Resubmissions

02-05-2024 13:12

240502-qfqr8abg26 5

02-05-2024 13:06

240502-qb8ggahe7t 5

Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 13:06

General

  • Target

    Setup-v-b5xa3Su.exe

  • Size

    704KB

  • MD5

    d1fc9e6d71a4867ab71af5566e525ba0

  • SHA1

    593b10280a926134839feb8e2f9d0da9ee9c0593

  • SHA256

    21be0a068d7d1b57578bfb2ed850b3f3b1cfe4a4c47981ead95abdb8c20278fe

  • SHA512

    c82a23e5e0e3a38e32fc08401890852a71ec90640bbfb944ed7d45812493a53d2be2c0e4373692e52c77d666b8ae72cd0d15c3dc4bc3cc52887ad4589820658d

  • SSDEEP

    12288:iOIVD3gyucpjRKaDPNKT1zH3ptaR1sDfOQSvJqFZ6rOIIzVFA4+M:iOIyyuUjMaDu173pG1szLSvJwSOZBv

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 64 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 47 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup-v-b5xa3Su.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup-v-b5xa3Su.exe"
    1⤵
    • Drops file in Windows directory
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2328
  • C:\Windows\NvOptimizerLog\VLC.exe
    "C:\Windows\NvOptimizerLog\VLC.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\NvOptimizerLog\VLC.exe
      "C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=972,9994578653899002616,15955183030486360312,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=980 /prefetch:2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1824
    • C:\Windows\NvOptimizerLog\VLC.exe
      "C:\Windows\NvOptimizerLog\VLC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=972,9994578653899002616,15955183030486360312,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1360 /prefetch:8
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2712
    • C:\Windows\NvOptimizerLog\resources\vlc\installer.exe
      resources/vlc/installer.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2000
    • C:\Windows\NvOptimizerLog\VLC.exe
      "C:\Windows\NvOptimizerLog\VLC.exe" --type=renderer --field-trial-handle=972,9994578653899002616,15955183030486360312,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Windows\NvOptimizerLog\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1464 /prefetch:1
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "chcp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\Windows\system32\chcp.com
          chcp
          4⤵
            PID:2420
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          3⤵
          • Drops file in Windows directory
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2924
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1732
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2268
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 13:12"
          3⤵
            PID:2792
            • C:\Windows\system32\schtasks.exe
              SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 13:12
              4⤵
              • Creates scheduled task(s)
              PID:2676
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "powershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted"
            3⤵
              PID:948
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell Set-ExecutionPolicy -ExecutionPolicy Unrestricted
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1628
          • C:\Windows\NvOptimizerLog\VLC.exe
            "C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=972,9994578653899002616,15955183030486360312,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=980 /prefetch:2
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1240
        • C:\Windows\NvOptimizerLog\VLC.exe
          "C:\Windows\NvOptimizerLog\VLC.exe"
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1112
          • C:\Windows\NvOptimizerLog\VLC.exe
            "C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=972,10799110373919786706,11782934978017825231,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=988 /prefetch:2
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2104
          • C:\Windows\NvOptimizerLog\VLC.exe
            "C:\Windows\NvOptimizerLog\VLC.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=972,10799110373919786706,11782934978017825231,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1264 /prefetch:8
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:2228
          • C:\Windows\NvOptimizerLog\resources\vlc\installer.exe
            resources/vlc/installer.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:2700
          • C:\Windows\NvOptimizerLog\VLC.exe
            "C:\Windows\NvOptimizerLog\VLC.exe" --type=renderer --field-trial-handle=972,10799110373919786706,11782934978017825231,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Windows\NvOptimizerLog\resources\app.asar" --no-sandbox --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1396 /prefetch:1
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:3012
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "chcp"
              3⤵
                PID:2004
                • C:\Windows\system32\chcp.com
                  chcp
                  4⤵
                    PID:2132
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  3⤵
                  • Drops file in Windows directory
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2560
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  3⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2008
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  3⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1704
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 13:14"
                  3⤵
                    PID:1448
                    • C:\Windows\system32\schtasks.exe
                      SCHTASKS /Create /TN "NvOptimizerTaskUpdater_V2" /SC HOURLY /TR "powershell -File C:/Windows/System32/NvWinSearchOptimizer.ps1" /RL HIGHEST /MO 4 /RU System /ST 13:14
                      4⤵
                      • Creates scheduled task(s)
                      PID:1744
                • C:\Windows\NvOptimizerLog\VLC.exe
                  "C:\Windows\NvOptimizerLog\VLC.exe" --type=gpu-process --field-trial-handle=972,10799110373919786706,11782934978017825231,131072 --enable-features=WebComponentsV0Enabled --disable-features=CertVerifierService,CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=988 /prefetch:2
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:1992

