Overview
overview
6Static
static
3CapCut_726...er.exe
windows7-x64
4CapCut_726...er.exe
windows10-2004-x64
4$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
6$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ed.dll
windows7-x64
1$PLUGINSDI...ed.dll
windows10-2004-x64
1$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDIR/res.zip
windows7-x64
1$PLUGINSDIR/res.zip
windows10-2004-x64
1app_warning_icon.png
windows7-x64
3app_warning_icon.png
windows10-2004-x64
3banner_bk.jpg
windows7-x64
3banner_bk.jpg
windows10-2004-x64
3btn_dark_1...le.png
windows7-x64
3btn_dark_1...le.png
windows10-2004-x64
3btn_dark_1_hover.png
windows7-x64
3btn_dark_1_hover.png
windows10-2004-x64
3btn_dark_1_normal.png
windows7-x64
3btn_dark_1_normal.png
windows10-2004-x64
3btn_dark_1_pushed.png
windows7-x64
3btn_dark_1_pushed.png
windows10-2004-x64
3btn_dir_disable.png
windows7-x64
3btn_dir_disable.png
windows10-2004-x64
3btn_dir_hover.png
windows7-x64
3btn_dir_hover.png
windows10-2004-x64
3btn_dir_normal.png
windows7-x64
3btn_dir_normal.png
windows10-2004-x64
3btn_dir_pushed.png
windows7-x64
3btn_dir_pushed.png
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
CapCut_7267140873131950085_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CapCut_7267140873131950085_installer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/res.zip
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/res.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
app_warning_icon.png
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
app_warning_icon.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
banner_bk.jpg
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
banner_bk.jpg
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
btn_dark_1_disable.png
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
btn_dark_1_disable.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
btn_dark_1_hover.png
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
btn_dark_1_hover.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
btn_dark_1_normal.png
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
btn_dark_1_normal.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
btn_dark_1_pushed.png
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
btn_dark_1_pushed.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
btn_dir_disable.png
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
btn_dir_disable.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
btn_dir_hover.png
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
btn_dir_hover.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
btn_dir_normal.png
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
btn_dir_normal.png
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
btn_dir_pushed.png
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
btn_dir_pushed.png
Resource
win10v2004-20240226-en
General
-
Target
CapCut_7267140873131950085_installer.exe
-
Size
2.2MB
-
MD5
c91e097550ea6ccedf592d8b83414e0d
-
SHA1
021f3f26d86f98af28dc987baad8714f64867207
-
SHA256
4a9d815f284adda187982e2b24da2beaad860739bc4b4cb1cf26408e7c221dd6
-
