Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 23:58

General

  • Target

    BlueStacks10Installer_10.41.511.1001_native_fa284cb9d0037bd42afbc8f9e48bf8b7_MzsxNSwwOzUsMTsxNSw0OzE.exe

  • Size

    912KB

  • MD5

    ef14e6415b7a7f12d64b60db8105a3b8

  • SHA1

    a0fd10b29ace0fb8e8f44f1a1935b70c6f7967e1

  • SHA256

    778b36140159e0a3f3b7a77c83f4ac05125092ae3df5fb1f8e89615de02f8a7e

  • SHA512

    5370293a62063419edfa51d78e21cf0298196df76750f36be2c3530dc4ddbe64e7f1b4a22786a870e7f1589dd8a339e5661b7d24449974636808a60c814fcfca

  • SSDEEP

    24576:qivtCXWeGKI8f7bi72672idirq/qt9t0mO2:PtCXWPAni6QRq7t0n2

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.511.1001_native_fa284cb9d0037bd42afbc8f9e48bf8b7_MzsxNSwwOzUsMTsxNSw0OzE.exe
    "C:\Users\Admin\AppData\Local\Temp\BlueStacks10Installer_10.41.511.1001_native_fa284cb9d0037bd42afbc8f9e48bf8b7_MzsxNSwwOzUsMTsxNSw0OzE.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\BlueStacksInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS034247A7\BlueStacksInstaller.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS034247A7\HD-CheckCpu.exe" --cmd checkHypervEnabled
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2540
      • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\HD-CheckCpu.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS034247A7\HD-CheckCpu.exe" --cmd checkSSE4
        3⤵
        • Executes dropped EXE
        PID:4988
      • C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.511.1001_nxt.exe
        "C:\Users\Admin\AppData\Local\BlueStacksSetup\BSX-Setup-5.21.511.1001_nxt.exe" -s
        3⤵
        • Checks computer location settings
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\BlueStacks X\green.vbs"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:6104
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c green.bat
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5992
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall delete rule name="BlueStacksWeb"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:5944
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall delete rule name="Cloud Game"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:4920
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="BlueStacksWeb" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\BlueStacksWeb.exe"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3112
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="Cloud Game" dir=in action=allow program="C:\Program Files (x86)\BlueStacks X\Cloud Game.exe"
              6⤵
              • Modifies Windows Firewall
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3680
      • C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.511.1001_native_fa284cb9d0037bd42afbc8f9e48bf8b7_MzsxNSwwOzUsMTsxNSw0OzE.exe
        "C:\Users\Admin\AppData\Local\BlueStacksSetup\BlueStacks10Installer_10.41.511.1001_native_fa284cb9d0037bd42afbc8f9e48bf8b7_MzsxNSwwOzUsMTsxNSw0OzE.exe" -versionMachineID=496eb7be-c857-4c3e-8f81-3a3018d9ba86 -machineID=b167c5b2-ec19-4eeb-a444-f7375e27d5a6 -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Pie64 -imageToLaunch=Pie64 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.41.511.1001 -country=GB -skipBinaryShortcuts -isWalletFeatureEnabled
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Users\Admin\AppData\Local\Temp\7zS8D7F35D8\BlueStacksInstaller.exe
          "C:\Users\Admin\AppData\Local\Temp\7zS8D7F35D8\BlueStacksInstaller.exe" -versionMachineID=496eb7be-c857-4c3e-8f81-3a3018d9ba86 -machineID=b167c5b2-ec19-4eeb-a444-f7375e27d5a6 -pddir="C:\ProgramData\BlueStacks_nxt" -defaultImageName=Pie64 -imageToLaunch=Pie64 -isSSE4Available=1 -appToLaunch=bsx -bsxVersion=10.41.511.1001 -country=GB -skipBinaryShortcuts -isWalletFeatureEnabled
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5512
          • C:\Users\Admin\AppData\Local\Temp\7zS8D7F35D8\HD-CheckCpu.exe
            "C:\Users\Admin\AppData\Local\Temp\7zS8D7F35D8\HD-CheckCpu.exe" --cmd checkHypervEnabled
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5580
  • C:\ProgramData\BlueStacksServicesSetup.exe
    "C:\ProgramData\BlueStacksServicesSetup.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5684
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq BlueStacksServices.exe" | find "BlueStacksServices.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:7396
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq BlueStacksServices.exe"
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:7440
      • C:\Windows\SysWOW64\find.exe
        find "BlueStacksServices.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:7448
  • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
    "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --hidden --initialLaunch
    1⤵
    • Adds Run key to start application
    • Checks computer location settings
    • Drops file in System32 directory
    • Executes dropped EXE
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:6812
    • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
      "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1748,i,5587438612163277603,10448847220716100843,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
      • Executes dropped EXE
      PID:5744
    • C:\Windows\system32\cscript.exe
      cscript.exe
      2⤵
        PID:5756
      • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
        "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --mojo-platform-channel-handle=1944 --field-trial-handle=1748,i,5587438612163277603,10448847220716100843,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
        • Executes dropped EXE
        PID:5832
      • C:\Windows\system32\cscript.exe
        cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\BlueStacksServices
        2⤵
          PID:5892
        • C:\Windows\system32\cscript.exe
          cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\BlueStacksServices
          2⤵
            PID:4840
          • C:\Windows\system32\cscript.exe
            cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regPutValue.wsf A
            2⤵
              PID:2256
            • C:\Windows\system32\cscript.exe
              cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regPutValue.wsf A
              2⤵
                PID:6000
              • C:\Windows\system32\cscript.exe
                cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                2⤵
                  PID:5884
                • C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe
                  "C:\Users\Admin\AppData\Local\Programs\bluestacks-services\BlueStacksServices.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\bluestacks-services" --app-user-model-id=com.bluestacks.services --app-path="C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2676 --field-trial-handle=1748,i,5587438612163277603,10448847220716100843,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                  2⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  PID:2464
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                  2⤵
                    PID:948