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Command and Scripting Interpreter

              1
              T1059

              PowerShell

              1
              T1059.001

              Scheduled Task/Job

              1
              T1053

              Persistence

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Subvert Trust Controls

              1
              T1553

              Install Root Certificate

              1
              T1553.004

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              3
              T1012

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                Filesize

                1KB

                MD5

                de3d0f8ed315edbf797fc100f00e8c1e

                SHA1

                2749b127923e94734ec0d89834c41f0465b54b2d

                SHA256

                7467a4cfbde2ca2287d4b640b9c2af7ea43d14ee91d620bb21db35851daba665

                SHA512

                f5afbef2282142cffee3c8f096331392379ab46adb6fb145b0d1ed416ac245eabd5c77f994d414cd7e6d3ca592cda58fd705f52333782d30da8597f5d46b773c

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                Filesize

                68KB

                MD5

                29f65ba8e88c063813cc50a4ea544e93

                SHA1

                05a7040d5c127e68c25d81cc51271ffb8bef3568

                SHA256

                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                SHA512

                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
                Filesize

                724B

                MD5

                ac89a852c2aaa3d389b2d2dd312ad367

                SHA1

                8f421dd6493c61dbda6b839e2debb7b50a20c930

                SHA256

                0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                SHA512

                c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                Filesize

                410B

                MD5

                5ed8bbebf001fa73ddf6b04d88de75cb

                SHA1

                0c69e695fe6c92a402752f80547f9c1905f1ae87

                SHA256

                e03cc1a05a6eb9de89b5f840bb0a1a04e286b1abafba40b7a7edc8c36a40b21d

                SHA512

                ec3afba21529530121910f8dffb1eb3025d4fa1289ff2d4521e40b9960594ca5c920b46ee6a060c82ce05b5d9ed6dd105ca3daabb7aa2b09fe167042ecf47952

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
                Filesize

                392B

                MD5

                ff4d2daaca998bf503d8e91fead34f42

                SHA1

                503a11b3e9a96922518076aff030120d5b390d09

                SHA256

                9ce7852eeeed68614934e31d8bf3e426f1334246040ef4d9c846786386bf949f

                SHA512

                31b6c7d8fde728af00f9b5bd903ebdc00228b956d5394f232d5628e2fc8e9013a6749a097f62de28d5b6f0cc0177098891c3cccbbf35ed07eae8eb8486b011cb

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
                Filesize

                7KB

                MD5

                6ea5daec0c9dbe2c8039e0b136eedf52

                SHA1

                bb5ab730495ae336a421c0a1e26ed9b306ba8a03

                SHA256

                db940644ed363b10d556231ad8c2124b720bc11d2412a7bc9fb25791e464ac29

                SHA512

                84f3b2084dc2e94f98c1699baed3a0aee04c7eb438c85af542983425b6b109186370feb8bb420d3a8a00bf719d3cbc87e16c86c5ac08bea1afe0f82965a558d7

              • C:\Users\Admin\AppData\Roaming\VLC\Cache\data_2
                Filesize

                8KB

                MD5

                0962291d6d367570bee5454721c17e11

                SHA1

                59d10a893ef321a706a9255176761366115bedcb

                SHA256

                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                SHA512

                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

              • C:\Users\Admin\AppData\Roaming\VLC\Dictionaries\en-US-9-0.bdic
                Filesize

                441KB

                MD5

                a78ad14e77147e7de3647e61964c0335

                SHA1

                cecc3dd41f4cea0192b24300c71e1911bd4fce45

                SHA256

                0d6803758ff8f87081fafd62e90f0950dfb2dd7991e9607fe76a8f92d0e893fa

                SHA512

                dde24d5ad50d68fc91e9e325d31e66ef8f624b6bb3a07d14ffed1104d3ab5f4ef1d7969a5cde0dfbb19cb31c506f7de97af67c2f244f7e7e8e10648ea8321101

