Overview
overview
6Static
static
3Undetected...nX.exe
windows11-21h2-x64
6$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...er.dll
windows11-21h2-x64
1$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3Uninstall VLC.exe
windows11-21h2-x64
4$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/UAC.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-04-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
Undetected_____________________________________-Setup-v-am1kunX.exe
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240214-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
Uninstall VLC.exe
Resource
win11-20240319-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UAC.dll
Resource
win11-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240221-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240214-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240221-en
General
-
Target
Undetected_____________________________________-Setup-v-am1kunX.exe
-
Size
704KB
-
MD5
d1fc9e6d71a4867ab71af5566e525ba0
-
SHA1
593b10280a926134839feb8e2f9d0da9ee9c0593
-
SHA256
21be0a068d7d1b57578bfb2ed850b3f3b1cfe4a4c47981ead95abdb8c20278fe
-
SHA512
c82a23e5e0e3a38e32fc08401890852a71ec90640bbfb944ed7d45812493a53d2be2c0e4373692e52c77d666b8ae72cd0d15c3dc4bc3cc52887ad4589820658d
-
SSDEEP
12288:iOIVD3gyucpjRKaDPNKT1zH3ptaR1sDfOQSvJqFZ6rOIIzVFA4+M:iOIyyuUjMaDu173pG1szLSvJwSOZBv
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\System32\NvWinSearchOptimizer.ps1 VLC.exe File opened for modification C:\Windows\System32\NvWinSearchOptimizer.ps1 VLC.exe File opened for modification C:\Windows\System32\NvWinSearchOptimizer.ps1 VLC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\NvOptimizerLog\locales\ca.pak old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\applet.icns old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\ old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\swiftshader\ old-uninstaller.exe File created C:\Windows\NvOptimizerLog\locales\fil.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\zh-TW.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\vendor\win32\Elevate\Elevate.rc Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\vendor\win32\Elevate\main.c Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\snapshot_blob.bin Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\swiftshader\libEGL.dll Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\snapshot_blob.bin old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\vk_swiftshader.dll old-uninstaller.exe File created C:\Windows\NvOptimizerLog\chrome_200_percent.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\sr.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\Resources\applet.icns Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\nb.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\te.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\et.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\MacOS\applet Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\gksudo Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\swiftshader\libGLESv2.dll Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\ old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\ms.pak old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\vulkan-1.dll Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\libgksu2.so.0.0.2 Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\hr.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\it.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\regedit\vbs\ArchitectureSpecificRegistry.vbs old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\locales\fil.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\PkgInfo Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\vlc\installer.exe Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\bn.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\es.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\MacOS\ old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\applet.rsrc Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\nl.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\bg.pak old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\locales\mr.pak old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\chrome_100_percent.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\sw.pak Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\.eslintignore Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\MacOS\applet Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\ar.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\en-US.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\Uninstall VLC.exe Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\locales\th.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\MacOS\applet Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\vendor\win32\README.md Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\Scripts Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\vendor\win32\Elevate\Elevate.vcxproj.filters Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\fr.pak old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\Resources\Scripts\ old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\webpack\chmod.js Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\ru.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\webpack\config.babel.js Undetected_____________________________________-Setup-v-am1kunX.exe File opened for modification C:\Windows\NvOptimizerLog\locales\pl.pak old-uninstaller.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\webpack\config.babel.js old-uninstaller.exe File created C:\Windows\NvOptimizerLog\locales\ja.pak Undetected_____________________________________-Setup-v-am1kunX.exe File created C:\Windows\NvOptimizerLog\resources\regedit\vbs\regDeleteKey.wsf Undetected_____________________________________-Setup-v-am1kunX.exe -
Executes dropped EXE 17 IoCs
pid Process 3280 VLC.exe 1960 VLC.exe 2180 VLC.exe 4972 VLC.exe 2216 VLC.exe 568 installer.exe 1460 installer.exe 324 VLC.exe 2720 VLC.exe 1868 VLC.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 6360 old-uninstaller.exe 2284 VLC.exe 4868 VLC.exe 3112 VLC.exe 1580 VLC.exe 704 installer.exe -
Loads dropped DLL 50 IoCs
pid Process 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3280 VLC.exe 2180 VLC.exe 4972 VLC.exe 1960 VLC.exe 1960 VLC.exe 1960 VLC.exe 1960 VLC.exe 2216 VLC.exe 568 installer.exe 568 installer.exe 2720 VLC.exe 1868 VLC.exe 324 VLC.exe 324 VLC.exe 324 VLC.exe 324 VLC.exe 1460 installer.exe 1460 installer.exe 1460 installer.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 6360 old-uninstaller.exe 6360 old-uninstaller.exe 6360 old-uninstaller.exe 6360 old-uninstaller.exe 6360 old-uninstaller.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 2284 VLC.exe 3112 VLC.exe 1580 VLC.exe 4868 VLC.exe 4868 VLC.exe 4868 VLC.exe 4868 VLC.exe 704 installer.exe 704 installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3256 schtasks.exe 1784 schtasks.exe 5436 schtasks.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers system information 1 TTPs 3 IoCs
Runs systeminfo.exe.