                    • C:\Windows\system32\tasklist.exe
                      tasklist /FI "IMAGENAME eq HD-Player.exe"
                      3⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2496
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                    2⤵
                      PID:1332
                      • C:\Windows\system32\tasklist.exe
                        tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                        3⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2744
                    • C:\Windows\system32\cscript.exe
                      cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                      2⤵
                        PID:2308
                      • C:\Windows\system32\cscript.exe
                        cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                        2⤵
                          PID:3196
                        • C:\Windows\system32\cscript.exe
                          cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                          2⤵
                            PID:3496
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                            2⤵
                              PID:1808
                              • C:\Windows\system32\tasklist.exe
                                tasklist /FI "IMAGENAME eq HD-Player.exe"
                                3⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5204
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                              2⤵
                                PID:4764
                                • C:\Windows\system32\tasklist.exe
                                  tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                  3⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5288
                              • C:\Windows\system32\cscript.exe
                                cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                2⤵
                                  PID:4896
                                • C:\Windows\system32\cscript.exe
                                  cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                  2⤵
                                    PID:5212
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                    2⤵
                                      PID:7380
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist /FI "IMAGENAME eq HD-Player.exe"
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:7448
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                      2⤵
                                        PID:7456
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                          3⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1360
                                      • C:\Windows\system32\cscript.exe
                                        cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                                        2⤵
                                          PID:7532
                                        • C:\Windows\system32\cscript.exe
                                          cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                          2⤵
                                            PID:7620
                                          • C:\Windows\system32\cscript.exe
                                            cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A "HKCU\SOFTWARE\BlueStacks X"
                                            2⤵
                                              PID:1476
                                            • C:\Windows\system32\cscript.exe
                                              cscript.exe //Nologo C:\Users\Admin\AppData\Local\Programs\bluestacks-services\resources\regedit\vbs\regList.wsf A HKLM\SOFTWARE\BlueStacks_nxt
                                              2⤵
                                                PID:7648
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                2⤵
                                                  PID:7664
                                                  • C:\Windows\system32\tasklist.exe
                                                    tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                    3⤵
                                                    • Enumerates processes with tasklist
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:7696
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                  2⤵
                                                    PID:8168
                                                    • C:\Windows\system32\tasklist.exe
                                                      tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                      3⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:7740
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                    2⤵
                                                      PID:7808
                                                      • C:\Windows\system32\tasklist.exe
                                                        tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                        3⤵
                                                        • Enumerates processes with tasklist
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:7836
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                      2⤵
                                                        PID:7864
                                                        • C:\Windows\system32\tasklist.exe
                                                          tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                          3⤵
                                                          • Enumerates processes with tasklist
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:7908
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq HD-Player.exe""
                                                        2⤵
                                                          PID:8024
                                                          • C:\Windows\system32\tasklist.exe
                                                            tasklist /FI "IMAGENAME eq HD-Player.exe"
                                                            3⤵
                                                            • Enumerates processes with tasklist
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:7960
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "tasklist /FI "IMAGENAME eq BlueStacks X.exe""
                                                          2⤵
                                                            PID:8048
                                                            • C:\Windows\system32\tasklist.exe
                                                              tasklist /FI "IMAGENAME eq BlueStacks X.exe"
                                                              3⤵
                                                              • Enumerates processes with tasklist
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:8084