              • C:\Users\Admin\AppData\Roaming\VLC\Session Storage\CURRENT
                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • C:\Users\Admin\AppData\Roaming\VLC\Session Storage\MANIFEST-000001
                Filesize

                41B

                MD5

                5af87dfd673ba2115e2fcf5cfdb727ab

                SHA1

                d5b5bbf396dc291274584ef71f444f420b6056f1

                SHA256

                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                SHA512

                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

              • C:\Users\Admin\AppData\Roaming\VLC\f44dc451-2ef5-4059-9ced-c849964d1e90.tmp
                Filesize

                57B

                MD5

                58127c59cb9e1da127904c341d15372b

                SHA1

                62445484661d8036ce9788baeaba31d204e9a5fc

                SHA256

                be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

                SHA512

                8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

              • C:\Windows\NvOptimizerLog\chrome_100_percent.pak
                Filesize

                123KB

                MD5

                a59ea69d64bf4f748401dc5a46a65854

                SHA1

                111c4cc792991faf947a33386a5862e3205b0cff

                SHA256

                f1a935db8236203cbc1dcbb9672d98e0bd2fa514429a3f2f82a26e0eb23a4ff9

                SHA512

                12a1d953df00b6464ecc132a6e5b9ec3b301c7b3cefe12cbcad27a496d2d218f89e2087dd01d293d37f29391937fcbad937f7d5cf2a6f303539883e2afe3dacd

              • C:\Windows\NvOptimizerLog\chrome_200_percent.pak
                Filesize

                183KB

                MD5

                1985b8fc603db4d83df72cfaeeac7c50

                SHA1

                5b02363de1c193827062bfa628261b1ec16bd8cf

                SHA256

                7f9ded50d81c50f9c6ed89591fa621fabbd45cef150c8aabcceb3b7a9de5603b

                SHA512

                27e90dd18cbce0e27c70b395895ef60a8d2f2f3c3f2ca38f48b7ecf6b0d5e6fefbe88df7e7c98224222b34ff0fbd60268fdec17440f1055535a79002044c955b

              • C:\Windows\NvOptimizerLog\icudtl.dat
                Filesize

                9.9MB

                MD5

                70499b58dc18e7ee1d7452a1d7a8bc6e

                SHA1

                41c5382f08c6a88670ce73a20c0dcdb3822f19e9

                SHA256

                02db39ba465fc8b7a4cd280732760f29911edde87b331bf7cea7677e94d483e0

                SHA512

                a80939e9809bb7d20f00ad685c94d5c182fa729616c975e605abf09afb58376be73a49fefa35b75ed1a284eccf208af7656c8df44c5959df7eaf51367d232dc6

              • C:\Windows\NvOptimizerLog\locales\en-US.pak
                Filesize

                85KB

                MD5

                6bbeeb72daebc3b0cbd9c39e820c87a9

                SHA1

                bd9ebec2d3fc03a2b27f128cf2660b33a3344f43

                SHA256

                ac1cdb4fb4d9fb27a908ed0e24cc9cc2bd885bc3ffba7e08b0b907fd4d1a8c4b

                SHA512

                66944fb1abcc2a7e08e5fd8a2cee53eb9da57653d7880aea226f25879e26379f7d745ebf62a3518378fa503f3a31b3ea3716f49fe4c7db4f4af0228b81b53a10

              • C:\Windows\NvOptimizerLog\resources.pak
                Filesize

                4.9MB

                MD5

                5507bc28022b806ea7a3c3bc65a1c256

                SHA1

                9f8d3a56fef7374c46cd3557f73855d585692b54

                SHA256

                367467609a389b67600628760c26732fc1a25f563f73263bc2c4bf6eec9033df

                SHA512

                ae698d4feacc3e908981ee44df3a9d76e42a39bf083eaf099442ace2b863f882b43232e26e2c18051ca7aec81dccef5742acc7b82fb0cda2e14086b14d5a9a26

              • C:\Windows\NvOptimizerLog\resources\app.asar
                Filesize

                4.6MB

                MD5

                040a8280b01b5a029e50c5d141d555ad

                SHA1

                ce103568d6ae6456f1d1d718929b6972c0bad1b4

                SHA256

                6b6309fe0c4ca9c73626f1435ed3332656d9e6b1e500fb85af0ebf9842813485

                SHA512

                6706c453509bf718d1870c98a49842743cf2e49d22225a3d33051808a3f1045c7d0c065ecafae75f1bb57b4ef4436aa76774ff6553fddf3739bc47d2e9400ce8