pid Process 1220 systeminfo.exe 6348 systeminfo.exe 1496 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 6648 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567920145632057" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Undetected_____________________________________-Setup-v-am1kunX.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 3232 Undetected_____________________________________-Setup-v-am1kunX.exe 2180 VLC.exe 2180 VLC.exe 4972 VLC.exe 4972 VLC.exe 2720 VLC.exe 2720 VLC.exe 1868 VLC.exe 1868 VLC.exe 1852 powershell.exe 1852 powershell.exe 1852 powershell.exe 2004 powershell.exe 2004 powershell.exe 2004 powershell.exe 2336 powershell.exe 2336 powershell.exe 2336 powershell.exe 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 2724 powershell.exe 2724 powershell.exe 2724 powershell.exe 1556 powershell.exe 1556 powershell.exe 1556 powershell.exe 4800 powershell.exe 4800 powershell.exe 4800 powershell.exe 1544 powershell.exe 1544 powershell.exe 1544 powershell.exe 4140 chrome.exe 4140 chrome.exe 5148 msedge.exe 5148 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 5384 identity_helper.exe 5384 identity_helper.exe 2804 msedge.exe 2804 msedge.exe 5792 powershell.exe 5792 powershell.exe 5792 powershell.exe 5792 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 4140 chrome.exe 4140 chrome.exe 4612 msedge.exe 4612 msedge.exe 4140 chrome.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4140 chrome.exe 4612 msedge.exe 4612 msedge.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3232 Undetected_____________________________________-Setup-v-am1kunX.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeIncreaseQuotaPrivilege 1852 powershell.exe Token: SeSecurityPrivilege 1852 powershell.exe Token: SeTakeOwnershipPrivilege 1852 powershell.exe Token: SeLoadDriverPrivilege 1852 powershell.exe Token: SeSystemProfilePrivilege 1852 powershell.exe Token: SeSystemtimePrivilege 1852 powershell.exe Token: SeProfSingleProcessPrivilege 1852 powershell.exe Token: SeIncBasePriorityPrivilege 1852 powershell.exe Token: SeCreatePagefilePrivilege 1852 powershell.exe Token: SeBackupPrivilege 1852 powershell.exe Token: SeRestorePrivilege 1852 powershell.exe Token: SeShutdownPrivilege 1852 powershell.exe Token: SeDebugPrivilege 1852 powershell.exe Token: SeSystemEnvironmentPrivilege 1852 powershell.exe Token: SeRemoteShutdownPrivilege 1852 powershell.exe Token: SeUndockPrivilege 1852 powershell.exe Token: SeManageVolumePrivilege 1852 powershell.exe Token: 33 1852 powershell.exe Token: 34 1852 powershell.exe Token: 35 1852 powershell.exe Token: 36 1852 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeIncreaseQuotaPrivilege 2004 powershell.exe Token: SeSecurityPrivilege 2004 powershell.exe Token: SeTakeOwnershipPrivilege 2004 powershell.exe Token: SeLoadDriverPrivilege 2004 powershell.exe Token: SeSystemProfilePrivilege 2004 powershell.exe Token: SeSystemtimePrivilege 2004 powershell.exe Token: SeProfSingleProcessPrivilege 2004 powershell.exe Token: SeIncBasePriorityPrivilege 2004 powershell.exe Token: SeCreatePagefilePrivilege 2004 powershell.exe Token: SeBackupPrivilege 2004 powershell.exe Token: SeRestorePrivilege 2004 powershell.exe Token: SeShutdownPrivilege 2004 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeSystemEnvironmentPrivilege 2004 powershell.exe Token: SeRemoteShutdownPrivilege 2004 powershell.exe Token: SeUndockPrivilege 2004 powershell.exe Token: SeManageVolumePrivilege 2004 powershell.exe Token: 33 2004 powershell.exe Token: 34 2004 powershell.exe Token: 35 2004 powershell.exe Token: 36 2004 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeIncreaseQuotaPrivilege 2336 powershell.exe Token: SeSecurityPrivilege 2336 powershell.exe Token: SeTakeOwnershipPrivilege 2336 powershell.exe Token: SeLoadDriverPrivilege 2336 powershell.exe Token: SeSystemProfilePrivilege 2336 powershell.exe Token: SeSystemtimePrivilege 2336 powershell.exe Token: SeProfSingleProcessPrivilege 2336 powershell.exe Token: SeIncBasePriorityPrivilege 2336 powershell.exe Token: SeCreatePagefilePrivilege 2336 powershell.exe Token: SeBackupPrivilege 2336 powershell.exe Token: SeRestorePrivilege 2336 powershell.exe Token: SeShutdownPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeSystemEnvironmentPrivilege 2336 powershell.exe Token: SeRemoteShutdownPrivilege 2336 powershell.exe Token: SeUndockPrivilege 2336 powershell.exe Token: SeManageVolumePrivilege 2336 powershell.exe Token: 33 2336 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4140 chrome.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe 4140 chrome.