SHA512
916898c9850ddfcd2c11da7421eeffc4d48406d9ad4787a4dc572ec17a81a39edd30733aa8cccde8b31450ff8031e3da68be019a8a0eff50c0a17ed4fa0aa3c9
-
SSDEEP
49152:uGVKq6wrr98ArcTTuVMZCC8GYCNbFLg3dlXI5x8oaigMv3Dh:uGVLprJ8ArnVMZCUPFcNlXID8en1
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
CapCut_7267140873131950085_installer.exepid process 1300 CapCut_7267140873131950085_installer.exe 1300 CapCut_7267140873131950085_installer.exe 1300 CapCut_7267140873131950085_installer.exe 1300 CapCut_7267140873131950085_installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
CapCut_7267140873131950085_installer.exechrome.exepid process 1300 CapCut_7267140873131950085_installer.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
CapCut_7267140873131950085_installer.exechrome.exepid process 1300 CapCut_7267140873131950085_installer.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2428 wrote to memory of 2440 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2440 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2440 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2704 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 1824 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 1824 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 1824 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2040 2428 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CapCut_7267140873131950085_installer.exe"C:\Users\Admin\AppData\Local\Temp\CapCut_7267140873131950085_installer.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_4f439478eb.exe"C:\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_4f439478eb.exe" /s /create_desktop=1 /install_path="C:\Users\Admin\AppData\Local\CapCut\Apps"2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6669758,0x7fef6669768,0x7fef66697782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1100 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2128 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1560 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2252 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3776 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3708 --field-trial-handle=1324,i,9148731344324277976,7201611396904722521,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\QtQuick\Window\quickwindow.qmltypesFilesize
215B
MD52006d4b7d0da455aa4c7414653c0018a
SHA16685b8360b97799aa4d6b18789bf84a343e9e891
SHA256a96c7bf5832767bdc9d91e2290a3920aec3abfbf2e3814bce38b49483f16f84a
SHA512703804e6fab0cf44317b7292c547a1348e2e7395e4b71367c32c3b097bcfb3344d3296179bf4ba33a4c752ae58a3873af57d8cdef35a34564205356bb4e6fd84
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\highlight\amazingfeature\scene.configFilesize
284B
MD577e51012d23d27cd7dfb762fb2f22366
SHA1faa1a6848a92f2eba5c6094659efee0eaf289e49
SHA2565b405fa29439f5853937c9714c794f10a01ed033f81866ba52f7f8ea5312b41e
SHA512efa87d35d3b2360809f5de98b7d681c3cdbee6144c1065e7144d098b56126f794b83a7aa692325d532271e7016556d1c9ac2f9eaf2fb480314bbedb951bda2d3
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\saturation\amazingfeature\Transform.luaFilesize
743B