              • C:\Windows\NvOptimizerLog\resources\app.asar.unpacked\node_modules\electron-sudo\src\bin\libgksu2.so.0
                Filesize

                68KB

                MD5

                6dbc4226a62a578b815c4d4be3eda0d7

                SHA1

                eb23f90635a8366c5c992043ccf2dfb817cf6512

                SHA256

                0eb70bd4b911c9af7c1c78018742cadb0c5f9b6d394005eaeaa733da4b5766e5

                SHA512

                3a2836f712ad7048dbeb5b6eec8e163652f97bea521eafcff5c598cbedf062baefaa7079d3a614470ef99ec954dac518224cb3515ca14757721f96412443c7c4

              • C:\Windows\NvOptimizerLog\resources\vlc\installer.exe
                Filesize

                42.4MB

                MD5

                14becb7840eb1d3d46071d2ee65c7be8

                SHA1

                ff6e6f9359127f836a03dfc2b8bc9ba651c627c4

                SHA256

                9737843c119905be767de5e94e398be1eb145b0cc6a5a02f057d4022b80da4d8

                SHA512

                717289d3b514f4daa6b1cf97705c876bbe89fa215084ba8e1abeef3770e0a620d04127ef8de1f2d89477e1fab355526ed584ed3f9c7ecaf0c7d24a9bceee8248

              • C:\Windows\NvOptimizerLog\swiftshader\libglesv2.dll
                Filesize

                3.1MB

                MD5

                34ae0a64a678d6cff4c5b1f059d0d8e6

                SHA1

                09392ccb512ffd18e2ce45206437e43728064886

                SHA256

                d1c6897c2a06033d1734388d5f93adc4423ace9b9b307fe599e63d43f6a218c5

                SHA512

                ca936805aa3487dbb46544973a5aa284c575897c18578565dd44c7c8e0e1c83c38dfc5e917766fc9d3045168a95bf7d4b3773fa4c8337c8a0730729b541a096a

              • C:\Windows\NvOptimizerLog\v8_context_snapshot.bin
                Filesize

                160KB

                MD5

                b64c1fc7d75234994012c86dc5af10a6

                SHA1

                d0d562b5735d28381d59d0d86078ff6b493a678e

                SHA256

                31c3aa5645b5487bf484fd910379003786523f3063e946ef9b50d257d0ee5790

                SHA512

                6218fcb74ef715030a2dd718c87b32f41e976dd4ce459c54a45341ee0f5ca5c927ad507d3afcffe7298b989e969885ed7fb72030ea59387609e8bd5c4b8eb60a

              • \Users\Admin\AppData\Local\Temp\nsd70FD.tmp\LangDLL.dll
                Filesize

                7KB

                MD5

                20850d4d5416fbfd6a02e8a120f360fc

                SHA1

                ac34f3a34aaa4a21efd6a32bc93102639170e219

                SHA256

                860b409b065b747aab2a9937f02d08b6fd7309993b50d8e4b53983c8c2b56b61

                SHA512

                c8048b9ae0ced72a384c5ab781083a76b96ae08d5c8a5c7797f75a7e54e9cd9192349f185ee88c9cf0514fc8d59e37e01d88b9c8106321c0581659ebe1d1c276

              • \Users\Admin\AppData\Local\Temp\nsd70FD.tmp\System.dll
                Filesize

                26KB

                MD5

                4f25d99bf1375fe5e61b037b2616695d

                SHA1

                958fad0e54df0736ddab28ff6cb93e6ed580c862

                SHA256

                803931797d95777248dee4f2a563aed51fe931d2dd28faec507c69ed0f26f647

                SHA512

                96a8446f322cd62377a93d2088c0ce06087da27ef95a391e02c505fb4eb1d00419143d67d89494c2ef6f57ae2fd7f049c86e00858d1b193ec6dde4d0fe0e3130

              • \Users\Admin\AppData\Local\Temp\nsd70FD.tmp\nsDialogs.dll
                Filesize

