General Info

URL

http://d2j5idqr758yu9.cloudfront.net/c92ncu05i~j0g/BlueStacks.exe

Full analysis
https://app.any.run/tasks/5f3c0060-43ae-4484-be79-78123d31a56e
Verdict
Malicious activity
Analysis date
5/15/2019, 01:01:33
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:

loader

adware

installcore

pup

Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
180 seconds
Additional time used
120 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (73.0.3683.75)
  • Google Update Helper (1.3.33.23)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 65.0.2 (x86 en-US) (65.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process
  • BlueStacks_2440883633.exe (PID: 488)
  • BlueStacks_2440883633.exe (PID: 2976)
INSTALLCORE was detected
  • BlueStacks_2440883633.exe (PID: 2976)
Connects to CnC server
  • BlueStacks_2440883633.exe (PID: 2976)
Downloads executable files from the Internet
  • chrome.exe (PID: 2980)
Application launched itself
  • BlueStacks_2440883633.exe (PID: 488)
Cleans NTFS data-stream (Zone Identifier)
  • BlueStacks_2440883633.exe (PID: 488)
Reads internet explorer settings
  • BlueStacks_2440883633.exe (PID: 2976)
Reads Environment values
  • BlueStacks_2440883633.exe (PID: 2976)
Executable content was dropped or overwritten
  • chrome.exe (PID: 2980)
Reads Internet Cache Settings
  • chrome.exe (PID: 2980)
Application launched itself
  • chrome.exe (PID: 2980)
Reads settings of System Certificates
  • chrome.exe (PID: 2980)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
49
Monitored processes
12
Malicious processes
3
Suspicious processes
0

Behavior graph

+
drop and start start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs bluestacks_2440883633.exe no specs #INSTALLCORE bluestacks_2440883633.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2980
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" http://d2j5idqr758yu9.cloudfront.net/c92ncu05i~j0g/BlueStacks.exe
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\samcli.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\hid.dll
c:\windows\system32\propsys.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\d3d11.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\credui.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\winusb.dll
c:\windows\system32\msi.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\mscms.dll
c:\windows\system32\winsta.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\wlanapi.dll
c:\windows\system32\wlanutil.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\wpc.dll
c:\windows\system32\samlib.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\firewallapi.dll
c:\windows\system32\kbdus.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wship6.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\mssprxy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\users\admin\downloads\bluestacks_2440883633.exe
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\mpr.dll

PID
3604
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=73.0.3683.75 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6ebb0f18,0x6ebb0f28,0x6ebb0f34
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll

PID
2792
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2984 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ole32.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_watcher.dll

PID
3888
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=14898389690031520514 --mojo-platform-channel-handle=944 --ignored=" --type=renderer " /prefetch:2
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mf.dll
c:\windows\system32\atl.dll
c:\windows\system32\mfplat.dll
c:\windows\system32\avrt.dll
c:\windows\system32\ksuser.dll
c:\windows\system32\msmpeg2vdec.dll
c:\windows\system32\evr.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\slc.dll
c:\windows\system32\sqmapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\dxva2.dll
c:\program files\google\chrome\application\73.0.3683.75\d3dcompiler_47.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\program files\google\chrome\application\73.0.3683.75\swiftshader\libglesv2.dll
c:\program files\google\chrome\application\73.0.3683.75\swiftshader\libegl.dll

PID
2500
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --service-pipe-token=15642648064140135313 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=15642648064140135313 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1952 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
2968
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --service-pipe-token=12735527877377163818 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12735527877377163818 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1988 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
3736
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --service-pipe-token=12823147836293264646 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12823147836293264646 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
488
CMD
"C:\Users\admin\Downloads\BlueStacks_2440883633.exe"
Path
C:\Users\admin\Downloads\BlueStacks_2440883633.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Kumekured
Description
Desed Setup
Version
5.3.5.2
Modules
Image
c:\users\admin\downloads\bluestacks_2440883633.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\shell32.dll
c:\windows\system32\psapi.dll
c:\windows\system32\mpr.dll
c:\windows\system32\version.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\olepro32.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\propsys.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\sspicli.dll

PID
2976
CMD
"C:\Users\admin\Downloads\BlueStacks_2440883633.exe" /RSF /ppn:YHhybg0dXAt1eGqREw /ads:1 /mnl
Path
C:\Users\admin\Downloads\BlueStacks_2440883633.exe
Indicators
Parent process
BlueStacks_2440883633.exe
User
admin
Integrity Level
HIGH
Version:
Company
Kumekured
Description
Desed Setup
Version
5.3.5.2
Modules
Image
c:\users\admin\downloads\bluestacks_2440883633.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\shell32.dll
c:\windows\system32\psapi.dll
c:\windows\system32\mpr.dll
c:\windows\system32\version.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\olepro32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\winsta.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\mlang.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\msimtf.dll
c:\windows\system32\jscript.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\dxtrans.dll
c:\windows\system32\atl.dll
c:\windows\system32\ddrawex.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\dxtmsft.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll

PID
3964
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=7537698368040147054 --mojo-platform-channel-handle=3920 /prefetch:2
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\mf.dll
c:\windows\system32\atl.dll
c:\windows\system32\mfplat.dll
c:\windows\system32\avrt.dll
c:\windows\system32\ksuser.dll
c:\windows\system32\msmpeg2vdec.dll
c:\windows\system32\evr.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\slc.dll
c:\windows\system32\sqmapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\dxva2.dll

PID
2436
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=6174593297912610751 --mojo-platform-channel-handle=1812 /prefetch:8
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\twext.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\sendmail.dll
c:\windows\system32\zipfldr.dll
c:\windows\system32\fxsresm.dll
c:\program files\winrar\rarext.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\syncui.dll
c:\windows\system32\synceng.dll
c:\program files\notepad++\nppshell_06.dll
c:\windows\system32\acppage.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\msi.dll
c:\windows\system32\wer.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\netutils.dll

PID
3824
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=952,10658757632699496643,17954541270075751283,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=18041421164260398812 --mojo-platform-channel-handle=1816 --ignored=" --type=renderer " /prefetch:8
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
73.0.3683.75
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_child.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

