Overview
overview
5Static
static
3Setup-v-bqa67dU.exe
windows11-21h2-x64
5$PLUGINSDIR/INetC.dll
windows11-21h2-x64
3$PLUGINSDI...er.dll
windows11-21h2-x64
1$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3Uninstall VLC.exe
windows11-21h2-x64
4$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDIR/UAC.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...ss.dll
windows11-21h2-x64
3Analysis
-
max time kernel
198s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-04-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
Setup-v-bqa67dU.exe
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win11-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win11-20240412-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240412-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240412-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240412-en
Behavioral task
behavioral10
Sample
Uninstall VLC.exe
Resource
win11-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240412-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240412-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UAC.dll
Resource
win11-20240412-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240412-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240412-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win11-20240412-en
General
-
Target
Setup-v-bqa67dU.exe
-
Size
704KB
-
MD5
d1fc9e6d71a4867ab71af5566e525ba0
-
SHA1
593b10280a926134839feb8e2f9d0da9ee9c0593
-
SHA256
21be0a068d7d1b57578bfb2ed850b3f3b1cfe4a4c47981ead95abdb8c20278fe
-
SHA512
c82a23e5e0e3a38e32fc08401890852a71ec90640bbfb944ed7d45812493a53d2be2c0e4373692e52c77d666b8ae72cd0d15c3dc4bc3cc52887ad4589820658d
-
SSDEEP
12288:iOIVD3gyucpjRKaDPNKT1zH3ptaR1sDfOQSvJqFZ6rOIIzVFA4+M:iOIyyuUjMaDu173pG1szLSvJwSOZBv
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\NvWinSearchOptimizer.ps1 VLC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\NvOptimizerLog\locales\tr.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\assets\win32.png Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\regedit\vbs\regDeleteKey.wsf Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\ro.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\te.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\assets\linux.png Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\PkgInfo Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\zh-TW.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\Resources\description.rtfd Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\gu.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\th.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\MacOS\applet Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\LICENSE.electron.txt Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\am.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\lib\sudoer.js Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\regedit\vbs\regCreateKey.wsf Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\d3dcompiler_47.dll Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\de.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\he.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\webpack\chmod.js Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\snapshot_blob.bin Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\.eslintignore Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\Resources\Scripts\main.scpt Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\ffmpeg.dll Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\icudtl.dat Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\applet.rsrc Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\Scripts\main.scpt Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\vendor\win32\README.md Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\libEGL.dll Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\el.