MD555f8219de11fd1bab55e136d97f34add
SHA1d728bdc21b7c73165f7c767300c004afd02958e3
SHA256f5ae7d270c41dc064723acb52c96339337d142f327ed98591ebb52c9518a2a78
SHA5125ec44128343bc3cf4b0dffb318ec46e906e247ed4cb9a6839bb514f753b14fcda61070271b81538a9a67605641719119bdc2ad0d33eca614ee732eccdeccbf6c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\saturation\amazingfeature\main.sceneFilesize
1KB
MD53717cb9f906065bafdf220f9db92858d
SHA1b16293702cb36fec8f20befa221ae22e00196911
SHA256b97663892b4a96ac2b5888965086c8e6e037e962a76f38529f8471d8b4e7dbad
SHA512e576fdd14c25fe5a32c688e39885fb177b79f4fd7e25d466fee33a0f5879e4727d033080d340c26850248f8549d34d39db190070f44ff017be2d2f5ed8278044
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\saturation\amazingfeature\sticker.configFilesize
243B
MD5a6370133cd32ad029749c4c30bdb80c6
SHA14ae8d816fb891657589f35f1bddd617e721ac379
SHA2566f8d212c18569ba0e1c3b1bc89c8c4b2a16377d94cc26d1d78df1bb920efe379
SHA512b410873382913c3a16a64390b1bd12978c639568c4cac1efbbcecbdd0852926991a9fd00aac60bdc94a489531c656f59b64559976a88c67bf35ddaffa0a9861d
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\saturation\amazingfeature\xshader\gles2_filter.vertFilesize
215B
MD5a1e49a5f219476c5377ad0cd33c5c326
SHA113029ff75a9d8796bb52a40f8126fed9d6e57dce
SHA256ff67b00d9d13e6ab219c94e61e36ad43f1e025d4e3f540f14a6ff26b1b7e8dbf
SHA5127d48ddb5b56b80204be4103d4ac3014cd2f9ed7212f8055a3d3792fd8b06715f8a489401d936c829e1ae53780af4abe0b4e838ee85d052c5019b6e6e29789a1e
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\shadow_highlight_v2_gles2\AmazingFeature\xshader\guideFilter.vertFilesize
245B
MD58b24bd873c1a8b3ad502e3f4a2ec2e96
SHA1c8b663f74c81aa71edb346b15dea3563ea370026
SHA256fb3e9e7a966147cc5cb48b1a087931bfbdea744a0d0e0def0f07070ba48a73cc
SHA51258b485ac1a1e72951ddfea8cfe794ee2db5e55c128f9b398989ac15d9610adfea879c3bb3ea1eb3ac0b29ed1b4892cec70d68761a1711d30124ca7a391f29b44
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\sharpen_v1\AmazingFeature\prefabs\sharp\fshader.vertFilesize
171B
MD5c90a03b7ece36748ed019572f6a5a1ec
SHA14d10c9cad45707369777d69d94aa05546990ff34
SHA256eaf495d1de3a920ca4f87e5bfe868a822d1ac05ae9f8d10651d60a382ecdd1b7
SHA5128d68782086ee3839855c725e206c5f845179a06026df5acf10b77f9ea06bb9b11cb2768c6ccc3c06c030de5122a9f9bb9025952b24ecc9c03c03c52b110d360e
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\temperature_tone_v3\AmazingFeature\sticker.configFilesize
276B
MD502b91a98d687f65158c5d30123166da6
SHA1a9e91db1e43f923942cb58cd242af527a5d9b158
SHA256c3de42b569951c70e76d4adb756b424c0ddaeaea6c1a0b61bf1935b7b7b1ee66
SHA512fe9f10abf7275af089e4cfa8e7a9c83b8b0a2f2763d481f25cb746f5122dedb4250f4a3fe3c0aa4b361e6194233cf31c2e8045baff108489daf4c2e3def04d10
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\tone_v1\amazingfeature\sticker.configFilesize
258B
MD56238b4cd638d16c1136c78c3d84b61ea
SHA103683ded62e4e602b25bdb6ee445dfe760e22b6c
SHA2569c9ba3ebe0c06582ce05df7831d4754061d2ed7c7e3ad6acaaaa563f7bbf7d2f
SHA5126339227384501243997f6f93d8da38ea673c86e6b39de2e2f8c8f46e1e388fc3d4ab4d916246bebb4238524af6d8323a86cb139467849148291551cd63514d1c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\tone_v1\amazingfeature\xshader\gles2_filter.vertFilesize