Registry activity

Total events
1377
Read events
1279
Write events
97
Delete events
1

Modification events

PID
Process
Operation
Key
Name
Value
2980
chrome.exe
delete key
HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
failed_count
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
2
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
01000000
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
1
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
1
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome
UsageStatsInSample
0
2980
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
usagestats
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid_installdate
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid_enableddate
0
2980
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumAccounts
aggregate
sum()
2980
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumAccounts
S-1-5-21-1302019708-1500728564-335382590-1000
1
2980
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumSignedIn
aggregate
sum()
2980
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumSignedIn
S-1-5-21-1302019708-1500728564-335382590-1000
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
13202348510254875
2980
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
LanguageList
en-US
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
1C00000001000000E307050002000E00170001003400E10100000000
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\PTimes
C
CD4A1D39A90AD501
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\RLZs
C1
1C1GCEA_enUA812UA812
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\RLZs
C2
1C2GCEA_enUA812
2980
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Common\Rlz\RLZs
C7
1C7GCEA_enUA812
2792
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
2980-13202348509286125
259
488
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
488
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2976
BlueStacks_2440883633.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
LanguageList
en-US
2976
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2976
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASAPI32
EnableFileTracing
0
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASAPI32
EnableConsoleTracing
0
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASAPI32
FileTracingMask
4294901760
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASAPI32
ConsoleTracingMask
4294901760
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASAPI32
MaxFileSize
1048576
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASAPI32
FileDirectory
%windir%\tracing
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASMANCS
EnableFileTracing
0
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASMANCS
EnableConsoleTracing
0
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASMANCS
FileTracingMask
4294901760
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASMANCS
ConsoleTracingMask
4294901760
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASMANCS
MaxFileSize
1048576
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BlueStacks_2440883633_RASMANCS
FileDirectory
%windir%\tracing
2976
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2976
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
Name
BlueStacks_2440883633.exe
2976
BlueStacks_2440883633.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
ID
708992537
2976
BlueStacks_2440883633.exe
write
HKEY_CURRENT_USER\Software\undefined
BlueStacks.exe
1557875087361,http://cdn.bluestacks.com/downloads/3.7.22.2306/BlueStacks-Installer_3.7.22.2306_native.exe
2436
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
LanguageList
en-US
2436
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
@sendmail.dll,-21
Desktop (create shortcut)
2436
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
@zipfldr.dll,-10148
Compressed (zipped) folder
2436
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
@sendmail.dll,-4
Mail recipient
2436
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
@C:\Windows\system32\FXSRESM.dll,-120
Fax recipient