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\lt.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\Contents\Resources\applet.icns Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\Resources\applet.icns Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\webpack\chmod.js Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\webpack\config.babel.js Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\regedit\vbs\regPutValue.wsf Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\LICENSE.electron.txt Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\en-US.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\es-419.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\hi.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\sw.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\VLC.exe Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\el.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\pl.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\sk.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\sr.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\gksudo Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\regedit\vbs\ArchitectureSpecificRegistry.vbs Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\snapshot_blob.bin Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\Resources\Scripts Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\vendor Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\index.js Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\libgksu2.so.0 Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\vulkan-1.dll Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\Uninstall VLC.exe Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\regedit\vbs\ArchitectureAgnosticRegistry.vbs Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\da.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\locales\sl.pak Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\locales\zh-TW.pak Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\assets\linux.png Setup-v-bqa67dU.exe File created C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\LICENSE Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\dist\bin\applet.app\LICENSE Setup-v-bqa67dU.exe File opened for modification C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\applet.app\Contents\MacOS\applet Setup-v-bqa67dU.exe -
Executes dropped EXE 5 IoCs
pid Process 4668 VLC.exe 2044 VLC.exe 3948 VLC.exe 1552 VLC.exe 4848 installer.exe -
Loads dropped DLL 21 IoCs
pid Process 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 4668 VLC.exe 2044 VLC.exe 3948 VLC.exe 2044 VLC.exe 2044 VLC.exe 2044 VLC.exe 1552 VLC.exe 4848 installer.exe 4848 installer.exe 4848 installer.exe 4848 installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 372 systeminfo.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584746981008862" chrome.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 1068 Setup-v-bqa67dU.exe 3948 VLC.exe 3948 VLC.exe 1552 VLC.exe 1552 VLC.exe 3892 powershell.exe 3892 powershell.exe 2572 powershell.exe 2572 powershell.exe 2788 powershell.exe 2788 powershell.exe 4244 powershell.exe 4244 powershell.exe 4244 powershell.exe 4804 powershell.exe 4804 powershell.exe 3336 msedge.exe 3336 msedge.exe 3844 msedge.exe 3844 msedge.exe 4032 chrome.exe 4032 chrome.exe 5968 msedge.exe 5968 msedge.exe 1632 identity_helper.exe 1632 identity_helper.exe 4848 installer.exe 4848 installer.exe 4848 installer.exe 4848 installer.exe 4848 installer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1068 Setup-v-bqa67dU.exe Token: SeDebugPrivilege 3892 powershell.exe Token: SeIncreaseQuotaPrivilege 3892 powershell.exe Token: SeSecurityPrivilege 3892 powershell.exe Token: SeTakeOwnershipPrivilege 3892 powershell.exe Token: SeLoadDriverPrivilege 3892 powershell.exe Token: SeSystemProfilePrivilege 3892 powershell.exe Token: SeSystemtimePrivilege 3892 powershell.exe Token: SeProfSingleProcessPrivilege 3892 powershell.exe Token: SeIncBasePriorityPrivilege 3892 powershell.exe Token: SeCreatePagefilePrivilege 3892 powershell.exe Token: SeBackupPrivilege 3892 powershell.exe Token: SeRestorePrivilege 3892 powershell.exe Token: SeShutdownPrivilege 3892 powershell.exe Token: SeDebugPrivilege 3892 powershell.exe Token: SeSystemEnvironmentPrivilege 3892 powershell.exe Token: SeRemoteShutdownPrivilege 3892 powershell.exe Token: SeUndockPrivilege 3892 powershell.exe Token: SeManageVolumePrivilege 3892 powershell.exe Token: 33 3892 powershell.exe Token: 34 3892 powershell.exe Token: 35 3892 powershell.exe Token: 36 3892 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeIncreaseQuotaPrivilege 2572 powershell.exe Token: SeSecurityPrivilege 2572 powershell.exe Token: SeTakeOwnershipPrivilege 2572 powershell.exe Token: SeLoadDriverPrivilege 2572 powershell.exe Token: SeSystemProfilePrivilege 2572 powershell.exe Token: SeSystemtimePrivilege 2572 powershell.exe Token: SeProfSingleProcessPrivilege 2572 powershell.exe Token: SeIncBasePriorityPrivilege 2572 powershell.exe Token: SeCreatePagefilePrivilege 2572 powershell.exe Token: SeBackupPrivilege 2572 powershell.exe Token: SeRestorePrivilege 2572 powershell.exe Token: SeShutdownPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeSystemEnvironmentPrivilege 2572 powershell.exe Token: SeRemoteShutdownPrivilege 2572 powershell.exe Token: SeUndockPrivilege 2572 powershell.exe Token: SeManageVolumePrivilege 2572 powershell.exe Token: 33 2572 powershell.exe Token: 34 2572 powershell.exe Token: 35 2572 powershell.exe Token: 36 2572 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeIncreaseQuotaPrivilege 2788 powershell.exe Token: SeSecurityPrivilege 2788 powershell.exe Token: SeTakeOwnershipPrivilege 2788 powershell.exe Token: SeLoadDriverPrivilege 2788 powershell.exe Token: SeSystemProfilePrivilege 2788 powershell.exe Token: SeSystemtimePrivilege 2788 powershell.exe Token: SeProfSingleProcessPrivilege 2788 powershell.exe Token: SeIncBasePriorityPrivilege 2788 powershell.exe Token: SeCreatePagefilePrivilege 2788 powershell.exe Token: SeBackupPrivilege 2788 powershell.exe Token: SeRestorePrivilege 2788 powershell.exe Token: SeShutdownPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeSystemEnvironmentPrivilege 2788 powershell.exe Token: SeRemoteShutdownPrivilege 2788 powershell.exe Token: SeUndockPrivilege 2788 powershell.exe Token: SeManageVolumePrivilege 2788 powershell.exe Token: 33 2788 powershell.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe 4032 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4668 VLC.exe 2044 VLC.exe 3948 VLC.exe 1552 VLC.exe 4848 installer.exe 1632 identity_helper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 2044 4668 VLC.exe 85 PID 4668 wrote to memory of 3948 4668 VLC.exe 86 PID 4668 wrote to memory of 3948 4668 VLC.exe 86 PID 4668 wrote to memory of 1552 4668 VLC.exe 87 PID 4668 wrote to memory of 1552 4668 VLC.exe 87 PID 4668 wrote to memory of 4848 4668 VLC.exe 88 PID 4668 wrote to memory of 4848 4668 VLC.exe 88 PID 4668 wrote to memory of 4848 4668 VLC.exe 88 PID 1552 wrote to memory of 3408 1552 VLC.exe 90 PID 1552 wrote to memory of 3408 1552 VLC.exe 90 PID 3408 wrote to memory of 3908 3408 cmd.exe 92 PID 3408 wrote to memory of 3908 3408 cmd.exe 92 PID 1552 wrote to memory of 3892 1552 VLC.exe 93 PID 1552 wrote to memory of 3892 1552 VLC.exe 93 PID 1552 wrote to memory of 2572 1552 VLC.exe 96 PID 1552 wrote to memory of 2572 1552 VLC.exe 96 PID 1552 wrote to memory of 2788 1552 VLC.exe 127 PID 1552 wrote to memory of 2788 1552 VLC.exe 127 PID 1552 wrote to memory of 3088 1552 VLC.exe 101 PID 1552 wrote to memory of 3088 1552 VLC.exe 101 PID 3088 wrote to memory of 2756 3088 cmd.exe 103 PID 3088 wrote to memory of 2756 3088 cmd.exe 103 PID 1552 wrote to memory of 4976 1552 VLC.exe 104 PID 1552 wrote to memory of 4976 1552 VLC.exe 104 PID 4976 wrote to memory of 4244 4976 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup-v-bqa67dU.exe"C:\Users\Admin\AppData\Local\Temp\Setup-v-bqa67dU.exe"1⤵