204B
MD595b57e27cb10a24e4acf91f3f00f0cc8
SHA162c259c7c1050e9de45ee3105983814dcd11f95d
SHA256add8f8c4c8e970dcdbe6ca1ab7180f7124cafc4e5dd909d8b0d7cf1734b3409e
SHA512a7ed5a37e5216b44f1a4451ffc2dafef2463ccbd8153a9d393d2b09da3dcd812e3cdec4975782c9484388698057c1994ef48b9371d26b83f56288a87acbe4b1c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\vignetting\amazingfeature\Transform.luaFilesize
716B
MD599b4753a045f720a4c6a1bcb875bd72c
SHA14afc8b19876ead7a7ad903f13521c2b443de1496
SHA2564e4b7c19259ebab2fbe29d179122a20584b783f12632bfc2d214d82e522c303b
SHA51215a857fa869f37dd777f261821947bbc27214d5993a6a7431fdecd88468cdd81c59a876534c0459c46f33cd7a6b03aa827160014ae729f16fbde19dfce3afb73
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\vignetting_v1\AmazingFeature\LuaRTTI.MarkGen.luaFilesize
222B
MD55dac156aac6bffd08cb0f8c1637f5e5c
SHA140e6585e5de8648725243517781e4d3330caffcb
SHA256cf4f8b5ff1a50eff88236aba7f9bb48e696d337b779d98e911d00f6876800503
SHA5120999fd224c54882d28aa8067e20ee7877b509591901f801d400b613a4fd95af5948d6c512b01d1f7b3aad2203a80f8a3adfec1dd03b6dd3329de87e8583145a3
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\DefaultAdjustBundle\vignetting_v1\AmazingFeature\js-meta.jsonFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\LogWheel\log_wheel_v1\Wheel\scene.configFilesize
363B
MD58d61b3b6f3944a129228b01ab04a3a86
SHA1dd2a509da1175dd99095748b029c3b868d6f67c7
SHA256468a132a03b8569130faf2c5d8e0f05f3f7602a336b0510534026c11a73ab460
SHA512abd1ac6afff2b3ea5e8e454d4aa86dab711d8686ebaacfe66b141ec25755abc512b6252f8c786eff44ffc49f8483942a6c66c703bb2602f6f9b1a576b66f121f
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\anim.prefabFilesize
477B
MD59eaa91c4a6c3d873483059d0a1a76ab5
SHA1b100bd90dc01b7409963a0b4e9ea3c19ce475140
SHA256e9d87f8022efa9374e74d61c310d8bc11a98925b8d2e771ab75e1b865164c02e
SHA512a656a600c2aede10ed708f7fcfcde22b59b06aef2034b5715dc6c60c12fee3e1fea2a964c21e91fe1c0956c160472b62e4ef67bcf992b750b8ba3e651721ed83
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\blend.materialFilesize
552B
MD57cdae2b4822bcd006e9d2ffce3e84453
SHA1720111dacf341b7ce908bd282058169a62239154
SHA256e8986f58f72446435468272d8d4e7c95a4fce58b3ad4838ed634b999196d3736
SHA5120ae64df166e18d7770a28c317565d5238b578202cb6c7bd2c9db55e185a61f79ae03f0530955f748dc387889c73f01479e23f7d21cb3dcbe44f2107905131a91
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\config.jsonFilesize
64B
MD5c1b0a3e521b261389e09efaf5f6fa2d9
SHA1976b181838ba45780eb4b2f9b629a1f7d1cf763d
SHA25607232ba6befad39df9079b18e7c66235a11b2b375626c80cabd0b46f9b7d948f
SHA51257d70636ebcbb3c0521da860d4cbbe9516a91e1b7b529e7e12781aa534c8c3a7c2d8f31c8c5fabb0acfbd6c81eedc292b3cbb8d0f01d306f12c249417a205a94
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\content.jsonFilesize
65B
MD577af16e6914627f13e1ffb90509cace4
SHA1329bafa669c548a0b9cc2ed266de24b0ec8608df
SHA256424c068d0f0e848d3b8f25ec1a55f1086df3c87ad95eca13fe6b265c46400fc0
SHA5124e96216696d5f8e43fbb5ba951dfeb5e32ad1d48fe0737c3725c5c4d4f2531bba18afa1b82d694f2a0029a1a0f37dd24236eaac8ba0d296b6e0fddd70ec60790