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Program Files (x86)\BlueStacks X\BlueStacks X.exe

                                                          Filesize

                                                          478KB

                                                          MD5

                                                          fd6484b5da5bd9b6d101c3ba71955a24

                                                          SHA1

                                                          fdb7a50db21e17a072994796fd55c7987bd74abd

                                                          SHA256

                                                          e62c42edd6f08f89d88018a74aed441f52cb7be43abb7142382133e0ad4f7c11

                                                          SHA512

                                                          daad46b56fb09a40e6b32f3ad056a70461e55f3109699bd3d24bf504f95cd54b87f7e53242b86544c13513b5243244705a816851ec518e99ba1ba566e6c2bdad

                                                        • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_disabled.svg

                                                          Filesize

                                                          569B

                                                          MD5

                                                          e7fdf6a9c8cae1fc1108dc5a803a1905

                                                          SHA1

                                                          2853f9ff5e63685ebb1449dcf693176b17e4ab60

                                                          SHA256

                                                          8ee5aa84139b2ea5549f7272523aeb203d73954c5ccdcf6f7407bf1a3469f13e

                                                          SHA512

                                                          a6388b24926934e20ccf7fcab41bd219dc6c0053428481d7f466bf89f26bf1a36fdff716a9ddd9ab268df73b04dff1449c6bac1f5c707e31ae2ee71c2087e0d9

                                                        • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_hover.svg

                                                          Filesize

                                                          653B

                                                          MD5

                                                          76166804e6ce35e8a0c92917b8abc071

                                                          SHA1

                                                          8bd38726a11a9633ac937b9c6f205ce5d36348b0

                                                          SHA256

                                                          1bca2e912184b8168ee8961de68d1d839f4f9827fde6f48ab100fb61e82eff90

                                                          SHA512

                                                          93c4f1af7e9f89091a207ab308e05ddd4c92406c039f7465d3b8aca7e0cc7a6c922a22e1eee2f5c88db5e89016ef69294b2a0905d7d6a90fd32835bc11929005

                                                        • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_normal.svg

                                                          Filesize

                                                          569B

                                                          MD5

                                                          3221ac69d7facd8aa90ffa15aea991b0

                                                          SHA1

                                                          e0571f30f4708ec78addc726a743679ca0f05e45

                                                          SHA256

                                                          92aeae68e9e0973d9e0dc575941f1cb2e24afd0574341a46b870be7384eaa537

                                                          SHA512

                                                          5e2de0abfe60a4db16ea5e8739260c19962fbfc60869a77bde6ab3547ad8ee3ad88e74e97da31fa23be096afddad018e431d152d6d0fa21a75357a11dacb1328