- Drops file in Windows directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=1472,18094791638536328862,11258416309191663426,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1540 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1472,18094791638536328862,11258416309191663426,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1968 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
C:\Windows\NvOptimizerLog\VLC.exe"C:\Windows\NvOptimizerLog\VLC.exe" --type=renderer --field-trial-handle=1472,18094791638536328862,11258416309191663426,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Windows\NvOptimizerLog\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"3⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\chcp.comchcp4⤵PID:3908
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 23:27"3⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\system32\schtasks.exeSCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 23:274⤵
- Creates scheduled task(s)
PID:2756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted"3⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-ExecutionPolicy"3⤵PID:3188
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ExecutionPolicy4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "systeminfo"3⤵PID:464
-
C:\Windows\system32\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:372
-
-
-
C:\Windows\system32\cscript.execscript.exe3⤵PID:3996
-
-
C:\Windows\system32\cscript.execscript.exe //Nologo resources\regedit\vbs\regList.wsf A HKCU\SOFTWARE\NvOptimizer3⤵PID:2104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "start chrome "https://mediatrackerr.com/track-install?s=vlc&u=3ade4075-091f-4d2c-8b41-f2f8c76cae6f&f=Setup-v-bqa67dU.exe""3⤵PID:560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mediatrackerr.com/track-install?s=vlc&u=3ade4075-091f-4d2c-8b41-f2f8c76cae6f&f=Setup-v-bqa67dU.exe"4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffbd404ab58,0x7ffbd404ab68,0x7ffbd404ab785⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:25⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:85⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1936 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:85⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:15⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:15⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3940 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:15⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:85⤵PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3224 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:85⤵PID:5700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4532 --field-trial-handle=2432,i,4400790784503781532,3121983691315602599,131072 /prefetch:85⤵PID:5760
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mediatrackerr.com/track-install?s=vlc&u=3ade4075-091f-4d2c-8b41-f2f8c76cae6f&f=Setup-v-bqa67dU.exe3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffbd4193cb8,0x7ffbd4193cc8,0x7ffbd4193cd84⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1852 /prefetch:24⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:84⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:14⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:14⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:14⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:14⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:14⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:14⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,8881289064146700907,14769422579716698820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