                12KB

                MD5

                2029c44871670eec937d1a8c1e9faa21

                SHA1

                e8d53b9e8bc475cc274d80d3836b526d8dd2747a

                SHA256

                a4ae6d33f940a80e8fe34537c5cc1f8b8679c979607969320cfb750c15809ac2

                SHA512

                6f151c9818ac2f3aef6d4cabd8122c7e22ccf0b84fa5d4bcc951f8c3d00e8c270127eac1e9d93c5f4594ac90de8aff87dc6e96562f532a3d19c0da63a28654b7

              • \Users\Admin\AppData\Local\Temp\nsd70FD.tmp\nsProcess.dll
                Filesize

                35KB

                MD5

                764371d831841fe57172aa830d22149d

                SHA1

                680e20e9b98077dea32b083b5c746d8de35e0584

                SHA256

                93df9e969053ca77c982c6e52b7f2898d22777a8c50274b54303eaa0ef5ccded

                SHA512

                19076205eba08df978ad17f8176d3a5a17c4ea684460894b6a80cae7e48fcae5e9493ff745d88d62fd44fc17bcda838570add6c38bebe4962d575f060f1584f9

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\INetC.dll
                Filesize

                238KB

                MD5

                38caa11a462b16538e0a3daeb2fc0eaf

                SHA1

                c22a190b83f4b6dc0d6a44b98eac1a89a78de55c

                SHA256

                ed04a4823f221e9197b8f3c3da1d6859ff5b176185bde2f1c923a442516c810a

                SHA512

                777135e05e908ac26bfce0a9c425b57f7132c1cdb0969bbb6ef625748c868860602bacc633c61cab36d0375b94b6bcfbd8bd8c7fa781495ef7332e362f8d44d1

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\SpiderBanner.dll
                Filesize

                9KB

                MD5

                17309e33b596ba3a5693b4d3e85cf8d7

                SHA1

                7d361836cf53df42021c7f2b148aec9458818c01

                SHA256

                996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

                SHA512

                1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\StdUtils.dll
                Filesize

                100KB

                MD5

                c6a6e03f77c313b267498515488c5740

                SHA1

                3d49fc2784b9450962ed6b82b46e9c3c957d7c15

                SHA256

                b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

                SHA512

                9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\System.dll
                Filesize

                12KB

                MD5

                0d7ad4f45dc6f5aa87f606d0331c6901

                SHA1

                48df0911f0484cbe2a8cdd5362140b63c41ee457

                SHA256

                3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                SHA512

                c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\WinShell.dll
                Filesize

                3KB

                MD5

                1cc7c37b7e0c8cd8bf04b6cc283e1e56

                SHA1

                0b9519763be6625bd5abce175dcc59c96d100d4c

                SHA256

                9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

                SHA512

                7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\nsProcess.dll
                Filesize

                4KB

                MD5

                f0438a894f3a7e01a4aae8d1b5dd0289

                SHA1

                b058e3fcfb7b550041da16bf10d8837024c38bf6

                SHA256

                30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

                SHA512

                f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

              • \Users\Admin\AppData\Local\Temp\nstB96.tmp\nsis7z.dll
                Filesize

                424KB

                MD5

                80e44ce4895304c6a3a831310fbf8cd0

                SHA1

                36bd49ae21c460be5753a904b4501f1abca53508

                SHA256

                b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

                SHA512

                c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

              • \Windows\NvOptimizerLog\d3dcompiler_47.dll
                Filesize

                4.3MB

                MD5

                7641e39b7da4077084d2afe7c31032e0

                SHA1

                2256644f69435ff2fee76deb04d918083960d1eb

                SHA256

                44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47

                SHA512

                8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

              • \Windows\NvOptimizerLog\ffmpeg.dll
                Filesize

                2.7MB

                MD5

                5c2e6bcfcffc022cfb7e975ad4ce2ea4

                SHA1

                8f65334f554b02e206faecd2049d31ef678b321d

                SHA256

                d068695dc8f873caab1db51c179e9696dda2319fa05c0f2d281f9979e2054fc2

                SHA512

                b5fe0039e1702375a6e1f4ef7bfb24d0acc42c87d02202a488fccf3d161598549055d2ac0103c95dbbc0e46975aed30259edbfef7ce77d00f1de7c1670c00959