Files activity

Executable files
3
Suspicious files
20
Text files
145
Unknown types
0

Dropped files

PID
Process
Filename
Type
2980
chrome.exe
C:\Users\admin\Downloads\BlueStacks_2440883633.exe
executable
MD5: 686200a8b6afe801ec7e9cd4e9f566cd
SHA256: ccbc2f7d90f113630957411b33f303fc197bd44e6a88e0b5d16e730b73414354
2980
chrome.exe
C:\Users\admin\Downloads\Unconfirmed 543551.crdownload
executable
MD5: 6f9c44e5513b9312f549d80982a64e6f
SHA256: 5eb069c08c8d4adf134f4a29d03d6c9c87b8869a66062665fee89fe67a97893b
2980
chrome.exe
C:\Users\admin\Downloads\Unconfirmed 543551.crdownload
executable
MD5: 686200a8b6afe801ec7e9cd4e9f566cd
SHA256: ccbc2f7d90f113630957411b33f303fc197bd44e6a88e0b5d16e730b73414354
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\BG.png
image
MD5: 335a24011568627de62082173f5fef77
SHA256: e80b2232c24870b3d983d7576dd4bd117f7352b57b72ba61a0295abf4f60d71d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\5A34A768_stp.dat.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF163983.TMP
text
MD5: 4ce05e0a6fd929d141fe7d7f19d13152
SHA256: ae797030037f8842f5f4f33c3cb350c9210c31898595ea404a9eec92649a5c51
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\a3d2d1ed-2329-4ed4-84fb-d0f1e0f7ca60.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: 4ce05e0a6fd929d141fe7d7f19d13152
SHA256: ae797030037f8842f5f4f33c3cb350c9210c31898595ea404a9eec92649a5c51
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF15fdc2.TMP
text
MD5: 4ce05e0a6fd929d141fe7d7f19d13152
SHA256: ae797030037f8842f5f4f33c3cb350c9210c31898595ea404a9eec92649a5c51
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\aff67c49-4b40-4b41-b492-2aeb18ad4e58.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF15fd26.TMP
text
MD5: 4021e87e75bf2202b975cb9c4aaf9f5f
SHA256: fa70287e191a81af35f2c9bc38783c61d10a4b7a9ac2787935b5ee83d94729e8
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: 4021e87e75bf2202b975cb9c4aaf9f5f
SHA256: fa70287e191a81af35f2c9bc38783c61d10a4b7a9ac2787935b5ee83d94729e8
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\af32ac3e-f951-4b8e-885f-4ec2bae207be.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\MANIFEST-000001
binary
MD5: 5af87dfd673ba2115e2fcf5cfdb727ab
SHA256: f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\CURRENT
text
MD5: 46295cac801e5d4857d09837238a6394
SHA256: 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000001.dbtmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF15af06.TMP
text
MD5: 80cfdb6a5fa102bd8cdf5783c429eea5
SHA256: e45cf2f88abd7b199fd18d832047204adfe87ec396575e3fa26367db51a58091
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: 80cfdb6a5fa102bd8cdf5783c429eea5
SHA256: e45cf2f88abd7b199fd18d832047204adfe87ec396575e3fa26367db51a58091
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\b9156c83-dec8-4721-a25d-3619c3a9f99c.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: b10aa13c29a058b7fdd11b4d1d258288
SHA256: 14b812b5f1de51fd7bd0c00bd8a8988f38ba3864221aebe66ede8a3907feec32
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF1587d7.TMP
text
MD5: b10aa13c29a058b7fdd11b4d1d258288
SHA256: 14b812b5f1de51fd7bd0c00bd8a8988f38ba3864221aebe66ede8a3907feec32
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\476d88f8-b211-4084-b21e-cdc3fbd24ec3.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF155127.TMP
text
MD5: f7ebafe128f72b8d0ad0c48d47c5697e
SHA256: 7e8c1596daad2855d2bc8c40aa41f55740a89378b5eb0aa1da9f16751750a5c5
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: f7ebafe128f72b8d0ad0c48d47c5697e
SHA256: 7e8c1596daad2855d2bc8c40aa41f55740a89378b5eb0aa1da9f16751750a5c5
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\8c33b9f0-fb2d-4cda-b853-b9a4f25e79b0.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: 59f9b43e91ce5e0a62104b02955ad113
SHA256: 0adf4cadea70d55121652018b8a75f60a7b49a6e03bf53c9e954b98bd9da74ab
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF1550f8.TMP
text
MD5: 59f9b43e91ce5e0a62104b02955ad113
SHA256: 0adf4cadea70d55121652018b8a75f60a7b49a6e03bf53c9e954b98bd9da74ab
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\fd7b2654-3d29-488a-9cbc-b117abbec1b2.tmp
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\win_TL1_bg[1].png
image
MD5: 68aa012c6ca2c8e190f2d14b37d9334f
SHA256: c933fd38aac49ee23bd57f4a1a82e312c27f660ffd9ed565932422045597478f
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\6D26E1F3_stp\run.vbs
text
MD5: 955baa3656581c015669ecfc2ec0be1c
SHA256: e200fea6dc4155445445fb36e48a1956cc2999c126d90e5fdaac9711164cb7ba
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\logo[1].png
image
MD5: 90ad1e60953aedefc387458b661ad43c
SHA256: ef90c912031cffa7a19e241434da68c41cceed3ba4af0d15676cea0bd2f09f4f
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\6D26E1F3_stp\osutils.vbs
text
MD5: a3fc9218aabeae331e10195f1565fc7c
SHA256: 624281ec5dadce93ea9650c5d8cbca236c04d8848b663978bdaea06d22574614
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\fusion_TL1_bg[1].png
image
MD5: a9c8bf1bb42f7604e5175bc6a4247808
SHA256: 5417c8bc474d9cc0c72160f04d1e32d55da52dc71e89810b247c34dd3faebff6
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\BF_YL\wp24.html
html
MD5: 4e1fbd1b00200772639dfe0dd05d3d3b
SHA256: 211614a416e30dc66ec39726151da58576282745026651d18523f677c669587b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\BF_YL\we23.html
html
MD5: f44fe01996c6ccf478eedf839c9aff9f
SHA256: b9a65628749309eee149cf9d8ea2b02d1e68df74518933aa03fe79d2baa0cf6b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\00154158.log
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\BG_TT[1].png
image
MD5: 1c14a5bf4c130504e920516ee3dd96bc
SHA256: e3a7c7ac59aa60e93ea2aae173a1babbbd7cc82e1da01b98e9992d691438b4a3
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\logo_new[1].png
image
MD5: a0d6deb079e5b8e2f65bdc588699f031
SHA256: 69262e2035f1fd6af19dcc55f5bed3cb375f33753312bee1923b7b8cbfe21bbc
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\6D26E1F3_stp.dat
binary
MD5: ac905fcf33e18cbbb37dc4a6ece849c2
SHA256: 168656b0a807e5fa2c016d637c0c02d83753919ac5a8f493895e9dddce1a916c
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\6D26E1F3_stp.dat.part
binary
MD5: 3f70ac2fbb43431bcad2f7cb586e1cc9
SHA256: 7539ca762ba8e68f7ec7679a1d419f72b465ab8fef30bd2d19fe3ccb3820e548
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\4A197B6A_stp\we23.html
html
MD5: f44fe01996c6ccf478eedf839c9aff9f
SHA256: b9a65628749309eee149cf9d8ea2b02d1e68df74518933aa03fe79d2baa0cf6b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\4A197B6A_stp\wp24.html
html
MD5: 4e1fbd1b00200772639dfe0dd05d3d3b
SHA256: 211614a416e30dc66ec39726151da58576282745026651d18523f677c669587b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\6D26E1F3_stp.dat.tmp
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\BG_LONG[1].png
image
MD5: 72121149768cbc7ff8580d2eab87f14e
SHA256: 436cc0449ec170d975d64e82c325dde87d6b3fd320f62030635d8f62a2f53c61
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\BG_TT_FS[1].png
image
MD5: 0c651b18cdafc82bc59619ff90e49d1a
SHA256: 5aabe4f81591e5a955b805dc260be83224213713764723d8eac80d68614d7a9f
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\BG_TC_N[1].png
image
MD5: 8274d1a3a7d30283d6ff2424a79dc961
SHA256: f2900edbae0a192e4c90a4f0cdb928b5cde934a99ceff5f5dbf512059258f231
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\4A197B6A_stp.dat
binary
MD5: ec97803e3e59311f9aaa382cbd2b4151
SHA256: 50397c464d43ae8761d69a651d0fe1f87e33fe5befe0643cf152dbf1fbe84fc6