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 3280 VLC.exe 2180 VLC.exe 4972 VLC.exe 1960 VLC.exe 2216 VLC.exe 568 installer.exe 1460 installer.exe 2720 VLC.exe 1868 VLC.exe 324 VLC.exe 5384 identity_helper.exe 5976 Undetected_____________________________________-Setup-v-am1kunX.exe 6360 old-uninstaller.exe 2284 VLC.exe 3112 VLC.exe 1580 VLC.exe 4868 VLC.exe 704 installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 1960 3280 VLC.exe 82 PID 3280 wrote to memory of 2180 3280 VLC.exe 83 PID 3280 wrote to memory of 2180 3280 VLC.exe 83 PID 3280 wrote to memory of 4972 3280 VLC.exe 84 PID 3280 wrote to memory of 4972 3280 VLC.exe 84 PID 3280 wrote to memory of 568 3280 VLC.exe 85 PID 3280 wrote to memory of 568 3280 VLC.exe 85 PID 3280 wrote to memory of 568 3280 VLC.exe 85 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 PID 2216 wrote to memory of 324 2216 VLC.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Undetected_____________________________________-Setup-v-am1kunX.exe"C:\Users\Admin\AppData\Local\Temp\Undetected_____________________________________-Setup-v-am1kunX.exe"1⤵
- Drops file in Windows directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=1440,8509018311586440791,11561566835856706061,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1500 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1440,8509018311586440791,11561566835856706061,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1892 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=renderer --field-trial-handle=1440,8509018311586440791,11561566835856706061,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Windows\NvOptimizerLog\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:12⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"3⤵PID:1000
-
C:\Windows\system32\chcp.comchcp4⤵PID:1576
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 12:03"3⤵PID:4164
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 12:034⤵
- Creates scheduled task(s)
PID:3256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted"3⤵PID:2784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ExecutionPolicy"3⤵PID:4492
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ExecutionPolicy4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "systeminfo"3⤵PID:5052
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1220
-
-
-
C:\Windows\system32\cscript.execscript.exe3⤵PID:5076
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\NvOptimizer3⤵PID:4436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start chrome "https://mediatrackerr.com/track-install?s=vlc&u=42668cc3-14b0-42ea-b428-5dd046c98877&f=Undetected_____________________________________-Setup-v-am1kunX.exe""3⤵PID:3304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mediatrackerr.com/track-install?s=vlc&u=42668cc3-14b0-42ea-b428-5dd046c98877&f=Undetected_____________________________________-Setup-v-am1kunX.exe"4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4140 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb2c109758,0x7ffb2c109768,0x7ffb2c1097785⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:25⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1876 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:5136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:5156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:5788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3720 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:6932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4908 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:7136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4900 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:6704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2440 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:15⤵PID:6768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5800 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6076 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵
- NTFS ADS
PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3960 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5160 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:85⤵PID:5972
-
-
C:\Users\Admin\Downloads\Undetected_____________________________________-Setup-v-am1kunX.exe"C:\Users\Admin\Downloads\Undetected_____________________________________-Setup-v-am1kunX.exe"5⤵
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5976 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "VLC.exe" /fi "PID ne 5976"6⤵
- Kills process with taskkill
PID:6648
-
-
C:\Users\Admin\AppData\Local\Temp\nsc96D.tmp\old-uninstaller.exe"C:\Users\Admin\AppData\Local\Temp\nsc96D.tmp\old-uninstaller.exe" /S /KEEP_APP_DATA /allusers --keep-shortcuts --updated _?=C:\Windows\NvOptimizerLog6⤵
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6360
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5668 --field-trial-handle=2488,i,15978518894694235676,1705693916865265772,131072 /prefetch:25⤵PID:3104