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\xshader\blend.vertFilesize
283B
MD5e3f125658d61f243d3b7b2ac1ed189c8
SHA1cff0ff4f418c4bb98d0349f0872ca55e8b3ef384
SHA2562719896bc6ff9ed2ff5532a937ac685668479e4bcd19ef11ed708cdbf52c2fd5
SHA512f224b7828c9bd272114a9a75d73858bd36ecfefd042c2d8adcd07216a781f7eb57d5ea019e0107c974cad483b8930814cc8e9c23966491a468ab207612e4bfe3
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\xshader\blend.xshaderFilesize
726B
MD55e0a7ae043616ffe49e0ca2dce2d6827
SHA1c95e3ef200a811775c4b0c7517a1603f41a9605f
SHA256a1a1915919f200668689f83694e4fb7b6bba2e3ff6cc2bacc7b84d36b7c48fc0
SHA512547ed7454ac05a68de5458ab998daf2fe167bbe18c3aea00499b9209aa3adea489688359a3ac688e39250b4abe99cee79657a98eaa1ef4eed7d201619020584e
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\PrimaryWheel\primary_wheel_v0\algorithmConfig.jsonFilesize
382B
MD52742644266425cbe36e1517602961e99
SHA19ac55196393e328a65f4cf6e5872822060f9ce5e
SHA25628251cedc501cb7285fe4c06af3714af3ec068834cc15c1ddcd913f91572ace0
SHA512e308c625a22b625631f81cfa4c9fc20e92efd082c5a6a0dc0aaf58b3b4924c21e40fe1da2faa0506e06f8c3e1bd4411b972dae5470b5424f77554ea48003f56c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\PrimaryWheel\primary_wheel_v1\Wheel\sticker.configFilesize
276B
MD5ceeafc08b27c8bf1264a372e6572b243
SHA1a2b1c88dab2b2fa57adc0ce4863edf269654dc70
SHA2568695d8d1cd532f86c340a46ff20f6c96f25f842d6c6f2d3c67b29e3c8d706fb0
SHA512e14ded5b310ffcf969f94f3248e7f95f1a078616a05b90f47918581bbc983951c54e8d6d61538817a2d9e5ed868bf53e9623c0a19586ea8cebfbfdb6f81d29c9
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\image_h5_material_publish\static\css\publish-video.efdeb61f.cssFilesize
10KB
MD5348a4ed657cc7bb4484bf829f633bfc8
SHA15f5f0e3004ada5cb7456c4816e37e1b8573f9e8e
SHA256f8a1929af639b5381308c1bbef8f76bc1b77132b56f4bca6b1bf7d5cbdfaeaf5
SHA512e4e05331b72a3e975ca5cf880fd024d64f5df8c9015adca1f4d0c00846b0cf6a9b984060ec7cf7906c5767dc6af4444c06f207f417c09805c76aee3d175f4fdb
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202433203644541_1\JYPacket\3.4.0.1211\Resources\image_h5_material_publish\static\js\publish-video.b44e3ef4.jsFilesize
31KB
MD596334f5df5be917a1813066138e5e3a2
SHA162fd4e2dce0c86e8fe5657af3c5e1e6ff8af6422
SHA256119426fe8df2b54b6f3b9c2553683f77b14b8da2c4341f102df267b12fd15683
SHA512b3ab832db3c09e40e2d296e13ed9b6bcdd74dc49db5e569dbc9694f0c5aa0e0e20e879d6ffbf30db589a31ca51d674e8221c3a683856dc90986ca5a0f277e0a3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\2a3bf42e-aaf5-407e-b5c0-bc4400eef1de.tmpFilesize
256KB
MD555cbd8f7ed05b0a4906a6335aefe2c7a
SHA1bc30f506bdd0efb7aed4f8a1dc98726c2238945d
SHA25691c131c2e0553d12368724849d984e7928ec8e785f8e2664f2a7aa0b365da99f
SHA51208f75713bb7be6270ea3aebd123cc879174f3f40168eb9447d5d9361d331dcca7b7a9b3e294c8c5e5e414b636945f8d525e59963b5c85c3a526e7abfd5b893e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
4KB
MD5e7bef6255401e1189b8e767f449c17a4
SHA1e8d701e2a7789fe85ac506bd7ff86b1034fea02c
SHA2560d7291cf95396614129943a7d3d6750a30f0f0db8f916a26b83fb6363ae28ce8