                                                        • C:\Program Files (x86)\BlueStacks X\image\LocalAPK\close_pressed.svg

                                                          Filesize

                                                          653B

                                                          MD5

                                                          dfddf8d0788988c3e48fcbfb2a76cd20

                                                          SHA1

                                                          463bb61f0012289e860c32f1885a3a8f57467f2e

                                                          SHA256

                                                          9585f41eb6202e89f2087266fa31852d7f41ca8cc659b907c96753fe165f937d

                                                          SHA512

                                                          e708c5114c60f7574589d6a56c9faedda26ee4a40f0eeb25f5e12eadcf790f24fdbf393fa0aa6ad449b5337d625b092d6f8822472fa8a6ce1339aca59c50c3ca

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\backicon.png

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          7ff5dc8270b5fa7ef6c4a1420bd67a7f

                                                          SHA1

                                                          b224300372feaa97d882ca2552b227c0f2ef4e3e

                                                          SHA256

                                                          fa64884054171515e97b78aaa1aad1ec5baa9d1daf9c682e0b3fb4a41a9cb1c1

                                                          SHA512

                                                          f0d5a842a01b99f189f3d46ab59d2c388a974951b042b25bbce54a15f5a3f386984d19cfca22ba1440eebd79260066a37dfeff6cb0d1332fca136add14488eef

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\change_hover.png

                                                          Filesize

                                                          310B

                                                          MD5

                                                          57092634754fc26e5515e3ed5ca7d461

                                                          SHA1

                                                          3ae4d01db9d6bba535f5292298502193dfc02710

                                                          SHA256

                                                          8e5847487da148ebb3ea029cc92165afd215cdc08f7122271e13eb37f94e6dc1

                                                          SHA512

                                                          553baf9967847292c8e9249dc3b1d55069f51c79f4d1d3832a0036e79691f433a3ce8296a68c774b5797caf7000037637ce61b8365885d2a4eed3ff0730e5e2a

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\close_red.png

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          93216b2f9d66d423b3e1311c0573332d

                                                          SHA1

                                                          5efaebec5f20f91f164f80d1e36f98c9ddaff805

                                                          SHA256

                                                          d0b6d143642d356b40c47459a996131a344cade6bb86158f1b74693426b09bfb

                                                          SHA512

                                                          922a7292de627c5e637818556d25d9842a88e89f2b198885835925679500dfd44a1e25ce79e521e63c4f84a6b0bd6bf98e46143ad8cee80ecdbaf3d3bc0f3a32

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\custom.png

                                                          Filesize

                                                          17KB

                                                          MD5

                                                          03b17f0b1c067826b0fcc6746cced2cb

                                                          SHA1

                                                          e07e4434e10df4d6c81b55fceb6eca2281362477

                                                          SHA256

                                                          fbece8bb5f4dfa55dcfbf41151b10608af807b9477e99acf0940954a11e68f7b

                                                          SHA512

                                                          67c78ec01e20e9c8d9cdbba665bb2fd2bb150356f30b88d3d400bbdb0ae92010f5d7bcb683dcf6f895722a9151d8e669d8bef913eb6e728ba56bb02f264573b2

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\installer_bg.jpg

                                                          Filesize

                                                          78KB

                                                          MD5

                                                          3478e24ba1dd52c80a0ff0d43828b6b5

                                                          SHA1

                                                          b5b13bbf3fb645efb81d3562296599e76a2abac0

                                                          SHA256

                                                          4c7471c986e16de0cd451be27d4b3171e595fe2916b4b3bf7ca52df6ec368904

                                                          SHA512

                                                          5c8c9cc76d6dbc7ce482d0d1b6c2f3d48a7a510cd9ed01c191328763e1bccb56daeb3d18c33a9b10ac7c9780127007aa13799fa82d838de27fbe0a02ad98119d

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\installer_logo.png

                                                          Filesize

                                                          14KB

                                                          MD5

                                                          e33432b5d6dafb8b58f161cf38b8f177

                                                          SHA1

                                                          d7f520887ce1bfa0a1abd49c5a7b215c24cbbf6a

                                                          SHA256

                                                          9f3104493216c1fa114ff935d23e3e41c7c3511792a30b10a40b507936c0d183

                                                          SHA512

                                                          520dc99f3176117ebc28da5ef5439b132486ef67d02fa17f28b7eab0c59db0fa99566e44c0ca7bb75c9e7bd5244e4a23d87611a55c841c6f9c9776e457fb1cbf