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mediatrackerr.com/track-install?s=vlc&u=42668cc3-14b0-42ea-b428-5dd046c98877&f=Undetected_____________________________________-Setup-v-am1kunX.exe3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb2b403cb8,0x7ffb2b403cc8,0x7ffb2b403cd84⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:24⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1868 /prefetch:84⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:14⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:14⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:14⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:14⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:14⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:14⤵PID:6452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:14⤵PID:6460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:14⤵PID:6972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:14⤵PID:7112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,7631331927485713817,16100615045758534973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5060 /prefetch:24⤵PID:6192
-
-
-
-
C:\Windows\NvOptimizerLog\resources\vlc\installer.exeresources/vlc/installer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:780
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=1516,7247243061234069619,8998816615818528970,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1524 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:324
-
-
C:\Windows\NvOptimizerLog\resources\vlc\installer.exeresources/vlc/installer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=renderer --field-trial-handle=1516,7247243061234069619,8998816615818528970,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Windows\NvOptimizerLog\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1884 /prefetch:12⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"3⤵PID:5052
-
C:\Windows\system32\chcp.comchcp4⤵PID:2980
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 12:03"3⤵PID:4924
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 12:034⤵
- Creates scheduled task(s)
PID:1784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted"3⤵PID:5312
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ExecutionPolicy"3⤵PID:3660
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ExecutionPolicy4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "systeminfo"3⤵PID:6308
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:6348
-
-
-
C:\Windows\system32\cscript.execscript.exe3⤵PID:6620
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\NvOptimizer3⤵PID:6668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start chrome "https://mediatrackerr.com/track-install?s=vlc&u=42668cc3-14b0-42ea-b428-5dd046c98877&f=Undetected_____________________________________-Setup-v-am1kunX.exe""3⤵PID:6744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mediatrackerr.com/track-install?s=vlc&u=42668cc3-14b0-42ea-b428-5dd046c98877&f=Undetected_____________________________________-Setup-v-am1kunX.exe"4⤵PID:6828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb2c109758,0x7ffb2c109768,0x7ffb2c1097785⤵PID:6848
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mediatrackerr.com/track-install?s=vlc&u=42668cc3-14b0-42ea-b428-5dd046c98877&f=Undetected_____________________________________-Setup-v-am1kunX.exe3⤵PID:6800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x128,0x12c,0x130,0xf8,0x134,0x7ffb2b403cb8,0x7ffb2b403cc8,0x7ffb2b403cd84⤵PID:6836
-
-
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1516,7247243061234069619,8998816615818528970,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1960 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5712
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=1540,14965263451392329449,437393696298326241,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1536 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1540,14965263451392329449,437393696298326241,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1628 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3112
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=renderer --field-trial-handle=1540,14965263451392329449,437393696298326241,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Windows\NvOptimizerLog\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"3⤵PID:6408
-
C:\Windows\system32\chcp.comchcp4⤵PID:3184
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵PID:6968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵PID:6736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵PID:1764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 12:04"3⤵PID:5972
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 12:044⤵
- Creates scheduled task(s)
PID:5436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted"3⤵PID:3928
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted4⤵PID:1436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ExecutionPolicy"3⤵PID:1208
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ExecutionPolicy4⤵PID:228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "systeminfo"3⤵PID:4180
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1496
-
-
-
-