              • \Windows\NvOptimizerLog\libEGL.dll
                Filesize

                436KB

                MD5

                2fe9e551c93156baf537483671ec4ad7

                SHA1

                08ce2344b2e0a78c2af637f0eae46b948661d5a5

                SHA256

                f231525ba1ea2522552a722620bced187357d66d945f0cec067c5d858950ea61

                SHA512

                f93181f1f2268cc380dafef02a93899cb9a19f3287a918bf6ba8eaa69190627d2e2fb0c82b693471e3ca63fbcb07c44212268c1357a5a4cf594a3bd8973eefd2

              • \Windows\NvOptimizerLog\libGLESv2.dll
                Filesize

                7.5MB

                MD5

                5967a9234ec54d734b31cfd12cb67faf

                SHA1

                536840ddb29ead51d43a506fd493b48c436097d6

                SHA256

                48ec76bac1ff6647096a9532ac21b4a0d7c6c9c24613971aaa201cce452ce4ce

                SHA512

                cf8e4c3a838b58a568639ab2778800d776e0171dc34e3b82f537adbadceaa3c292240ec7d8561b5a85df3caef6e001a07ac19e280a5bb8b0607f8ba767461479

              • \Windows\NvOptimizerLog\swiftshader\libEGL.dll
                Filesize

                458KB

                MD5

                dd05d7f61dd6b05e8a5cbaff36c3a48e

                SHA1

                0411d38dd19b05aac80436783faa83bec31871fe

                SHA256

                5874825870e6ae10d5e4c06cc061ff729237c43cb2237a1c425d2b1cc49e6ab0

                SHA512

                edda21fc1797195f15e95d9a0ab6a8aa15805796e42ae5159a813ff339590287743a68186a2dbf0608beb3943794f7773b11c59665f176ae4a1cc6548440370a

              • memory/1628-587-0x000000001B660000-0x000000001B942000-memory.dmp
                Filesize

                2.9MB

              • memory/1732-558-0x0000000001E80000-0x0000000001E88000-memory.dmp
                Filesize

                32KB

              • memory/1732-557-0x000000001B620000-0x000000001B902000-memory.dmp
                Filesize

                2.9MB

              • memory/1824-387-0x0000000000060000-0x0000000000061000-memory.dmp
                Filesize

                4KB

              • memory/1824-420-0x00000000776F0000-0x00000000776F1000-memory.dmp
                Filesize

                4KB

              • memory/2000-624-0x0000000000400000-0x0000000000481000-memory.dmp
                Filesize

                516KB

              • memory/2000-625-0x0000000074AF0000-0x0000000074AFE000-memory.dmp
                Filesize

                56KB

              • memory/2000-627-0x0000000074A40000-0x0000000074A4C000-memory.dmp
                Filesize

                48KB

              • memory/2000-626-0x0000000074AE0000-0x0000000074AEB000-memory.dmp
                Filesize

                44KB

              • memory/2008-728-0x00000000022E0000-0x00000000022E8000-memory.dmp
                Filesize

                32KB

              • memory/2008-727-0x000000001B5D0000-0x000000001B8B2000-memory.dmp
                Filesize

                2.9MB

              • memory/2104-661-0x00000000776F0000-0x00000000776F1000-memory.dmp
                Filesize

                4KB

              • memory/2268-574-0x0000000002890000-0x0000000002898000-memory.dmp
                Filesize

                32KB

              • memory/2268-573-0x000000001B430000-0x000000001B712000-memory.dmp
                Filesize

                2.9MB

              • memory/2328-369-0x0000000003C40000-0x0000000003C42000-memory.dmp
                Filesize

                8KB

              • memory/2560-719-0x000000001B740000-0x000000001BA22000-memory.dmp
                Filesize

                2.9MB

              • memory/2560-720-0x0000000001E00000-0x0000000001E08000-memory.dmp
                Filesize

                32KB

              • memory/2700-757-0x0000000074AF0000-0x0000000074AFE000-memory.dmp
                Filesize

                56KB

              • memory/2700-758-0x0000000074A60000-0x0000000074A6B000-memory.dmp
                Filesize

                44KB

              • memory/2700-759-0x0000000074A50000-0x0000000074A5C000-memory.dmp
                Filesize

                48KB

              • memory/2700-756-0x0000000000400000-0x0000000000481000-memory.dmp
                Filesize

                516KB

              • memory/2924-549-0x0000000001E70000-0x0000000001E78000-memory.dmp
                Filesize

                32KB

              • memory/2924-548-0x000000001B620000-0x000000001B902000-memory.dmp
                Filesize

                2.9MB