-
-
C:\Windows\NvOptimizerLog\resources\vlc\installer.exeresources/vlc/installer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f8ed6292d6d2f9514668acec50849d17
SHA1482745d97c48b32fd986e488d169ac4eb7edd737
SHA256a7760866eaf849b079815652f9dce9eb9ec7c599199bc65c7030ca9e2ed91c26
SHA512ebc265c4a27c4a1d14ef783b28f3cb0de9ca4f28795078c3d80bf2ec6574c4e8f3f3c7c68197b1ea6f037cb88268cfab99817660f442696167120bc6275cad4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b388c2ee311d0ca84fae3dedb3efff3e
SHA15fa8c8e0850e0e41b62b947151e66f53041df01f
SHA2564ad3e4a9c493b0bbe6549177bd9a43b3ad45ea86e3cfdc978a281475e0b08e9a
SHA512b6c4671bde9973abe713f01b44905ee49c207b147af7d3e261deb37cd78ad3d1d21ff470bd8c6603d9ea7795b267dcea4e46676045cc8aa06182804a9ee99c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD508487e6110fe90987cfd5df9e7f89fa0
SHA1e8f8879b04df056cf121066ce3297a12dc31f8ad
SHA2565b5b12b2f170e0a54492dd979cf4453430275454f9bbb0ad893b4bbeb3faa9b9
SHA512f3042821410e682bda89d77bb1e41db389ef3bbfc53f47add8af014b6ce6461bd0eaae8d363fc77d03cb13dce785f14dc8862973a156c23dcf7fc1854c0206cf
-
Filesize
216B
MD5a76afeda5548f3d6d203cdedac3ff9dd
SHA1cd8de50f70a064ecf181491debd43d514096b719
SHA256eed702c34c8f7cf514f8ea0cfb846cd2391f6300c838fe9fad3f5375150aaaed
SHA512ebe39f64636ea1e4ea4c3e96bca1e6f11e4e9d32b18ff89803b801ea913c577ca4cd01e6c77c9b743a2bdbe174d3de9e01f8a297032cd1295dbe18501f0d0cfe
-
Filesize
2KB
MD5eb3b29ad756b1e1cd9038695807e1fe7
SHA137eac6abde704ab80a11bb0002fe94db254cfa3f
SHA256e880342588c0cc2b47081d507d381e221f6a0c6ce8a91ee9713f73595e67ec40
SHA512b6782934c3885f9b864eacc9e9ad068f3e5e3879ed2811f16e506f1594925b5810bb45ab6afb3a4fc173b5fe2b6864e1d552d3077a7ae675892f082c724d9705
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD583cb85c9bfb06670db27bee2d6b0cf10
SHA1d14ce541618f13a0aba24e547ad6badac56717bb
SHA2568481f11d6cdb903de0ea54b8a0c9dc287718449846c12080ff1bdc597bb559ab
SHA512f3b50a4299b55126cd68cb9f11c12d5bdfa41b60f1cfc8dddb83733f47e4323fc115153629968a655b14247fc1478533bf8a683ac80ef9b884032d83e8aaa324
-
Filesize
7KB
MD50ea362176abbe46ab5fb9a491a3c87d2
SHA1343ecc555a85f9c6146bbaeab7dab0ce99613cde
SHA2563e2553000724b02a4f85797250a3e019d80cf1b512678b1007a426f8e405506e
SHA512d7fc12fc928297c1ebad4da976cf0ef605ee05a0d7e85ddf9ec7ed8c2a0c1bdd5c3c5ba653f7ae2e2f7303c93871d5e596889c770bb200eadefd3be34422615a
-
Filesize
7KB
MD53d13f90020ead94d4d18f76c1b0e80b7
SHA132d2fc77b1aafbc02d18356cb9e4d44856006d7b
SHA2564defac752da4cced3508d403c341615b6a0269cea433f4e1df1ee655bec04a61
SHA51235b56b8827acc41aa869f482f52c1c3c488204ee3ef14efd19c75b44282aa7286d9cc2b3a7342d7474f4213ff8d5ea7c323e6d4bbdc908a6bbca429a68d7eb5d
-
Filesize
16KB
MD5e5fb38f53e325fbe3d355509a1666d06
SHA167402e67db9caef17b519a8d6a15554cb266fbb5
SHA25698340d9c2bd3e82fac353c8a8d975fbd0a582a5b779976a8db951b27b0ec2761
SHA5121a2b2a068cb1a42610380b532b584548b3886f85140cd8ddb4a8a5352a0f77cfaaa94f906d818e1505e072ee2592fc17a41090a9a18e209e43f8c65a33b2799f
-
Filesize
253KB
MD5f417f7d8931a37e129485c832f0c9009
SHA1d0c2a934d9826f36e0ce1f2e876addf5f84d06c6
SHA256d33f563b539afc63a931b69fe848ee8baad1bcafea079aa137a21d97e6f53cf3
SHA5125c452024709958ba4e99c29a099011b75cd75956e06a3aabbb43fd7d3014a214e8c33502fcd31556e7fb6ca667ecd2943786497d484dd8ffd1ef5cf4ff0eff87
-
Filesize
3KB
MD505850c6c0442ea6966fe2a888f219f4b
SHA1e6b1c8eb783b307672a6f06b785a7e9b78633b46