C:\Windows\NvOptimizerLog\resources\vlc\installer.exeresources/vlc/installer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5d243595c4ef1101477b8ff1a2f5708db
SHA129cf9948962e4b0624191a8a34fc4b26335ccf33
SHA256a19bb8131057d1078fafbe393272208aab575e4d5e1318a6506e0c29d05ae4e8
SHA5122d6bba769e6923d664eb6ff960452fe187b567b74e8800eb09c6063353847cf9463dfad7b4014b42e5af12da7c53d0a824c8896be305e8e48818be138d0c9a9d
-
Filesize
39KB
MD5e3b7c1f55a368984a5ba8cba843ed6b7
SHA13362755d9f77b6eb0801ea9b3301a24ee63fb22d
SHA2567bd1a844aaf30cf44b61e3e9266a2db03f61dad8c851d78b170df9034ceecce5
SHA51264b0d6689a59da5bf40762169b925eb0dc0d47d0f60c8a83c3cb3696af2c036eba4fb7336e77b99509d9c80ec3b942649c62950c179185ebcbaa132804bb133c
-
Filesize
576B
MD5ca5f7724de734fb4267367ccabbef319
SHA1c9c7dcf09472fa65744cbd8fb612d911d27c0a51
SHA256e95c4712d1220bf0fcb2fe739ae9db0f351233b645296c643156eb17e85d2be0
SHA5127f5173dc4498675a488b89f7b1d089f507c185dfe96b3c468dfed1dbeb51b8171ee6a6b1b54a7c7a7c5168ba3d1e7eea89f10b65568123812ff9c26f5d3b2340
-
Filesize
744B
MD5a03f1eb7df82f557dc0f637252bc68f5
SHA1cb1b767abe453344377f6379f9b54971f2a58c57
SHA2566d313d1af5e5aac89edc72693b522e015ed736306225af8331f7b79f5aafbe9e
SHA5125b541af7ec6a8f21aa2aeae348ddf2e41d00a2f0418ed760f898f48502031e47d275c01f9f7ecb651fe77a18885d4f3d68f5e75ebf167b23392f97ff5debd44b
-
Filesize
2KB
MD5a944794cc8c9d7906638cd2c25b8e069
SHA1c12d798156602dbd3b7366431dc94ccd51d6388c
SHA256067e0746859c4845f46885cfba87772253533811fe9c5e716acf4dd9ed9e8769
SHA512a88a17ce2bb9852f6078108e0bf9404050fdeb5c26d5a7af4dca582ea880752653862b2913d3f0294a08f712a198f2cbc8e8a165d1fc7e7c8acd1858a4b073cd
-
Filesize
539B
MD58b4efcc36e04a43a8066e8bec4426ea5
SHA11c6577013ab0060b0f738a0bb1fcfa1dc542ad6f
SHA256890cc90e1709715553176a3a2a21cee11d1a26dbb74e0fc44e0170c35bef2799
SHA51224bb5b9cf3c7cebb426b35d009f69e1b26dd1958227f9ffa8b4eeceb35a8f395afaf57e86ba60a6947efc6fd0f4d2ae620a5d014ce93cb7b42e2fbc4f88acdf9
-
Filesize
1KB
MD58a2eb8b33c02e46e07cf0eebe061c519
SHA1d33565d97c59b41bc657aee6fceb45f6485e76e6
SHA256e36834bf03456d3fbeb95be013818da70714db1acb77079e8928c7f67a2ba26f
SHA5127a096ff18adb245275ad3b08ce52c3211ee56e33c6b5e11c3fa25d7be10833732e23504123f812939110782f7388d491b067d4661ee43d4e2e0a41648bcd579d
-
Filesize
539B
MD5c83408273a1d270c07e50516445ab860
SHA1d86888f79a40caed933c9983cf6cb5f7123ec65d
SHA256f0186f26c5a75c94356b6ffb490aff6c893da26f69463d5d93ec8cc40b289d91
SHA5120bca5d4050964b4ecedac82ab4e334b0184506f4edcfd20afe712f10bd63b62d8b19ac47886d81efaadb9b89d93498f977f9b727ae5f4d8cf11fcf5591fd50c5
-
Filesize
6KB
MD5ca5655d5dc2e5926bc7dcd6855535518
SHA1604673be36ac4526102672240b0fd61f728cc505
SHA256686e2e2cf9848d6f1273716a55c28e3f7c23156699014f93c6d4089369b34a64
SHA512c319bab5765e35ce127469eb456c696866b624f7dea7f7aad747470c5f051e5c856c23431b8caab59d79d8350dde8fd9204dfa3d6a447a556f9f3314546062e9
-
Filesize
7KB
MD5536c46b321d97d56a4e9c4f56161359c
SHA17859a04785572e6dfe08e3b881aa74c9a4713976
SHA256af28240164ad6db0e237c3dee255bba5e4c0cc98350ba65c5b76c7ea91a3e22f
SHA512d38d813f3d9969f2a67e56c7c17c106dddb7f66e2cfd4335e7909693872431cb5001ee8ddc7d2446ae5d00f5c8575abce9545237f7a884d3a777ba2a864e743a
-
Filesize
6KB
MD53568227168ee4eb0a26dbdfb9d953144
SHA1959ffd33a250b8436dbadf98ec832268741d78b5
SHA256387d858dfa68b426bb0efedec138da54f728b047b9917f4c6c8da3a03dde8205
SHA51253be76811235c38e5882d805e235c4d54dcb7f2937211de07e880bf0c3ae6fb8ffe3b06f4a9f75cc7161cc8e9d5921f394788324f8353a3fddedcfc6533f8b05
-
Filesize
15KB
MD5559b4f20f5030ad4cb69bc0565e23501
SHA14653ef6096c242d595a9796f5fba0ddf7bbb3108
SHA256f0220463047ac10c49a868d590d66a11914e14072180a7ab558e2d9392c1888e
SHA512d5c33ecf8321d99e618af4bca32e6ecad72256b838649afb00ac0650da17b3c98c8c1a92234c7360b76a3db8efd25e56a113a03dbfe2244047fd6c9d52b2a0a8
-
Filesize
261KB
MD55428176722307bedafdbd5c8e55745e9
SHA197737be96fc9d131fb0f3e3886669700f6cb8def
SHA25643f068f656d89b20b3d2ac04fe4c36ab67cdda6d5f6e5c764eb4882df5a2c56f
SHA5126c2fcb97a73d447888cd7de6468770a6e0a0095bf4e728f9635b67ce094e80e5e82ca20b45e9cfa592c505c364cb21a893523920e6093b27cf49c96d4d4de809
-
Filesize
261KB
MD589515396a013c23f56d83047b658e9be
SHA15d4dfc26dfadf21a6fb39096d5e7d0e75c9cbfb5
SHA256fdbbe0070c7bc9f545ff74b597dd47ccbc896e1dd5ac2b8c605c8b97a33fc017
SHA512f7e127a5457cd6032f3350ee5cf89d2fe2e9491c9d79aa74bd72a76b5153379050b6d1a145fc2e4135d5b7c73e777eb1a6bb60af98f7c827a58da05002588167
-
Filesize
108KB
MD57003de885b632c5d67ccbc63a727604d
SHA1e0d8fb80efcc9d2b89ff45376e8f2ed16f170370
SHA256504309026bce4798135f3578d627c2fc85d43d08d686621ef4bcacc50b6830b1
SHA51217e76b512c5a2aca5f920372eea67c67fd61740a012ca6d0e742a24ec0ed0f9fcb1d31d90c8287f69b9f3246af7d3b9eb22d704945ac6ba556990adc824db32b
-
Filesize
90KB
MD5d3db1fd8deb7ed401aacf4ac63af2adc
SHA135a14aa41fa3f600f5db8eccd88f103673e779dd
SHA256d81f64f2d800201300a66594362809457d8c7d6cec1727776de0380b68ddeefd
SHA5123625df61ed14ab32a841774c32519f578223b06a0651a6b710e393333c6a848db8308a952e1142e63a7642c4cc52f8a6cb36e08cad18254109b90c56c7e71f4d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3KB