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\4A197B6A_stp.dat.part
binary
MD5: 49de36dedc73c57bd034a721e0c73462
SHA256: fb59f79cee5962389a14b9f7495c63525cf0390d406c1a811f194ccf21bd7a0d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\4A197B6A_stp.dat.tmp
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\BG_TC_FS_N[1].png
image
MD5: 5c2a55baeee11c795a397d9c05fa57cc
SHA256: 24d423693dcd1b579bd4d6bc5e61f967db68209a0d301d6d2f80f8e2b15e8a59
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\BG_FS_LONG[1].png
image
MD5: deae9e2f57d4641708544b3db5173525
SHA256: 281d300493dbc6466fbbb3fe047ec59c5ceeda1f9e924ae5798a731ea1e9cfec
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\BG[1].jpg
image
MD5: d4337f9e3cdbb54bd455a9b749954a87
SHA256: 073418db2d5a8fdfc8e29d1ad19090d58064322c3b088757cb2fae616054ea6d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\BG_FS[1].jpg
image
MD5: 7c2ce634bd41d02b70d8aca55e32f1c6
SHA256: f8ece47185b512628bc24f193a509b065b2db5570582f9089904b2917f219383
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\icut.dat
binary
MD5: 576166b408e8218e067a962b6ddf82e8
SHA256: 789fb0f7cd59b46cc27104bf17b9302397d8283c68af327f0e62bfce55d5e34d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\Tefenece_logo_black[1].png
image
MD5: a53385c7239a3a59b0f2a3ccd46bf2bc
SHA256: 64389d10ba157c1cb2644efad182af0c4173745e92559181db697ae50de785b8
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\Jimomoromoj_logo[1].png
image
MD5: a42fffd68be18b8ae986986a71521138
SHA256: 61a11ed258dc9bc734bdd2370d9ab39aeefe8817bf0765f8a66e8ee6dedf1a65
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\bg_comp[1].png
image
MD5: 965619ea661d15494bcabac08d1761f5
SHA256: 8bfc99d5cc3d9cddb44d77160d3c09a3a5ec629cde7bb7d64bd86a023dcbdb73
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\logo_comp[1].png
image
MD5: 61505efafa51406086b32ac885d37807
SHA256: 2eda136d8645862194ef932b7a06714b9c49fc7b884424aa7758358d704b0e97
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\bootstrap_35569.html
html
MD5: 1ea9e5b417811379e874ad4870d5c51a
SHA256: f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\0015298A.log
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\0015296B.log
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\TR.locale
html
MD5: b9ff99ffbbf2b48666c6aca6208a941e
SHA256: 64a4938dba08b07be144e0e3b0def6ea3fd2393f915a8a593c535475a956f433
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\ZH.locale
html
MD5: a7c15758c48c75a716278f744007e052
SHA256: 4c8a0055d3f2ab5cd9f1d512ac5e30f8db1faa4e4c8a7531c48d39f3465895d6
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\SV.locale
html
MD5: 908de9bb44f77de2de8099d0beb3a920
SHA256: a2388e708584f58272c35a67909f5974385836c09759c022882d95f3f9cf9ca8
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\RU.locale
html
MD5: 4f428ca8e27bdc1a92c86701754dda50
SHA256: beeae35eeac6da3094202f771672e8e190e8477383116538d71a822de643aad8
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\ID.locale
html
MD5: ca24b20e4df57666accfe6fb653e46a5
SHA256: 88d731b63f5c2339fd9de224ba62a470086ec8e8bf55e8fb0cf690bcf9576fe3
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\FR.locale
html
MD5: 3bee22c7391a8c6f95df59599bc5571b
SHA256: 0aaacfd9c6ce7a38f17f919985111e6194dcf545c760086f6c788bd510ac29a8
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\NL.locale
html
MD5: 6d5544c9f8f865182bfe2fb4dde5bd25
SHA256: 43825594abebd3d1aba6d4e4c522c30e4c8a6d983de622ec0cc7f9ed1aa805bf
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\FI.locale
html
MD5: 08b48631bfac0057837533b7190ad531
SHA256: 8bd0c0e470a605dc7bebd6a6035479a1113221bff2c62968e350b2d2cf60e986
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\KO.locale
html
MD5: 69aa6897bf3b4aeb45df0777fd2cb980
SHA256: aaf9776eca958f33e054ffdcdb33856626327c027c41577ebb6ef7f383173a71
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\NO.locale
html
MD5: dfd0094a3815aa0dbef05bba1c8238a2
SHA256: 2ee79ae1a3704e3bf970320ee25f02a649ec1a1478d81b22799e6e461541a08d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\PT.locale
html
MD5: aa4a9b603d417a69610703a39d8c75cd
SHA256: 0357ab429e10c0756b460354be1fd6ae16ecc82ee7bfb495385ad191a9904917
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\IT.locale
html
MD5: ba5cd879bd34a728f849eb019ec121b0
SHA256: 778719ed583286c57ea0f6035f080097b3a22661b78e33caa3545f1a50303dbc
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\JA.locale
html
MD5: ac9b17068fbb1ac1a08a698a71d91dcb
SHA256: 107f8a219d0dc41f90eed7472cdef5f35d7113988910f51ba9a27b4a9f7f83c8
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\PL.locale
html
MD5: 9067c36859a5183860172775d8dba3a7
SHA256: 08b1b15250aef33a848ebc621b1b31fc7f0d0473d5ba0060bd1ee8967a3785c1
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\EN.locale
html
MD5: c4832f772b7dccf7f5ac195c8cb24aed
SHA256: b281ba524fc62e213853593185f2342223d41565f18bdb1b242f151439d1e0d9
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\libs\localAssests\icc\icc_v5_8.cis
binary
MD5: d3275dae3b2da9508907b2e97cd72712
SHA256: 9ae11521ced6ba7905386fbbc151c039eb056140d57413103ec0d164e94b9d03
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\DE.locale
html
MD5: 598c9179f7f9551cdb12898e4cb0d156
SHA256: c28db5167426756e180a74b7b85afa0cf4f8ca7b9aa21b4091d8038fece7f15b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\DA.locale
html
MD5: f2a8f005843da5632d9def6b89b3e34d
SHA256: 749420886b9964a73bee5e7137dc446a0a0fcedb267d2bc75bf0cc23212248f4
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\CS.locale
html
MD5: 101dab6f22bfb56fac4729b94b9ca8de
SHA256: 6d9af94772fbcaf49255c6b024832a923f196fc6d6eb330878c8153aeda8fc28
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\libs\localAssests\icut\icut_v2_2.cis
binary
MD5: 6eea368901ea5a93df886508c3fdfb6d
SHA256: 6e7d76f573135648243b15da732272e8e6f0c8948834ec88ac9f9f13045cae8e
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\ES.locale
html
MD5: 195ee63630ce978b60f9a68d03190f8d
SHA256: 326f67fcaa43286eb28406cc1f04737c5b47bfeb889c052ab98e9f340628ff89
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\locale\EL.locale
html
MD5: d4fab8053bb975931b82d7592ec5652e
SHA256: f89f2fda3081ca1b34ec28499ce21592579f073c7c24480ce8f15eaa8f1a1640
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\ProgressBar.png
image
MD5: 48fa7919b2d348dd9ce343c9ab22b299
SHA256: d52573953ec429e4f9c6ba6567d2b0d0832925b63c8517210f3ab9b380a11bbc
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Pause_Button.png
image
MD5: 84b37cb510f50c8fea812eb308d3f03f
SHA256: 7bf800336671204de36b7d1f6ceffdff830040f51d21bc44f220f68d72cf492b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Resume_Button.png
image
MD5: 9d31583bcfad58a6b9ddeaf44549a5e6
SHA256: e466a2db2f755d9eb68619439af37ff4e45559b7a3f476e226ab2a11aeadae1a
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Quick_Specs.png
image
MD5: 07cd59b954e8495ad6cd6a7c11d2de86
SHA256: 6e6b964fd79b4a3461f128e2ed145b9b641d108b8616695f36387661cae995bb
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Progress.png
image
MD5: 04b45069bc9843d14e9f9caa644aae1a
SHA256: 5654476149b7a84dd4d08046d35180567b01e8d87e270d96b12ed40649ec8736
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\sponsored.png
image
MD5: e3758d529f93fee4807f5ea95fbc1a6c
SHA256: 8d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Quick_Specs_small.png
image
MD5: 69f45746301a15eda70a1aab9ebae3d6