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\installer_minimize.png

                                                          Filesize

                                                          113B

                                                          MD5

                                                          38b539a1e4229738e5c196eedb4eb225

                                                          SHA1

                                                          f027b08dce77c47aaed75a28a2fce218ff8c936c

                                                          SHA256

                                                          a064f417e3c2b8f3121a14bbded268b2cdf635706880b7006f931de31476bbc2

                                                          SHA512

                                                          2ce433689a94fae454ef65e0e9ec33657b89718bbb5a038bf32950f6d68722803922f3a427278bad432395a1716523e589463fcce4279dc2a895fd77434821cc

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\loader.png

                                                          Filesize

                                                          279B

                                                          MD5

                                                          03903fd42ed2ee3cb014f0f3b410bcb4

                                                          SHA1

                                                          762a95240607fe8a304867a46bc2d677f494f5c2

                                                          SHA256

                                                          076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1

                                                          SHA512

                                                          8b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Assets\setpath.png

                                                          Filesize

                                                          15KB

                                                          MD5

                                                          b2e7f40179744c74fded932e829cb12a

                                                          SHA1

                                                          a0059ab8158a497d2cf583a292b13f87326ec3f0

                                                          SHA256

                                                          5bbb2f41f9f3a805986c3c88a639bcc22d90067d4b8de9f1e21e3cf9e5c1766b

                                                          SHA512

                                                          b95b7ebdb4a74639276eaa5c055fd8d9431e2f58a5f7c57303f7cf22e8b599f6f2a7852074cf71b19b49eb31cc9bf2509aedf41d608981d116e49a00030c797c

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\BlueStacksInstaller.exe

                                                          Filesize

                                                          627KB

                                                          MD5

                                                          f6e5bf32766d65c95c6ad00a889aa271

                                                          SHA1

                                                          4e08f41e20c7bfd8c6625f377c20b7388b8844ea

                                                          SHA256

                                                          46e0b420bc074db714601f670e22d26690c9d51da1a0acd0c2b8b85c43574e84

                                                          SHA512

                                                          fa1a27a2578f4037e108bec31b49fddd64dae7356e5d69546ee9ee252efd87d02dee71fa3eeb125471e7ae53b53a2157896bfe50bbdfc7e4dbc620f6d7da5dda

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\BlueStacksInstaller.exe.config

                                                          Filesize

                                                          324B

                                                          MD5

                                                          1b456d88546e29f4f007cd0bf1025703

                                                          SHA1

                                                          e5c444fcfe5baf2ef71c1813afc3f2c1100cab86

                                                          SHA256

                                                          d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb

                                                          SHA512

                                                          c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\HD-CheckCpu.exe

                                                          Filesize

                                                          200KB

                                                          MD5

                                                          81234fd9895897b8d1f5e6772a1b38d0

                                                          SHA1

                                                          80b2fec4a85ed90c4db2f09b63bd8f37038db0d3

                                                          SHA256

                                                          2e14887f3432b4a313442247fc669f891dbdad7ef1a2d371466a2afa88074a4c

                                                          SHA512

                                                          4c924d6524dc2c7d834bfc1a0d98b21753a7bf1e94b1c2c6650f755e6f265512d3a963bc7bc745351f79f547add57c37e29ba9270707edbf62b60df3a541bc16