MD505850c6c0442ea6966fe2a888f219f4b
SHA1e6b1c8eb783b307672a6f06b785a7e9b78633b46
SHA256f51b54c5f5074076216b2d0a3e66c13e80d8f1da311614ec15c9170dff11ad5a
SHA5129db20e00e103700f67256568e38f9b37f29af3c30f3454a38b3e033c6c2f6bd796c5b5a8c5faa98bb45d7521d76c2bf323d503b8a0196cacbd701167d441c6f9
-
Filesize
152B
MD5ec7568123e3bee98a389e115698dffeb
SHA11542627dbcbaf7d93fcadb771191f18c2248238c
SHA2565b5e61fe004e83477411dd2b6194e90591d36f2f145cc3b4faa20cf7ae266a75
SHA5124a53fbbd7281a1a391f0040f6ff5515cedf6e1f97f2dae4ab495b4f76eb4f929dcda6b347f9bf7f66a899330f8897e1ed117314945d1de27b035cc170fa447d3
-
Filesize
77KB
MD5cb5d7f189d6605fbda6a04c88d3f6285
SHA16319250447f948bd24b319f18fa0d05d8fb4eb1e
SHA25618f8ba508b2f446625c8f672f2663b8138d27b09bebdc106acb0a12f09e073ce
SHA512a1d8776d545f09a1cef5840b54eedf9d37504365aaf210dba45191ed207a6ae8fedccef11c390ba834f6406ab88d1dd04d98ee2c5c28bdac6100a961b7ef9318
-
Filesize
91KB
MD5195676dba3a1e51bfed142df57c1fa5d
SHA1f11bf676c6d2bc5e90d6a357f8c12e25f29d1325
SHA256b13e08163fcde72079e34bf19ca554394a75af948e09505fdef530b1da5c9562
SHA512d9a40bddefa968f09497d7291f080146b5a358d27183ec7aada5f0ccbe203a1f387ebb39f7ae8b058d6c930099daa41695c5257171a465f2cf24f84107b98a6a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD53f8f39ac7551a6e26c66ae20e782fb2b
SHA165646c624d6d296322bd86409b5636e654a0930c
SHA256dc6742830bd36b7379bc3f4841b9fcd304f2dd2c3e55613e308c0ccf1b16f2a4
SHA512f5cf658efa951c0438d7699182ce59be4fce1127bf7eb4dba56817e8675bce99dcdf4f7a5c0e08eee155d81696aaec0f30b9ea086de1efae28277c3e22082063
-
Filesize
4KB
MD502b9e8d53598ebb46da997f20ab677cb
SHA19e40d399297335211557f4fe34ecc16c24a37454
SHA25640375bcdd4143d39141c2034c3459f334eac112dbf13ede395391bbec72b8e1b
SHA512cb9a0e94112ed0c83181d399e4f87b8e2920fd889ea11be3de233e63b6e331680a45545ca6026dade30077bccfe8f9f4dbd7da63a848da9996ae3a3ef1031835
-
Filesize
5KB
MD52e9682f314d30a1b7ed1408d2eeb2cca
SHA1d443fb150570106bae8d07aad59b0fab59aa19f9
SHA256719a5b409d3c9ed61b84b91033b7c0de11ca85a59b68a35369abc4a3555dcc1a
SHA51259c784cf7c2bc6e349b3cf255a5ca54626bbce886fdd4289dfac5c674c83ea064866fd961c3c445ff1ded000045d014eca204a303875e4da1e06fc4488e96d0d
-
Filesize
5KB
MD53d87ba14b33689e4df039c6529b85483
SHA1cf380b08b5c4838c769ad49846f77b7d9c07c013
SHA256f574483e8ec571114a09f067f82dc600433d38524f242543b1ad0f6603c09adb
SHA51212e1b379233e402d52fe5a34721c24654de550d6b1f3b7a99b1c20e5ea7f4c5d0d4d2ad1852aa1e6a2e4dc782420a445db944968fbc6940cf23ec36f87518cce
-
Filesize
5KB
MD53851f22d860f6186cb805bdc96db55b8
SHA10d4d844d3cc29d6a1579f71b7164c2e156d03f0f
SHA2568ef546f690ee23ecf33017046b7e56d5ab334552f7b2ac36e78271d8299e20c4
SHA5129009a238e765ed42f70d9f22df68fc26a32c816fbe01df0633f4efe6109b0fb1d97e12043d5fa749a8f776e5d9b6c431c9567b48ed24d1d6c3817d595cb7a3c5
-
Filesize
25KB
MD50ba15f72ffb0a37243558588d3e78221
SHA1814bdfffd723f7de9f8d6d6a0bc8d85a9f275cc0
SHA2563d0223e1f8bb35870db41872cfbbe467f65bf9a1208dcb4d4ad874e250ccc10a
SHA51202b168ef9cc226a08955092173c3745a55b28faa438b8152acb90d3bc1d9f433de7d8341def8b452db1986392a59cabc7c69689ad00825c58371ca78021183be
-
Filesize
372B
MD52a3a6c836cf96cc2b5192ff3e50bb401
SHA1bded007d61ed99b926c41ec113356a94d5587b80
SHA256978c5645ed22d7b9d0a2b37639b3a39a79a9bc6033dab2e74aaf44e7ff40edaf
SHA512d4126bec31366f63df6d6c3201f93f63af14d6d85486da7a844f376478994c7a8fe764d698dd16632a1563858563d5154040019d3bc6ffb0dec43a2963c69e74
-
Filesize
204B
MD544484ace0f9c8467560141bada6640f9
SHA19cc5c4a01495d5164500984059591c9dccc74741
SHA256050e4c9a3fec0fa72f77c39597bb4a9f0686b35b729b07a1d58b96c6a663639b
SHA512355417a4f4aa58c29ccb28c120b32e9e6538a92cdc040086b209c84b63d37b76427b28b3476df55cd6ad8407368c5fc3bdb8e0180cd56d5e6905cabf4cacc3d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD510b0b21e9706fc70ac465ca8ac1dd015
SHA126e4861f653d244f8c5eb87a940b1e945f7186cd
SHA2563d99dcdd4d980dfe2126d7fc80e63d0a831185676aca84d51dabbac957cdcfaa
SHA512813739956a893862cdfb5f5e037a2cb71c85006aeabcbdfb10de06592b99eab47730362b8a6109104f370a5e0ec35f2b209d17f40cab466d84337ed749387bc9
-
Filesize
11KB
MD5bd12f99b9002e8a34447bb54d7fff56b
SHA1eb5037205c6be1592ee753d5d85057e12e9033ab
SHA256346335523c3502fb32533ace3f724f1a7481abd8d323deadabd3b99edc3da923
SHA512df25a477b8514570550dbc7d8a34c64bf519ee6ef501d81d02df33d353bda495f661a083a2c70e7b3f788416fff93698e08416539aae2f94e9ff52d5b76c6980
-
Filesize
10KB
MD5f3bce5f2ee31fd5bb4e0e2eb205362b9
SHA1549fbf11398bbb233a9bf4a81775fde9e582ad16
SHA2566144ca8ed58300a6dc76d8a16d91dbb191a72f8fe32ba3f06b9df623a942233d
SHA5124da6e8558acab3abe89359556d210caeb66a4061ff8efd1800b4c0946b5f478eaaa8db6a71552c17f4bbce3d6a8f8b36c6e1b9fcff0b1388e9cada4a31ba7de3
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5ec0504e6b8a11d5aad43b296beeb84b2
SHA191b5ce085130c8c7194d66b2439ec9e1c206497c
SHA2565d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
SHA5123f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
Filesize
238KB
MD538caa11a462b16538e0a3daeb2fc0eaf
SHA1c22a190b83f4b6dc0d6a44b98eac1a89a78de55c