SHA256: e86a42253c34f44be26a79f508591a780786c3505c3141a2622bd78a79b97a73
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Color_Button.png
image
MD5: 3e21c454ad120482f2099ce4c44982ec
SHA256: 1ba3bcb175afb99570cb331f8dc88306c7fe14a424a7311e8ccbca5285d51079
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Grey_Button.png
image
MD5: 3e21c454ad120482f2099ce4c44982ec
SHA256: 1ba3bcb175afb99570cb331f8dc88306c7fe14a424a7311e8ccbca5285d51079
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Close_Hover.png
image
MD5: f5bdb3cabdc15580d97fa94aa3397c08
SHA256: b28db98f2a6b06b6783b8fca6aabdcb89234d5bd4306fa71711988dba1fc71ea
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Color_Button_Hover.png
image
MD5: 198593ed7fda78677ebcf6e2576b4bdd
SHA256: 2ce222b53057f8489cf72b71f24fc2fc0f8743569119bf8e57acb1a0595c988c
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Icon_Generic.png
image
MD5: a35aeb077ffa7ffb4382c639743d29cc
SHA256: dccfb478e6097086d886b5a01d120bf511b381982b0975e0c65eab3846e4234d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Grey_Button_Hover.png
image
MD5: 198593ed7fda78677ebcf6e2576b4bdd
SHA256: 2ce222b53057f8489cf72b71f24fc2fc0f8743569119bf8e57acb1a0595c988c
3604
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma
binary
MD5: b59113c2dcd2d346f31a64f231162ada
SHA256: 1d97c69aea85d3b06787458ea47576b192ce5c5db9940e5eaa514ff977ce2dc2
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Close.png
image
MD5: c222a4f3d309721c0898606960120266
SHA256: f638cc042b7ade6f43f2faf0077e020137562e559178396b7e975db39ac13df6
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\images\Loader.gif
image
MD5: afc685139a108e33bd945d5a3ff64122
SHA256: 4d70f45a9c69d8ce2e630214c1b2871454d631ccf9d88976470170d0e106acbc
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\_browse.scss
text
MD5: 6009d6e864f60aea980a9df94c1f7e1c
SHA256: 5ef48a8c8c3771b4f233314d50dd3b5afdcd99dd4b74a9745c8fe7b22207056d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\images\button-bg.png
image
MD5: 98b1de48dfa64dc2aa1e52facfbee3b0
SHA256: 2693930c474fe640e2fe8d6ef98abe2ecd303d2392c3d8b2e006e8942ba8f534
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\_progress-bar.scss
text
MD5: 0dce8b2d152948a7c134bfb98cb09522
SHA256: 2d92f324b5e52b412057b5a7cc428665ee5205d07022c681e99b631d20a5137e
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\_checkbox.scss
text
MD5: 64773c6b0e3413c81aebc46cce8c9318
SHA256: b09504c1bf0486d3ec46500592b178a3a6c39284672af8815c3687cc3d29560d
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\images\progress-bg2.png
image
MD5: b582d9a67bfe77d523ba825fd0b9dae3
SHA256: ab4eeb3ea1eef4e84cb61eccb0ba0998b32108d70b3902df3619f4d9393f74c3
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\_button.scss
text
MD5: cfe3a6bdd0517296eb8217d40a7acb4f
SHA256: 2ee3a84389a7073946f77e3a5c3780caa17e1656e65a953dc0d8b91b89209060
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\images\progress-bg.png
image
MD5: e9f12f92a9eeb8ebe911080721446687
SHA256: c1cf449536bc2778e27348e45f0f53d04c284109199fb7a9af7a61016b91f8bc
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\sdk-ui\images\progress-bg-corner.png
image
MD5: 608f1f20cd6ca9936eaa7e8c14f366be
SHA256: 86b6e6826bcde2955d64d4600a4e01693522c1fddf156ce31c4ba45b3653a7bd
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_lists.scss
text
MD5: bda575f11636073d71b86b89c94c6e42
SHA256: b15b8db0368e31991fbe43c121409484562e20fb9599b5b3828e3093217de163
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_positions.scss
text
MD5: d70ee316e26374f839174916490e937e
SHA256: 3affbaeb6f57451faf94ca9cbcab2504ef75df0e8570aa7be99dd52c9cecb8e7
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_typography.scss
text
MD5: 0d6e99087615172921e0383b0bce87d2
SHA256: a94bd2fb6595faea527116d8d8ee090ff74e89216ef3c9260f5f0b5bfa330e0e
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_margin.scss
text
MD5: e83d43d06045e990e910e494aebae8ae
SHA256: 15484f9e0794f7526e5671615bcdbb436dc7f53012387821d2163ce59fa5e84b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_z-index.scss
text
MD5: 76a55c9ab774e449c10487624ac3f45e
SHA256: 176c81a57205a8496a0a472bdead1de1350beb5fc03ea339703c65d2a29a0b93
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_width-height.scss
text
MD5: dd8af246e3a767aeb684a8272fc7c2c9
SHA256: 86d060bfd279cf4e9cbbaa9a3f444da99339f247af0c9d9e85b109a31474bdd9
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_visibility.scss
text
MD5: 02061aea75eac76fff1d2a8e9607d64c
SHA256: f32292cf3212f83814c985aa82f0f8a0e8dada0aee81cd7401aa3aac08e45bc0
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_padding.scss
text
MD5: 839ce4bba9e717524487b58757ea63da
SHA256: 54c64f48133908b48ed7c739a95b9edca865b3a89bdaa34d29973652c3648ede
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_float.scss
text
MD5: bc5eb91b59a99e0fc439e02f80319975
SHA256: eaf9d36e3e75177e64090ac71c6fcf9bb6465cd21f5c0a5ccb05666033609da8
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_colors.scss
text
MD5: 2da278fbb61e370e0cc9f548e8154e1c
SHA256: 857a73fc1da7cf54525048aa60ec9e2f07328ee1d718a66e3b17186170bb5b5b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_display.scss
text
MD5: 7fc18252c6212f1ebb349b5f7f429217
SHA256: 1b1f774d3b163c1ba9c86cad87d4b594fba588a364132121f8a234f149816429
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_border-radius.scss
text
MD5: 6bdf3fd89410e39d33f8137e04ad4a16
SHA256: 2c6b98cb19c3e3a0e37472767c53df213243ae92bc80ef9a7f5baa17f7b6fa31
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_border.scss
text
MD5: 681fb7eb197e8e7ebd89f828d1181fd6
SHA256: 51e8afa69ed6d92eb82f71939b0b8fd34ef23faecee457698238e5a4f28df984
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_clearfix.scss
text
MD5: add166bc071472dc105f4734d2dcf0e2
SHA256: 75ebe8b4a4cbbac0eb4de35b60972452b4526c56eefb5186dd40a92c70773377
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\_variables.scss
text
MD5: 07922410c30f0117cbc3c140f14aea88
SHA256: af1999b49c03f5dcbb19466466fac2d8172c684c0ff18931b85a8d0a06332c73
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\_helpers.scss
text
MD5: 5f158dbbd9fc4594a2f6c13854501916
SHA256: bf12b79f67f1cb9988797f7d81f6f504c8dfe0f0435482e64819a140dbc8da14
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_align.scss
text
MD5: bbbbd243f9525acc7dc6077010627409
SHA256: 1f11b5f53e0aa7da1a1559a1a5cdd52bf03119ea74e5091462461c550e9288db
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\helpers\_backgrounds.scss
text
MD5: 6092a3768f84cfbc6e5c52301f5b63ea
SHA256: 8a22a3285f3c7d82aa1a4273bdd62729da241723507c1ecd5d2fd0a24c12e23b
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\main.scss
text
MD5: 99ebc4e04a62c2d6ef902a7a66a317e4
SHA256: 847a0258e6a103bb9968f63492c9197297225455104e122e3d32307c4b0d42a4
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\main.css
text
MD5: a6df3c88af303c4a171f04cd2d24801e
SHA256: ebf30cef7123630a76cf8d7eabaff8f1a604a4d7832ff98b417ca0ebdb47a52c
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\swAgent.css
text
MD5: 2543e3af757c7d7c8a26c7cf57795f60
SHA256: c38892a06c8f50c6386ed794af4f1ea3e1897ad5f0c7e19594d9ea7b20cfb3f1
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\_functions.scss
text
MD5: 8f7259de64f6ddf352bf461f44d34a81
SHA256: 80edc9d67172bc830d68d33f4547735fb072cadf3ef25aab37a10b50db87a069
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\form.bmp.Mask
binary
MD5: d2fc989f9c2043cd32332ec0fad69c70
SHA256: 27dd029405cbfb0c3bf8bac517be5db9aa83e981b1dc2bd5c5d6c549fa514101
