001DB40000-0x000000001DB4E000-memory.dmp

                                                                        Filesize

                                                                        56KB

                                                                      • memory/2120-126-0x0000000000360000-0x0000000000400000-memory.dmp

                                                                        Filesize

                                                                        640KB

                                                                      • memory/2120-128-0x000000001C6E0000-0x000000001C748000-memory.dmp

                                                                        Filesize

                                                                        416KB

                                                                      • memory/2120-129-0x00007FF91CDF0000-0x00007FF91D8B1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2120-136-0x00007FF91CDF0000-0x00007FF91D8B1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/2120-134-0x00007FF91CDF0000-0x00007FF91D8B1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/5028-9553-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                        Filesize

                                                                        372KB

                                                                      • memory/5028-9799-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                        Filesize

                                                                        372KB

                                                                      • memory/8608-10055-0x00007FF939B50000-0x00007FF939B51000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/8608-10056-0x00007FF93A390000-0x00007FF93A391000-memory.dmp

                                                                        Filesize

                                                                        4KB