SHA512356f65f8a33fbc149a382a96eefb6afbf58db67df4ef63b33c7e398e5ed8a838180048a709e5147bdf37fabb7619207e459490329d3476fd8e92b15edda194f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
256KB
MD5f063f0de7d8251a749aebe273574700e
SHA13a7066de68a4b0e9e783b19186f0a7a3c6b196e4
SHA256f3b0ffbe5e944439de10f708a15431c86476c807f36fb351b790561083b5ba21
SHA512ade4b51bd5f1b1c305b3d64ce8089826c393aad3239c39e56a2623bc63b2d4a8b16dec212d00ef4921a3a99a36a64cc96d63dbca3d9cf195b1d5578c91d51a09
-
C:\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_4f439478eb.exeFilesize
961KB
MD531b4667931095f890c66717cd1c539a2
SHA19d8c98602bc5f7f2e73206fbac15d34979cc1178
SHA25617f349784a97ef9a21e03d348184ed067e5d8ce9ca4c942b6437328538ef35fc
SHA512a5ecf3c06bdad1dc4ff6f3e2268e2fa5e6b27f1eb4d34b465b21b59cc53544ce273bd5de111216056c19ab534d31c5943896abdcd18ed1cc598c2b7e35acb282
-
C:\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_4f439478eb.exeFilesize
779KB
MD5d2c6b19218d7efe1cff9ca2412f4e456
SHA176cf7e19a728339b94dee14a4ee9d7dfbe87236f
SHA256ab918e65c2f19b161de7bf393711314e2699cf8addb469c406d61c16fa6a2095
SHA512bae81b921206a16eda242172844117d5f23f95ecef64af9e3928c91b8200693120b4c33ef2f9cc0a3d8471ca470295d1ee5085235b09fd4f94cd9d03b877dafc
-
\??\pipe\crashpad_2428_VMCNEKGRERVVUJPPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\E9DDA433-AA83-40F3-BEA5-93BAD32DD698\7zip.dllFilesize
458KB
MD5fe2f95603478cd5c127951707a620628
SHA11e5b0cc568c597dd78b7cd95c03e327da02a4c00
SHA2561534953c6a85bece425ca80e8b7bbfaf12e61d88d37f3c5306305f1e7f2ad38e
SHA51215b0fcc26ad597de660b9778fc6ad8d0e28f0028afe4703c3bc4c944e9dec9b4bca78df56a73aa235e39e6fd6f488e88c8ac4b0a9b5fed3628db25bc3b2f4da1
-
\Users\Admin\AppData\Local\Temp\nso909D.tmp\BgWorker.dllFilesize
2KB
MD533ec04738007e665059cf40bc0f0c22b
SHA14196759a922e333d9b17bda5369f14c33cd5e3bc
SHA25650f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be
SHA5122318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef
-
\Users\Admin\AppData\Local\Temp\nso909D.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
\Users\Admin\AppData\Local\Temp\nso909D.tmp\downloader_nsis_plugin.dllFilesize
1.2MB
MD5b8c1fbd0554c2837b15e61d480942f62
SHA11db237f757402775f50bf72af6c77834d139ba22
SHA2568a80320a9137551c768157a88f527b107cd7bb5f7967ba6e8f741b2f5e65d809
SHA512a448dccd8229eae01f4aa3f3ecc54a34b69a3e7633c8f853c7d1340b9589a4aee5b116e27fae01d8e7ef724b50ab80b2f9dcfc779c3194290b3a1be1dba55785
-
\Users\Admin\AppData\Local\Temp\nso909D.tmp\shell_downloader.dllFilesize
2.3MB
MD5c052c0a2ed833d924b7799625413ac1c
SHA1bdd08a29f4de283ba0eb3cda4abc26f6e85d4d5e
SHA256098972cf9ddc9d574130e025a252a99b278de9cc0ae700acfb8c935c24eb1172
SHA51289e67c29d5d8a401a70a5b572844f24bfde82d5d4259ecc5e6f12be0ddb434995a2e985914fc421973998e3fdc48b133e269e8bb1da513ec66199f01060162f1
-
\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_4f439478eb.exeFilesize
730KB
MD50cb5b54d9110a379b4ed826e62740faa
SHA1eb845b63bd474d4aa3115fc19bb3fa32e05777d3
SHA256a03429342b09c12a74bb2ce24655a64d156ad61f106358b35db01a2647c4712f
SHA512a8c577d936296f31cdb31b864b80e97737e21f895da35f708cb50c36298890893dfc5bf766ecb05046cf9b7b852e5d8a13cc41bf96eb72e5893f818096dad3fc