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\csshover3.htc
html
MD5: 52fa0da50bf4b27ee625c80d36c67941
SHA256: e37e99ddfc73ac7ba774e23736b2ef429d9a0cb8c906453c75b14c029bdd5493
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\ie6_main.scss
text
MD5: d10348d17adf8a90670696728f54562d
SHA256: e8a3d15cf32009b01b9145b6e62ff6caa9c2981f81ce063578c73c7adff08dfc
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\inH138643738288\css\ie6_main.css
text
MD5: ad234e6a62580f62019c78b2a718de00
SHA256: c4f2684f16c8e4553cc29c604a2f505399039638a34e652a7a1acdeb157a0861
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\001527C5.log
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity~RF151595.TMP
text
MD5: a1c4588f82c6a6955edbaa0780895a98
SHA256: eded99b202094f264a5bfd8b6f100393ab9a7f61b8708020607dad0ddf8cf366
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity
text
MD5: a1c4588f82c6a6955edbaa0780895a98
SHA256: eded99b202094f264a5bfd8b6f100393ab9a7f61b8708020607dad0ddf8cf366
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\71d83cc3-d562-410e-88f7-18db4255cc72.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF151278.TMP
text
MD5: 188793bdc6188f694404808278615843
SHA256: db0ffad81ccd1d12017ed69b34e284d51a985f2afc44a6a0ecd5917a845a81ab
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
text
MD5: 188793bdc6188f694404808278615843
SHA256: db0ffad81ccd1d12017ed69b34e284d51a985f2afc44a6a0ecd5917a845a81ab
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\7b492733-5529-473c-ad17-fe66885cd979.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State
text
MD5: d70b36c193444fcd2e5dff40a839b869
SHA256: 77e052db598616da02f27d15f7226d8d616b3191affba3523f426e3b579eb5a6
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF1511fb.TMP
text
MD5: d70b36c193444fcd2e5dff40a839b869
SHA256: 77e052db598616da02f27d15f7226d8d616b3191affba3523f426e3b579eb5a6
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\a0c0176a-a344-4fe3-bee6-1c0a73da8517.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\DownloadMetadata
binary
MD5: 1bd3259d0eab54ea8c1112f5d0c00706
SHA256: 9f71495bd17f2c9543615d00d42a42fcfd45f6a8348ef3adfa65acb2ece457af
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\DownloadMetadata~RF150eee.TMP
binary
MD5: 1bd3259d0eab54ea8c1112f5d0c00706
SHA256: 9f71495bd17f2c9543615d00d42a42fcfd45f6a8348ef3adfa65acb2ece457af
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\e2e28756-1e18-4aa8-aafa-469089bdd231.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\DownloadMetadata
binary
MD5: 627c8b050ac020b25328b857b1923999
SHA256: f5a0c6b4f1b1b74ea4e099c8c2933d3ab5bc0fb3177750082fabfe9ef2671976
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\8be9a941-8a37-4d81-a0d9-ba4ff7772a79.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\Downloads\BlueStacks_2440883633.exe:Zone.Identifier
text
MD5: fbccf14d504b7b2dbcb5a5bda75bd93b
SHA256: eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\CURRENT
text
MD5: 46295cac801e5d4857d09837238a6394
SHA256: 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000001.dbtmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\MANIFEST-000001
binary
MD5: 5af87dfd673ba2115e2fcf5cfdb727ab
SHA256: f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
2976
BlueStacks_2440883633.exe
C:\Users\admin\Downloads\BlueStacks.exe
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\5A34A768_stp.exe
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old
text
MD5: 1c2c4bb805e49e0719deef84894dbb1f
SHA256: 1afb26b8e579f076590e61bb63648bb0230fee4516c08ebe588dfc31efd616da
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old~RF14f02b.TMP
text
MD5: 1c2c4bb805e49e0719deef84894dbb1f
SHA256: 1afb26b8e579f076590e61bb63648bb0230fee4516c08ebe588dfc31efd616da
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old
text
MD5: 1b8036252b09dda7ad0963a5a40e4aba
SHA256: 89e90f5dc88f667b89afa57d04c939a3c7397bb98b9d259766fa452ec297ec06
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF14efec.TMP
text
MD5: 1b8036252b09dda7ad0963a5a40e4aba
SHA256: 89e90f5dc88f667b89afa57d04c939a3c7397bb98b9d259766fa452ec297ec06
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
binary
MD5: f50f89a0a91564d0b8a211f8921aa7de
SHA256: b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
––
MD5:  ––
SHA256:  ––
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\5A34A768_stp.dat
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\Downloads\9d33f9c7-a2b1-4941-99b9-920851d26180.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\CURRENT~RF14edd9.TMP
text
MD5: 206702161f94c5cd39fadd03f4014d98
SHA256: 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\CURRENT
text
MD5: 206702161f94c5cd39fadd03f4014d98
SHA256: 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\000002.dbtmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\MANIFEST-000001
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\000001.dbtmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\data_3
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\data_2
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\data_1
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\data_0
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\index
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT
text
MD5: 904754a73eb4f8a75410a92b2b7a920c
SHA256: c3225bb8babf9823a2daf2bccae0cafc5d3e0857c5f24187dc004f1b2560b4db
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RF14ebe5.TMP
text
MD5: 904754a73eb4f8a75410a92b2b7a920c
SHA256: c3225bb8babf9823a2daf2bccae0cafc5d3e0857c5f24187dc004f1b2560b4db
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
text
MD5: c5a804a5780cfc948a8db73979de968b
SHA256: 2c6f183b3e9dfa1bdf791091ad09cdcb079307d23864dbc07c81f280aa7d9227
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000018.dbtmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\bba3b1ae-e562-4241-8ad6-5251d14aeb71.tmp
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF14ebc6.TMP
text
MD5: c5a804a5780cfc948a8db73979de968b
SHA256: 2c6f183b3e9dfa1bdf791091ad09cdcb079307d23864dbc07c81f280aa7d9227
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old
text
MD5: 70f27bb5ff84782e8065f81ee64e6008
SHA256: fd5dd0c6f1056c6ee6c2d29bd31653abb589e7d528957942e65b3972b7ecb4e9
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF14eb87.TMP
text
MD5: 768258eee3510091c97ade3bca3dc828
SHA256: 1f00cceba22a3fa7d0fffdebb99b95f0dfe19d2cda162abc09fc0d8a6e8ff21d
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
text
MD5: 768258eee3510091c97ade3bca3dc828
SHA256: 1f00cceba22a3fa7d0fffdebb99b95f0dfe19d2cda162abc09fc0d8a6e8ff21d
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
text
MD5: 007e2c8f160468cc5a8b6c225f0ac40c
SHA256: 7f09cf7ac785c12f0062eb23854505c4ed396c6522eca7109b43ad5cc1a5f74b
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
binary
MD5: 9c016064a1f864c8140915d77cf3389a
SHA256: 0e7265d4a8c16223538edd8cd620b8820611c74538e420a88e333be7f62ac787
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0
––
MD5:  ––
SHA256:  ––
2980
chrome.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version
text
MD5: f679598350690f14a2479935d826682b
SHA256: 4e7e1987eaf5ec751eb16b9f7cbae1c55873f1afe8e2b52416ed454f4efbf239
2976
BlueStacks_2440883633.exe
C:\Users\admin\AppData\Local\Temp\in385FFE35\5A34A768_stp.dat.part
binary
MD5: 9c3d6b2210f36959b9f5b06bf6b56baf
SHA256: ec72cc0fa0b2d594a79775942ef06dbfeda0d862413e0807b2a20af26bb8c789