SHA256f51b54c5f5074076216b2d0a3e66c13e80d8f1da311614ec15c9170dff11ad5a
SHA5129db20e00e103700f67256568e38f9b37f29af3c30f3454a38b3e033c6c2f6bd796c5b5a8c5faa98bb45d7521d76c2bf323d503b8a0196cacbd701167d441c6f9
-
Filesize
152B
MD5493e7e14aceba0ff1c0720920cccc4a2
SHA1468f39cefbcf14a04388b72d4f02552649bf3101
SHA256a0dd32ed60115f661a4ca537472e0d4e230ff844d56a3db766299cf4cd817842
SHA512e16c748e4513ea10bf7124cef7b50dc5f3a1802205af9228e0c33fdbf3c24286739db08db4b813079ed7cc36be43d7457f4c26f00ae3126a2fafd77d2696107a
-
Filesize
152B
MD557e5c5a9236321d336e2c8ce1eeff844
SHA18fd4288af72ba3f7a0ecc5583a9265723fefc096
SHA256ae6496cf397848bf3139858deaf567e3df991bab5a7704a0fa7aae95474872d7
SHA512bc3f24afe6ce0494022d8201a01a60239ac5cfee54e0650a337036817056424b418cb636d58d07e5034dffe2226906202b56509e4cc07562c0b60f618c420080
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c64d63180fcc2630c2902c2c5f17e4b2
SHA19ec139cf872b27f8f963c3a8ea50f86294183bd4
SHA25669f2225f196a5c1c4f32d7d0b7a699d521a1a3ec857a1041aa44c46bda2f8235
SHA5120f6a5714617ed264b0663b16d296d9bae607532622f18dfd14e8ad2e4e918c6b734d3556fdfd962a6c5a6009c995d0ce0f9b55a52a78951e9ee9c919e348568c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5b1089682f6f8faeee146ebc9bb2d32e7
SHA19c73c11db3d50e9ef4c3f954694bd58a96a0ba2f
SHA256152cb40fc70643f6e744298ce272c91b7512c53193a095e34aca6b1d1912efee
SHA5125000d830f4bcafce56e7c8bfebe9972a0f051412a8b5e2deda50b01d05b3e7c3198935b8db5f2aabb30edcb85032fcf9eb6980163eb43d99c520626922aca018
-
Filesize
6KB
MD5edf4bd0f8894cd4b348a5bdc3b56c4ee
SHA1309040af1744d61f7a6ef50ef0a800216686f989
SHA256fafd5a9779d59821ade8dabbec3eac6e6544919968f26667bb4171e32252807d
SHA51214709121327656ce166f6c45f83a5409f083e3a5870fd8b4b9743dbbb515b8003a3dde38a068a982d2e7778be5157b3144aa6a5099f162c155e8a12bf3d557e8
-
Filesize
6KB
MD51c311343bb1ce12c639deccb9f04fa64
SHA1d38c01f247b2557a1984c0fcfea1be6ea7a075bb
SHA2564cb8b767f50abec13c96acaa30b784ea6febdc46e268a8ef56c0836715f8cb26
SHA51298aeada8d2dfd48f8c8115bbaef11923103713ecf4ca7753f2fd2fccbe22d3db160199c2d9e7a18de643181e08ff4b30727b3236ba5e88fd30ae76045da65327
-
Filesize
6KB
MD5766bf4e23cb7dad162c5f7459522abdb
SHA1955215c23bf7aa05514b1b671f8747ea670e2155
SHA2562a945a31562b07650490c9c7e324b69f21c2483add84ae6fff5eba52903a8aa3
SHA5122b009070c336cff6263189b09ba17abb160cfdc03829a230bdeb388eabd9673c5f78c6dd58e6bcbbdd6ba1370477ed916e518e1d73f7710cf4bfd56c4a609049
-
Filesize
6KB
MD53b5ac882a991c921285653d05a596ddf
SHA1958a181861f09533aa3e7790063e2f9a9501f76a
SHA2566eab8159d4756a6e105bae2848157419ae9d43cbe20ac21c4053e16aa3601b67
SHA51220d32d6951b346c565d2a10ce5a1ebdc53f4ea06e54829c89b892025648ea6e5b103d58fea487d325da8a1650b76c071a7b16cd78124275bf4aaa8a59d5daac1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5935f72b086ac02e9d90def14a590e657
SHA1ac2d915523aa4a9da646475cff898c02880ce83f
SHA2569b68078b33125a9be6a73543b98504a5050f967f3a560d94530989724d6ddc2b
SHA512b8ad414d1486f0c4780dabc0413b7fc9a39c74d4ec7f670eceb54844f11b987aaf2dd4a24307f8269b86b67c2818ad46d0cd4e3c6b79cffd8d981f7553faaf29
-
Filesize
12KB
MD5049e3417c8bd2998f3ddca61d3d1900c
SHA16d73137a1949db53fdc237588cc82aba169330f6
SHA256dc90cac4c3b99160b803f77fdcaef72b6e6e56903a93514153ba626ffd58e6c7
SHA51261bfbbec0e335ec44315c0d1cd830003ff43d1b32eb0b3ea9ae8dcae130e7a0317806184f70f4888c8661ad67d583a8d6e4a6829ea81c68bb0cc80e6ed792f4e
-
Filesize
1KB
MD50254494a4c89bf8f623066957ccb7ea1
SHA10a31bf0f80c2e5caaf36fdf4266b72379cfb3751
SHA256ffda9233d24b63e14924cddc16d3885111c7cf09abe840547c0a266c2000687f
SHA5128f8c04122ae09f4a544d482eb72c30fc6d1ae9840e4247eb9e7a5cbe6e912fbff9132afc78974509923c24c30a8049199d43d83aba49b8a66ab78316546673bb
-
Filesize
1KB
MD5198788663e52c8b77ea012020093ac60
SHA1313d1c5d41bc7adfa4f9dccfeed8b5397aba1fbe
SHA2564fc0efec5bb2ba22ba96cccb84cd9b0224134c3e44c11f24feeb9aafc2bb283a