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\JSON.dll

                                                          Filesize

                                                          411KB

                                                          MD5

                                                          f5fd966e29f5c359f78cb61a571d1be4

                                                          SHA1

                                                          a55e7ed593b4bc7a77586da0f1223cfd9d51a233

                                                          SHA256

                                                          d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156

                                                          SHA512

                                                          d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\Locales\i18n.en-US.txt

                                                          Filesize

                                                          20KB

                                                          MD5

                                                          a1e3293265a273080e68501ffdb9c2fc

                                                          SHA1

                                                          add264c4a560ce5803ca7b19263f8cd3ed6f68f0

                                                          SHA256

                                                          1cb847f640d0b2b363ce3c44872c4227656e8d2f1b4a5217603a62d802f0581f

                                                          SHA512

                                                          cb61083dc4d7d86f855a4cc3fe7c4938232a55188ad08b028a12445675fbff6188bb40638bd1ce4e6077f5bfc94449c145118c8f9b8929d4e9c47ed74cf7bece

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS034247A7\ThemeFile

                                                          Filesize

                                                          80KB

                                                          MD5

                                                          c3e6bab4f92ee40b9453821136878993

                                                          SHA1

                                                          94493a6b3dfb3135e5775b7d3be227659856fbc4

                                                          SHA256

                                                          de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6

                                                          SHA512

                                                          a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS8D7F35D8\Assets\exit_close.png

                                                          Filesize

                                                          670B

                                                          MD5

                                                          26eb04b9e0105a7b121ea9c6601bbf2a

                                                          SHA1

                                                          efc08370d90c8173df8d8c4b122d2bb64c07ccd8

                                                          SHA256

                                                          7aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157

                                                          SHA512

                                                          9df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68

                                                        • C:\Users\Admin\AppData\Local\Temp\7zS8D7F35D8\Assets\minimize_progress.png

                                                          Filesize

                                                          212B

                                                          MD5

                                                          1504b80f2a6f2d3fefc305da54a2a6c2

                                                          SHA1

                                                          432a9d89ebc2f693836d3c2f0743ea5d2077848d

                                                          SHA256

                                                          2f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6

                                                          SHA512

                                                          675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94

                                                        • C:\Users\Admin\AppData\Local\Temp\nsdF142.tmp\Registry.dll

                                                          Filesize

                                                          24KB

                                                          MD5

                                                          2b7007ed0262ca02ef69d8990815cbeb

                                                          SHA1

                                                          2eabe4f755213666dbbbde024a5235ddde02b47f

                                                          SHA256

                                                          0b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d

                                                          SHA512

                                                          aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca

                                                        • C:\Users\Admin\AppData\Local\Temp\nsdF142.tmp\StdUtils.dll

                                                          Filesize

                                                          100KB

                                                          MD5

                                                          c6a6e03f77c313b267498515488c5740

                                                          SHA1

                                                          3d49fc2784b9450962ed6b82b46e9c3c957d7c15

                                                          SHA256

                                                          b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

                                                          SHA512

                                                          9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

                                                        • C:\Users\Admin\AppData\Local\Temp\nsdF142.tmp\System.dll

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          0d7ad4f45dc6f5aa87f606d0331c6901

                                                          SHA1

                                                          48df0911f0484cbe2a8cdd5362140b63c41ee457

                                                          SHA256

                                                          3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                                                          SHA512

                                                          c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

                                                        • C:\Users\Admin\AppData\Local\Temp\nsdF142.tmp\WinShell.dll

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          1cc7c37b7e0c8cd8bf04b6cc283e1e56

                                                          SHA1

                                                          0b9519763be6625bd5abce175dcc59c96d100d4c

                                                          SHA256

                                                          9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

                                                          SHA512

                                                          7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

                                                        • C:\Users\Admin\AppData\Local\Temp\nsdF142.tmp\nsExec.dll

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          ec0504e6b8a11d5aad43b296beeb84b2

                                                          SHA1

                                                          91b5ce085130c8c7194d66b2439ec9e1c206497c

                                                          SHA256

                                                          5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

                                                          SHA512

                                                          3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

                                                        • C:\Users\Admin\AppData\Local\Temp\nsdF142.tmp\nsis7z.dll

                                                          Filesize

                                                          424KB

                                                          MD5

                                                          80e44ce4895304c6a3a831310fbf8cd0

                                                          SHA1

                                                          36bd49ae21c460be5753a904b4501f1abca53508

                                                          SHA256

                                                          b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

                                                          SHA512

                                                          c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

                                                        • C:\Users\Admin\AppData\Local\Temp\nsrEF24.tmp\BgWorker.dll

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          36c81676ada53ceb99e06693108d8cce