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
29
TCP/UDP connections
23
DNS requests
16
Threats
8

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2980 chrome.exe GET 200 143.204.208.10:80 http://d2j5idqr758yu9.cloudfront.net/c92ncu05i~j0g/BlueStacks.exe US
executable
suspicious
2976 BlueStacks_2440883633.exe POST 200 52.214.73.247:80 http://ww3.lifopp-sacoho.com/ IE
binary
––
––
malicious
2976 BlueStacks_2440883633.exe POST 200 52.212.157.66:80 http://vpn.lifopp-sacoho.com/ IE
binary
text
malicious
2976 BlueStacks_2440883633.exe POST 200 52.214.73.247:80 http://ww3.lifopp-sacoho.com/ IE
binary
––
––
malicious
2976 BlueStacks_2440883633.exe POST 200 52.50.98.206:80 http://api.lifopp-sacoho.com/ IE
binary
binary
malicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Sibarasawi/bg_comp.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Sibarasawi/logo_comp.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Jimomoromoj/Jimomoromoj_logo.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Tefenece/Tefenece_logo_black.png NL
image
suspicious
2976 BlueStacks_2440883633.exe HEAD 200 85.159.237.103:80 http://server.lifopp-sacoho.com/ofr/Niniwic/YL/Niniwic_Tefenece_12Apr16 NL
––
––
malicious
2976 BlueStacks_2440883633.exe GET 200 199.115.112.67:80 http://www2.lifopp-sacoho.com/ofr/Niniwic/YL/Niniwic_Tefenece_12Apr16 US
binary
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG.jpg NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_FS.jpg NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_FS_LONG.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_LONG.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_TC_FS_N.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_TC_N.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 199.115.112.67:80 http://www2.lifopp-sacoho.com/ofr/Solululadul/osutils.cis US
binary
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_TT_FS.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/BG_TT.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/logo_new.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/fusion_TL1_bg.png NL
image
suspicious
2976 BlueStacks_2440883633.exe POST 200 52.214.73.247:80 http://ww3.lifopp-sacoho.com/ IE
binary
––
––
malicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/win_TL1_bg.png NL
image
suspicious
2976 BlueStacks_2440883633.exe GET 200 95.211.184.67:80 http://img.lifopp-sacoho.com/img/Nuhududanew/logo.png NL
image
suspicious
2976 BlueStacks_2440883633.exe POST 200 52.214.73.247:80 http://ww3.lifopp-sacoho.com/ IE
binary
––
––
malicious
2976 BlueStacks_2440883633.exe HEAD 200 192.124.249.114:80 http://cdn.bluestacks.com/downloads/3.7.22.2306/BlueStacks-Installer_3.7.22.2306_native.exe US
––
––
suspicious
2976 BlueStacks_2440883633.exe GET –– 192.124.249.114:80 http://cdn.bluestacks.com/downloads/3.7.22.2306/BlueStacks-Installer_3.7.22.2306_native.exe US
––
––
suspicious
2976 BlueStacks_2440883633.exe GET –– 192.124.249.114:80 http://cdn.bluestacks.com/downloads/3.7.22.2306/BlueStacks-Installer_3.7.22.2306_native.exe US
––
––
suspicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2980 chrome.exe 172.217.18.163:443 Google Inc. US whitelisted
2980 chrome.exe 143.204.208.10:80 US suspicious
–– –– 143.204.208.10:80 US suspicious
2980 chrome.exe 172.217.18.13:443 Google Inc. US whitelisted
2980 chrome.exe 172.217.21.206:443 Google Inc. US whitelisted
2980 chrome.exe 172.217.22.36:443 Google Inc. US whitelisted
–– –– 172.217.18.110:443 Google Inc. US whitelisted
2980 chrome.exe 216.58.207.67:443 Google Inc. US whitelisted
2976 BlueStacks_2440883633.exe 52.214.73.247:80 Amazon.com, Inc. IE malicious
2976 BlueStacks_2440883633.exe 52.212.157.66:80 Amazon.com, Inc. IE malicious
2976 BlueStacks_2440883633.exe 52.50.98.206:80 Amazon.com, Inc. IE malicious
2976 BlueStacks_2440883633.exe 95.211.184.67:80 LeaseWeb Netherlands B.V. NL malicious
2976 BlueStacks_2440883633.exe 85.159.237.103:80 NForce Entertainment B.V. NL malicious
2976 BlueStacks_2440883633.exe 199.115.112.67:80 Leaseweb USA, Inc. US malicious
2976 BlueStacks_2440883633.exe 192.124.249.114:80 Sucuri US malicious
2980 chrome.exe 216.58.210.3:443 Google Inc. US whitelisted
2980 chrome.exe 172.217.23.174:443 Google Inc. US whitelisted