SHA256ed04a4823f221e9197b8f3c3da1d6859ff5b176185bde2f1c923a442516c810a
SHA512777135e05e908ac26bfce0a9c425b57f7132c1cdb0969bbb6ef625748c868860602bacc633c61cab36d0375b94b6bcfbd8bd8c7fa781495ef7332e362f8d44d1
-
Filesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
Filesize
99.0MB
MD5fdfe1ece23e984d00402431d082d768e
SHA19405760465c3f8abc4d08473219deea9d902e2e6
SHA25699168cc1971f35f0cea1ac61d90e3aef6cc177a510bb90203350ac2c808c73ee
SHA512d0979e9359d7c15910522aefb5e5e23eeaacf0335fa299e09c9c6ddc962c1a224bdf3372d0f286b181182fc893bcd93558e360fb6f6645613c9a0875a89a8b49
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
7KB
MD520850d4d5416fbfd6a02e8a120f360fc
SHA1ac34f3a34aaa4a21efd6a32bc93102639170e219
SHA256860b409b065b747aab2a9937f02d08b6fd7309993b50d8e4b53983c8c2b56b61
SHA512c8048b9ae0ced72a384c5ab781083a76b96ae08d5c8a5c7797f75a7e54e9cd9192349f185ee88c9cf0514fc8d59e37e01d88b9c8106321c0581659ebe1d1c276
-
Filesize
26KB
MD54f25d99bf1375fe5e61b037b2616695d
SHA1958fad0e54df0736ddab28ff6cb93e6ed580c862
SHA256803931797d95777248dee4f2a563aed51fe931d2dd28faec507c69ed0f26f647
SHA51296a8446f322cd62377a93d2088c0ce06087da27ef95a391e02c505fb4eb1d00419143d67d89494c2ef6f57ae2fd7f049c86e00858d1b193ec6dde4d0fe0e3130
-
Filesize
12KB
MD52029c44871670eec937d1a8c1e9faa21
SHA1e8d53b9e8bc475cc274d80d3836b526d8dd2747a
SHA256a4ae6d33f940a80e8fe34537c5cc1f8b8679c979607969320cfb750c15809ac2
SHA5126f151c9818ac2f3aef6d4cabd8122c7e22ccf0b84fa5d4bcc951f8c3d00e8c270127eac1e9d93c5f4594ac90de8aff87dc6e96562f532a3d19c0da63a28654b7
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
48B
MD511f777a7ee0cf69c265490a9a3236332
SHA15825450b930f2ea23df93e5af6c7280e48e0853a
SHA25662816b2f187c6d6fcba4c29576f2c95658f09f75b7ad5494b1ddd500f7514ed3
SHA5123e7455d1984b82c8aa26d049651cc0f15e8ab02ddf1faea4340776c6ed1bf54f02d45b1c8dfba9e1ed4646f67dece67a3082fdfe959f2a437feb0cd974c0041e
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
86B
MD5d11dedf80b85d8d9be3fec6bb292f64b
SHA1aab8783454819cd66ddf7871e887abdba138aef3
SHA2568029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67
SHA5126b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0
-
Filesize
176KB
MD5be867803d50044eacf0b4431d4f8ba73
SHA18c24006b5268fc44edd52f81dec7e225c0ace63b
SHA2568ac4bd12f48777baf67a6724ba6ffe0ce0c710f59c43d691e69b0c703c0482f6
SHA5126e581023614ad87cce45939638c8a185f67196b35af291f5b97cd66a08c1dc6cf6a1b52d818e75aa606412b4340d90f2a9df880c8fcf139e3367b9a78c9546b0
-
Filesize
125.1MB
MD5031021334754b192f286d0c1610ba5a1
SHA10cdc202ba17c952076c37c85eece7b678ebaeef9
SHA256c11b411ae2ce44803a4a2e1f14afc93f11c8b111fdf0205639be5141a28f3a89
SHA512eb0a34610e7479902d6498bcd75c71b4efed77b1b07dc44c22d1c59897b18f62d4399a710d29d9665b830a50c2f0703c5ecd5cdcd2751b50b4e416581ff08bea
-
Filesize
123KB
MD5a59ea69d64bf4f748401dc5a46a65854
SHA1111c4cc792991faf947a33386a5862e3205b0cff
SHA256f1a935db8236203cbc1dcbb9672d98e0bd2fa514429a3f2f82a26e0eb23a4ff9
SHA51212a1d953df00b6464ecc132a6e5b9ec3b301c7b3cefe12cbcad27a496d2d218f89e2087dd01d293d37f29391937fcbad937f7d5cf2a6f303539883e2afe3dacd
-
Filesize
183KB
MD51985b8fc603db4d83df72cfaeeac7c50
SHA15b02363de1c193827062bfa628261b1ec16bd8cf
SHA2567f9ded50d81c50f9c6ed89591fa621fabbd45cef150c8aabcceb3b7a9de5603b
SHA51227e90dd18cbce0e27c70b395895ef60a8d2f2f3c3f2ca38f48b7ecf6b0d5e6fefbe88df7e7c98224222b34ff0fbd60268fdec17440f1055535a79002044c955b
-
Filesize
4.3MB
MD57641e39b7da4077084d2afe7c31032e0
SHA12256644f69435ff2fee76deb04d918083960d1eb
SHA25644422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA5128010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5
-
Filesize
2.7MB
MD55c2e6bcfcffc022cfb7e975ad4ce2ea4
SHA18f65334f554b02e206faecd2049d31ef678b321d
SHA256d068695dc8f873caab1db51c179e9696dda2319fa05c0f2d281f9979e2054fc2
SHA512b5fe0039e1702375a6e1f4ef7bfb24d0acc42c87d02202a488fccf3d161598549055d2ac0103c95dbbc0e46975aed30259edbfef7ce77d00f1de7c1670c00959
-
Filesize
9.9MB
MD570499b58dc18e7ee1d7452a1d7a8bc6e
SHA141c5382f08c6a88670ce73a20c0dcdb3822f19e9
SHA25602db39ba465fc8b7a4cd280732760f29911edde87b331bf7cea7677e94d483e0
SHA512a80939e9809bb7d20f00ad685c94d5c182fa729616c975e605abf09afb58376be73a49fefa35b75ed1a284eccf208af7656c8df44c5959df7eaf51367d232dc6
-
Filesize
436KB
MD52fe9e551c93156baf537483671ec4ad7
SHA108ce2344b2e0a78c2af637f0eae46b948661d5a5
SHA256f231525ba1ea2522552a722620bced187357d66d945f0cec067c5d858950ea61
SHA512f93181f1f2268cc380dafef02a93899cb9a19f3287a918bf6ba8eaa69190627d2e2fb0c82b693471e3ca63fbcb07c44212268c1357a5a4cf594a3bd8973eefd2
-
Filesize
7.5MB
MD55967a9234ec54d734b31cfd12cb67faf
SHA1536840ddb29ead51d43a506fd493b48c436097d6
SHA25648ec76bac1ff6647096a9532ac21b4a0d7c6c9c24613971aaa201cce452ce4ce
SHA512cf8e4c3a838b58a568639ab2778800d776e0171dc34e3b82f537adbadceaa3c292240ec7d8561b5a85df3caef6e001a07ac19e280a5bb8b0607f8ba767461479
-
Filesize
85KB
MD56bbeeb72daebc3b0cbd9c39e820c87a9
SHA1bd9ebec2d3fc03a2b27f128cf2660b33a3344f43
SHA256ac1cdb4fb4d9fb27a908ed0e24cc9cc2bd885bc3ffba7e08b0b907fd4d1a8c4b