SHA512adabd591966dffdac74e72e0e9d7e1f0a2a60b480a9021ac53311c188775a9640ce897646c8856d0533e704d2ff2193780f8db258f69b98e309baa52e35ddc93
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD520850d4d5416fbfd6a02e8a120f360fc
SHA1ac34f3a34aaa4a21efd6a32bc93102639170e219
SHA256860b409b065b747aab2a9937f02d08b6fd7309993b50d8e4b53983c8c2b56b61
SHA512c8048b9ae0ced72a384c5ab781083a76b96ae08d5c8a5c7797f75a7e54e9cd9192349f185ee88c9cf0514fc8d59e37e01d88b9c8106321c0581659ebe1d1c276
-
Filesize
26KB
MD54f25d99bf1375fe5e61b037b2616695d
SHA1958fad0e54df0736ddab28ff6cb93e6ed580c862
SHA256803931797d95777248dee4f2a563aed51fe931d2dd28faec507c69ed0f26f647
SHA51296a8446f322cd62377a93d2088c0ce06087da27ef95a391e02c505fb4eb1d00419143d67d89494c2ef6f57ae2fd7f049c86e00858d1b193ec6dde4d0fe0e3130
-
Filesize
12KB
MD52029c44871670eec937d1a8c1e9faa21
SHA1e8d53b9e8bc475cc274d80d3836b526d8dd2747a
SHA256a4ae6d33f940a80e8fe34537c5cc1f8b8679c979607969320cfb750c15809ac2
SHA5126f151c9818ac2f3aef6d4cabd8122c7e22ccf0b84fa5d4bcc951f8c3d00e8c270127eac1e9d93c5f4594ac90de8aff87dc6e96562f532a3d19c0da63a28654b7
-
Filesize
35KB
MD5764371d831841fe57172aa830d22149d
SHA1680e20e9b98077dea32b083b5c746d8de35e0584
SHA25693df9e969053ca77c982c6e52b7f2898d22777a8c50274b54303eaa0ef5ccded
SHA51219076205eba08df978ad17f8176d3a5a17c4ea684460894b6a80cae7e48fcae5e9493ff745d88d62fd44fc17bcda838570add6c38bebe4962d575f060f1584f9
-
Filesize
238KB
MD538caa11a462b16538e0a3daeb2fc0eaf
SHA1c22a190b83f4b6dc0d6a44b98eac1a89a78de55c
SHA256ed04a4823f221e9197b8f3c3da1d6859ff5b176185bde2f1c923a442516c810a
SHA512777135e05e908ac26bfce0a9c425b57f7132c1cdb0969bbb6ef625748c868860602bacc633c61cab36d0375b94b6bcfbd8bd8c7fa781495ef7332e362f8d44d1
-
Filesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
Filesize
99.0MB
MD5fdfe1ece23e984d00402431d082d768e
SHA19405760465c3f8abc4d08473219deea9d902e2e6
SHA25699168cc1971f35f0cea1ac61d90e3aef6cc177a510bb90203350ac2c808c73ee
SHA512d0979e9359d7c15910522aefb5e5e23eeaacf0335fa299e09c9c6ddc962c1a224bdf3372d0f286b181182fc893bcd93558e360fb6f6645613c9a0875a89a8b49
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
125.1MB
MD5031021334754b192f286d0c1610ba5a1
SHA10cdc202ba17c952076c37c85eece7b678ebaeef9
SHA256c11b411ae2ce44803a4a2e1f14afc93f11c8b111fdf0205639be5141a28f3a89
SHA512eb0a34610e7479902d6498bcd75c71b4efed77b1b07dc44c22d1c59897b18f62d4399a710d29d9665b830a50c2f0703c5ecd5cdcd2751b50b4e416581ff08bea
-
Filesize
123KB
MD5a59ea69d64bf4f748401dc5a46a65854
SHA1111c4cc792991faf947a33386a5862e3205b0cff
SHA256f1a935db8236203cbc1dcbb9672d98e0bd2fa514429a3f2f82a26e0eb23a4ff9
SHA51212a1d953df00b6464ecc132a6e5b9ec3b301c7b3cefe12cbcad27a496d2d218f89e2087dd01d293d37f29391937fcbad937f7d5cf2a6f303539883e2afe3dacd
-
Filesize
183KB
MD51985b8fc603db4d83df72cfaeeac7c50
SHA15b02363de1c193827062bfa628261b1ec16bd8cf
SHA2567f9ded50d81c50f9c6ed89591fa621fabbd45cef150c8aabcceb3b7a9de5603b
SHA51227e90dd18cbce0e27c70b395895ef60a8d2f2f3c3f2ca38f48b7ecf6b0d5e6fefbe88df7e7c98224222b34ff0fbd60268fdec17440f1055535a79002044c955b
-
Filesize
4.3MB
MD57641e39b7da4077084d2afe7c31032e0
SHA12256644f69435ff2fee76deb04d918083960d1eb
SHA25644422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA5128010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5
-
Filesize
2.7MB
MD55c2e6bcfcffc022cfb7e975ad4ce2ea4
SHA18f65334f554b02e206faecd2049d31ef678b321d
SHA256d068695dc8f873caab1db51c179e9696dda2319fa05c0f2d281f9979e2054fc2
SHA512b5fe0039e1702375a6e1f4ef7bfb24d0acc42c87d02202a488fccf3d161598549055d2ac0103c95dbbc0e46975aed30259edbfef7ce77d00f1de7c1670c00959
-
Filesize
9.9MB
MD570499b58dc18e7ee1d7452a1d7a8bc6e
SHA141c5382f08c6a88670ce73a20c0dcdb3822f19e9
SHA25602db39ba465fc8b7a4cd280732760f29911edde87b331bf7cea7677e94d483e0