                                                          SHA1

                                                          d31fa4aebd584238b3edc4768dd5414494610889

                                                          SHA256

                                                          a9e4f7ec65670d2ce375ffaf09b6d07f4cd531132ca002452287a4d540154a38

                                                          SHA512

                                                          1300de7b3e1ac9e706e0aad0b70e3e2a21db8c860e05b314a52e63dd66b5dffdf6be1e38ab6ede13bfd3a64631cc909486bf4b1403e7d821e3b566edc514c63c

                                                        • C:\Users\Admin\AppData\Local\Temp\nsrEF24.tmp\System.dll

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          959ea64598b9a3e494c00e8fa793be7e

                                                          SHA1

                                                          40f284a3b92c2f04b1038def79579d4b3d066ee0

                                                          SHA256

                                                          03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

                                                          SHA512

                                                          5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

                                                        • C:\Users\Admin\AppData\Local\Temp\nsrEF24.tmp\nsDialogs.dll

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          f7b92b78f1a00a872c8a38f40afa7d65

                                                          SHA1

                                                          872522498f69ad49270190c74cf3af28862057f2

                                                          SHA256

                                                          2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

                                                          SHA512

                                                          3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

                                                        • C:\Users\Admin\AppData\Local\Temp\nsrEF24.tmp\nsDui.dll

                                                          Filesize

                                                          3.0MB

                                                          MD5

                                                          9e2c8c07c3d9c74363dc3af3dc63753f

                                                          SHA1

                                                          27b145e650de7949748a98a089e905d70aaf2417

                                                          SHA256

                                                          4b446d4fc576f45943017d7d93b76b220307414a1aa894593f5c9299fed1ee29

                                                          SHA512

                                                          ad5caaf2a419dccf475e7b389a6a530d8c27c620f680ecbf8d5ce7e75b95e0c67cc133b4b1418cd7dc7f2a1f0cfd14a0fa64d3b0e5dec48d2c02dd7cba4a0182

                                                        • C:\Users\Admin\AppData\Local\Temp\nsrEF24.tmp\nsis7z.dll

                                                          Filesize

                                                          434KB

                                                          MD5

                                                          95f6f6ab9509bc366ab9215defe4251a

                                                          SHA1

                                                          e3f4a6effd6ca5838cfe91a01967cb72edcc7b0b

                                                          SHA256

                                                          a896a9ece055d334d431cd0f856113ab925d9ee86d2dee383c0bfbbef11a5b50

                                                          SHA512

                                                          a853f70d2ea7f384df99be067724bf3ca73c63f3c3573c112f5528fc86a96bd34509d934b038e2a81833f3abb3eedbc5894921291139100e01df6e35696c0ecc

                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.exc

                                                          Filesize

                                                          2B

                                                          MD5

                                                          f3b25701fe362ec84616a93a45ce9998

                                                          SHA1

                                                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                          SHA256

                                                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                          SHA512

                                                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                        • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          b6c7e48f195789bc722d047f0e3a9ea6

                                                          SHA1

                                                          221e3d2f5699fe586692dcb57138a1f45b373cfd

                                                          SHA256

                                                          8c0092352afe3786e14dc4c7ae820db132bf9192b89747c552544f9bf838f069

                                                          SHA512

                                                          227b8fc244a491b841674b37258e30bd7d0fc4c2ca104bf1fe1499bdb75e4c0c6a9d8cd7ebdeaf88840508693144de81446b957ec1589515c6173f4499cd77ad

                                                        • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                          Filesize

                                                          92B

                                                          MD5

                                                          c56397f9577f24298b369ba5e5dcad47

                                                          SHA1

                                                          64567987f8304f7036d4ac283dce4f9213ea0ec0

                                                          SHA256

                                                          72d0da05cb9abb6914a2daf13194301e268e65a5903b3ff42ddc5d2bf17a92b9

                                                          SHA512

                                                          30e15346d70115d6816c556547cb9d88b5eeb8024e2ad2c2bc90804531b864086450c8bcb8741828dc1991fac17845498a74232c79432831967eda3a18de4838