DNS requests

Domain IP Reputation
clientservices.googleapis.com 172.217.18.163
whitelisted
d2j5idqr758yu9.cloudfront.net 143.204.208.10
143.204.208.95
143.204.208.142
143.204.208.211
suspicious
accounts.google.com 172.217.18.13
shared
sb-ssl.google.com 172.217.21.206
whitelisted
www.google.com 172.217.22.36
whitelisted
clients4.google.com 172.217.18.110
whitelisted
ssl.gstatic.com 216.58.207.67
whitelisted
ww3.lifopp-sacoho.com 52.214.73.247
54.194.149.175
malicious
vpn.lifopp-sacoho.com 52.212.157.66
18.203.190.76
52.209.116.64
malicious
api.lifopp-sacoho.com 52.50.98.206
52.31.245.195
52.51.129.59
malicious
img.lifopp-sacoho.com 95.211.184.67
suspicious
server.lifopp-sacoho.com 85.159.237.103
unknown
www2.lifopp-sacoho.com 199.115.112.67
suspicious
cdn.bluestacks.com 192.124.249.114
suspicious
www.gstatic.com 216.58.210.3
whitelisted
clients1.google.com 172.217.23.174
whitelisted

Threats

PID Process Class Message
2980 chrome.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
2980 chrome.exe Misc activity ET INFO EXE - Served Attached HTTP
2976 BlueStacks_2440883633.exe Misc activity ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
2976 BlueStacks_2440883633.exe Misc activity ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
2976 BlueStacks_2440883633.exe Misc activity ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
2976 BlueStacks_2440883633.exe Misc activity ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
2976 BlueStacks_2440883633.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP

1 ETPRO signatures available at the full report

Debug output strings

No debug info.