SHA512a80939e9809bb7d20f00ad685c94d5c182fa729616c975e605abf09afb58376be73a49fefa35b75ed1a284eccf208af7656c8df44c5959df7eaf51367d232dc6
-
Filesize
436KB
MD52fe9e551c93156baf537483671ec4ad7
SHA108ce2344b2e0a78c2af637f0eae46b948661d5a5
SHA256f231525ba1ea2522552a722620bced187357d66d945f0cec067c5d858950ea61
SHA512f93181f1f2268cc380dafef02a93899cb9a19f3287a918bf6ba8eaa69190627d2e2fb0c82b693471e3ca63fbcb07c44212268c1357a5a4cf594a3bd8973eefd2
-
Filesize
7.5MB
MD55967a9234ec54d734b31cfd12cb67faf
SHA1536840ddb29ead51d43a506fd493b48c436097d6
SHA25648ec76bac1ff6647096a9532ac21b4a0d7c6c9c24613971aaa201cce452ce4ce
SHA512cf8e4c3a838b58a568639ab2778800d776e0171dc34e3b82f537adbadceaa3c292240ec7d8561b5a85df3caef6e001a07ac19e280a5bb8b0607f8ba767461479
-
Filesize
85KB
MD56bbeeb72daebc3b0cbd9c39e820c87a9
SHA1bd9ebec2d3fc03a2b27f128cf2660b33a3344f43
SHA256ac1cdb4fb4d9fb27a908ed0e24cc9cc2bd885bc3ffba7e08b0b907fd4d1a8c4b
SHA51266944fb1abcc2a7e08e5fd8a2cee53eb9da57653d7880aea226f25879e26379f7d745ebf62a3518378fa503f3a31b3ea3716f49fe4c7db4f4af0228b81b53a10
-
Filesize
4.9MB
MD55507bc28022b806ea7a3c3bc65a1c256
SHA19f8d3a56fef7374c46cd3557f73855d585692b54
SHA256367467609a389b67600628760c26732fc1a25f563f73263bc2c4bf6eec9033df
SHA512ae698d4feacc3e908981ee44df3a9d76e42a39bf083eaf099442ace2b863f882b43232e26e2c18051ca7aec81dccef5742acc7b82fb0cda2e14086b14d5a9a26
-
Filesize
4.6MB
MD5040a8280b01b5a029e50c5d141d555ad
SHA1ce103568d6ae6456f1d1d718929b6972c0bad1b4
SHA2566b6309fe0c4ca9c73626f1435ed3332656d9e6b1e500fb85af0ebf9842813485
SHA5126706c453509bf718d1870c98a49842743cf2e49d22225a3d33051808a3f1045c7d0c065ecafae75f1bb57b4ef4436aa76774ff6553fddf3739bc47d2e9400ce8
-
C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\libgksu2.so.0
Filesize68KB
MD56dbc4226a62a578b815c4d4be3eda0d7
SHA1eb23f90635a8366c5c992043ccf2dfb817cf6512
SHA2560eb70bd4b911c9af7c1c78018742cadb0c5f9b6d394005eaeaa733da4b5766e5
SHA5123a2836f712ad7048dbeb5b6eec8e163652f97bea521eafcff5c598cbedf062baefaa7079d3a614470ef99ec954dac518224cb3515ca14757721f96412443c7c4
-
Filesize
2KB
MD5310a042dca2144c9cda556e9bc4b0c02
SHA1d2032af7eea0dbd027a36e577567e85486496949
SHA256caa82e59ca92629057791cb1e0ba0b74c90f561fac81b029033fc081a83431b0
SHA512843d9f6f300caba8df41511473c43f4d5029fa0012e593677c83f196c8d595194d1409069fb4b8616e0118f37ba943bbe656b29de40f0ad70997ab610fd98db8
-
Filesize
985B
MD5cae7db4194de43346121a463596e4f4f
SHA1f72843fa7e2a8d75616787b49f77b4380367ff26
SHA256b65c5af7dbeb43c62f6a5528af6db3cb1ca2a71735a8e7a1451796f834e355c2
SHA512ccee660cc4878301c743d3ebde4557dc180d8b6f77c97de5e36c95f6e4d2446ef7be28ebc787fdea2f2d817890ac7bdb713196c755a51677dc127cce77670026
-
Filesize
7KB
MD577e85aa761f75466e78ce420fdf67a31
SHA14470bd4d215d7682828cbc5f7f64993c078b2caa
SHA256350dea3d6c8e65372f8d12a5fd92a3a46a7519610c69564e8185a2ed66b00d59
SHA51250af664777545ced78c34a6ea35dae542fdb85b8b307a4a4a95db25a808a695d3fe8840edb36325279c2381fbae071f6b509f7491185cef2f42afcb7672cfd13
-
Filesize
4KB
MD5e2be267c02d51df566fa726fc8aa075a
SHA1c9b9ae17f36e23d5d3cbbf2d6f17a954bfa87d24
SHA256b2efd5e0c2f695063a8bce40c8182aa70f33c4b1b77d232b7530d89fb9646f0c
SHA512b6f80622a9f61f636f7786d91a1b9e06a64602f0898425e90a1a696d0a4855c8c08cbd6e6b98b9a3a1a24de354b26260247953b5273f7d57ea87294b4b142e8a
-
Filesize
42.4MB
MD514becb7840eb1d3d46071d2ee65c7be8
SHA1ff6e6f9359127f836a03dfc2b8bc9ba651c627c4
SHA2569737843c119905be767de5e94e398be1eb145b0cc6a5a02f057d4022b80da4d8
SHA512717289d3b514f4daa6b1cf97705c876bbe89fa215084ba8e1abeef3770e0a620d04127ef8de1f2d89477e1fab355526ed584ed3f9c7ecaf0c7d24a9bceee8248
-
Filesize
160KB
MD5b64c1fc7d75234994012c86dc5af10a6
SHA1d0d562b5735d28381d59d0d86078ff6b493a678e
SHA25631c3aa5645b5487bf484fd910379003786523f3063e946ef9b50d257d0ee5790
SHA5126218fcb74ef715030a2dd718c87b32f41e976dd4ce459c54a45341ee0f5ca5c927ad507d3afcffe7298b989e969885ed7fb72030ea59387609e8bd5c4b8eb60a