SHA51266944fb1abcc2a7e08e5fd8a2cee53eb9da57653d7880aea226f25879e26379f7d745ebf62a3518378fa503f3a31b3ea3716f49fe4c7db4f4af0228b81b53a10
-
Filesize
4.9MB
MD55507bc28022b806ea7a3c3bc65a1c256
SHA19f8d3a56fef7374c46cd3557f73855d585692b54
SHA256367467609a389b67600628760c26732fc1a25f563f73263bc2c4bf6eec9033df
SHA512ae698d4feacc3e908981ee44df3a9d76e42a39bf083eaf099442ace2b863f882b43232e26e2c18051ca7aec81dccef5742acc7b82fb0cda2e14086b14d5a9a26
-
Filesize
4.6MB
MD5040a8280b01b5a029e50c5d141d555ad
SHA1ce103568d6ae6456f1d1d718929b6972c0bad1b4
SHA2566b6309fe0c4ca9c73626f1435ed3332656d9e6b1e500fb85af0ebf9842813485
SHA5126706c453509bf718d1870c98a49842743cf2e49d22225a3d33051808a3f1045c7d0c065ecafae75f1bb57b4ef4436aa76774ff6553fddf3739bc47d2e9400ce8
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Info.plist
Filesize960B
MD5a0e3bdbe9880037f3c31443251b43932
SHA15786a415fd2dbcc2250751a15801225b88ab7993
SHA25636f93f53854708454d6f6f05232e28b17b1dbfbe94cc194470e449c4e7e9dba3
SHA512355863267b4e48ae9575ca1baab1c2a167fe60e7ea568df52ebfb317c89e0511b5c88f13fbd55b880b4b53ce0a688c0c005412bc31c67c0e895f123f713c75f6
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\MacOS\applet
Filesize24KB
MD5bb97e2ae9bc6bf8e171d26e40f59361f
SHA19bcd87d5bca1e18efbd118d93d76002aa12baa12
SHA2561f93d65a2692da30ba3997fdfbfbbe5880c2ea76d6cab9102faa8a6431350e02
SHA512606111b939b1fbe3008f90af616470e9c9d320a70021348540c03d32355892c5989df28d08158930bda313d3f0d9549aaaaa7ea6c1788ce4e283340abb954163
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\PkgInfo
Filesize8B
MD5db6f4017a24d2cb070ad3de12adb78f4
SHA194fdbee3e734a2df38fd68be4837e8fef066f005
SHA256412d70757c4fdecdd73355ac4bb3ba80c6705110d15cfbc9fe925e7b4faf7962
SHA512decf0a4297001fe030bbeba5748a72e9685a4590c83a90ec512dc28412a4a4f89e8ce97d1c8824309f50d9ea111e42c9428714017bdad47ff3fd7d241e19a352
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\Scripts\main.scpt
Filesize526B
MD535aaeb5ecdda5864920916f04d2ec307
SHA1266ee05dd4a3e1869e318825c97c3290ae4439e5
SHA25621ff89939fd03764301b1ab1cef0baa277bd2245fc5b9b4b5aed08c1efedfff3
SHA51200a609155a776cdfdb0a0cf4c6ea43e0dcb9a8ca2d3b842dacb426a83b835c053700388912b4f1575150167167aab442fcc5b436e1326d81c6bb8e10ac3a1520
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\applet.icns
Filesize55KB
MD59ace56046961a8104d0f5121872cc010
SHA180fe32788daf39b1c16ff4c471191d1d212423fb
SHA256dd9aa7a2c61535a9a49645f7f049a5581be150456ec1f18193d43ea0b6cc273a
SHA512330ad8371fccf39efffc847a32be32cfea8a8693474d7d0537e80c0b0200ee8561a732fb98072caa5a4d65382b417d78430586b640266c811c51f3ef3ac1529e
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\applet.rsrc
Filesize362B
MD54cdcdd8071d02ede6173232f7bb19bdb
SHA1b70c045a79039e50417958fddb7fea8b4b9efbfd
SHA2566f2a0cd9dbfc52578dc28a25abe671d0ae63c36cdd06b6be8f08c56f02fbba13
SHA512049c467eed33d2d19ceeea6a00218dc3236ff27310277416cf8891243d774498172755cd7d5f0433ee0e8dc677fb350a25e44d9c763498e4906ab13dd92074f5
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\description.rtfd\TXT.rtf
Filesize102B
MD5cb51e6fa885502ba84f7d85355106e28
SHA1def335a818a1ade9e99cfe7144e83bed2723212d
SHA256ca58c48c0f35c7768863f31357f68393f7709e9810818b3a06b3004274f03a56
SHA51233dbeb9c18e2a54c7c41282d73284b0a8c6d3ed0bb5cc556ce5d02ef0c670c86b74b46589750b866d2f148ff3b7dea655e1f3403f50847d527de4d24a5cbb905
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\LICENSE
Filesize1KB
MD5ddbfd5852e8bd2337f0cc8a40d9f4d80
SHA18479b510d385d3c4be23f6ffad3b1be2db329179
SHA256bb6f80cccd928864f67dc6ddba48443dfb51191b9d6506b01823ec05c48a151d
SHA512875490e7ff4c9bb387e48223ed91b4d5f18dfbdc27f045ab7fb302d4882c094371fed961f9eea85673ab41aa8fdd785412cc91fa3282270e24787949304bb146
-
Filesize
27KB
MD560321adade3f5c1dfd761800fe1909d3
SHA139add6e5c395d04d3450874cbf79050d91674d04
SHA2566a669fdc9331a3e8c4a75ff456bc66f96e85a8dfa3d28828307fc68d92e70fb1
SHA5125f3c21dbc86318d0a3786313a433ae95a58241e7b8053ab9f2292a96e83b569219a6406b39d2e3a832d05314437e1d8db0c128858fe0a4b4369a65500c63e77e
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\libgksu2.so.0
Filesize68KB
MD56dbc4226a62a578b815c4d4be3eda0d7
SHA1eb23f90635a8366c5c992043ccf2dfb817cf6512
SHA2560eb70bd4b911c9af7c1c78018742cadb0c5f9b6d394005eaeaa733da4b5766e5
SHA5123a2836f712ad7048dbeb5b6eec8e163652f97bea521eafcff5c598cbedf062baefaa7079d3a614470ef99ec954dac518224cb3515ca14757721f96412443c7c4
-
Filesize
42.4MB
MD514becb7840eb1d3d46071d2ee65c7be8
SHA1ff6e6f9359127f836a03dfc2b8bc9ba651c627c4
SHA2569737843c119905be767de5e94e398be1eb145b0cc6a5a02f057d4022b80da4d8
SHA512717289d3b514f4daa6b1cf97705c876bbe89fa215084ba8e1abeef3770e0a620d04127ef8de1f2d89477e1fab355526ed584ed3f9c7ecaf0c7d24a9bceee8248
-
Filesize
160KB
MD5b64c1fc7d75234994012c86dc5af10a6
SHA1d0d562b5735d28381d59d0d86078ff6b493a678e
SHA25631c3aa5645b5487bf484fd910379003786523f3063e946ef9b50d257d0ee5790
SHA5126218fcb74ef715030a2dd718c87b32f41e976dd4ce459c54a45341ee0f5ca5c927ad507d3afcffe7298b989e969885ed7fb72030ea59387609e8bd5c4b8eb60a