                                                        • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                          Filesize

                                                          57B

                                                          MD5

                                                          a8093277bb5d45fad4e25ffd901f5153

                                                          SHA1

                                                          348f0f00631738cd3c84eac89e284d31fea2015b

                                                          SHA256

                                                          09030e745b5d7a3e54336cc51eab80a912c4a7133bf76045bfe92d3edd40c963

                                                          SHA512

                                                          457f71d74d0a56d0a92dccad4a92d0d2e3fda5077fe739ea6c60be5057e4d98678844045ac18dedf003893f6c82be629b379ee8b788cc8c69a8438d4daf1e959

                                                        • C:\Users\Admin\AppData\Roaming\bluestacks-services\config.json

                                                          Filesize

                                                          119B

                                                          MD5

                                                          7219548ae160f5c180970c887710723b

                                                          SHA1

                                                          139dfe358429f69d9c898a702a72dcd75559c8f7

                                                          SHA256

                                                          6ec6002ebf07c325b9e5b2ecb8f4f69082382c95ce28340d68abdb701781d16b

                                                          SHA512

                                                          4084c3e0836b7d62905b3f665200a2f85e9818d4873b8d5df0dcff0153bca1dfe8ade49b5f0dbb7c0d2c6289b0d3dcb8e9e507acb4362f1f3f90ce32080e3466

                                                        • memory/1072-9698-0x0000000000400000-0x000000000045D000-memory.dmp

                                                          Filesize

                                                          372KB

                                                        • memory/1072-9538-0x0000000000400000-0x000000000045D000-memory.dmp

                                                          Filesize

                                                          372KB

                                                        • memory/2464-10039-0x00007FFB792D0000-0x00007FFB792D1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2464-10038-0x00007FFB7AA10000-0x00007FFB7AA11000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/2804-139-0x00007FFB5C620000-0x00007FFB5D0E1000-memory.dmp

                                                          Filesize

                                                          10.8MB

                                                        • memory/2804-9623-0x00007FFB5C620000-0x00007FFB5D0E1000-memory.dmp

                                                          Filesize

                                                          10.8MB

                                                        • memory/2804-150-0x000000001B870000-0x000000001B878000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/2804-141-0x000000001DB30000-0x000000001DB3E000-memory.dmp

                                                          Filesize

                                                          56KB

                                                        • memory/2804-140-0x000000001DB60000-0x000000001DB98000-memory.dmp

                                                          Filesize

                                                          224KB

                                                        • memory/2804-156-0x00007FFB5C620000-0x00007FFB5D0E1000-memory.dmp

                                                          Filesize

                                                          10.8MB

                                                        • memory/2804-136-0x000000001E5E0000-0x000000001EB08000-memory.dmp

                                                          Filesize

                                                          5.2MB

                                                        • memory/2804-154-0x00007FFB5C623000-0x00007FFB5C625000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/2804-155-0x00007FFB5C620000-0x00007FFB5D0E1000-memory.dmp

                                                          Filesize

                                                          10.8MB

                                                        • memory/2804-135-0x00007FFB5C620000-0x00007FFB5D0E1000-memory.dmp

                                                          Filesize

                                                          10.8MB

                                                        • memory/2804-129-0x00007FFB5C620000-0x00007FFB5D0E1000-memory.dmp

                                                          Filesize

                                                          10.8MB

                                                        • memory/2804-128-0x000000001D210000-0x000000001D278000-memory.dmp

                                                          Filesize

                                                          416KB

                                                        • memory/2804-126-0x0000000000BE0000-0x0000000000C80000-memory.dmp

                                                          Filesize

                                                          640KB

                                                        • memory/2804-124-0x00007FFB5C623000-0x00007FFB5C625000-memory.dmp

                                                          Filesize

                                                          8KB