Overview
overview
6Static
static
3capcut_cap...er.exe
windows7-x64
4capcut_cap...er.exe
windows10-2004-x64
6$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ed.dll
windows7-x64
3$PLUGINSDI...ed.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
47s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
capcut_capcutpc_0_1.2.6_installer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
capcut_capcutpc_0_1.2.6_installer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/deviceregister_shared.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/downloader_nsis_plugin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/shell_downloader.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/shell_downloader.dll
Resource
win10v2004-20240802-en
General
-
Target
capcut_capcutpc_0_1.2.6_installer.exe
-
Size
2.2MB
-
MD5
c91e097550ea6ccedf592d8b83414e0d
-
SHA1
021f3f26d86f98af28dc987baad8714f64867207
-
SHA256
4a9d815f284adda187982e2b24da2beaad860739bc4b4cb1cf26408e7c221dd6
-
SHA512
916898c9850ddfcd2c11da7421eeffc4d48406d9ad4787a4dc572ec17a81a39edd30733aa8cccde8b31450ff8031e3da68be019a8a0eff50c0a17ed4fa0aa3c9
-
SSDEEP
49152:uGVKq6wrr98ArcTTuVMZCC8GYCNbFLg3dlXI5x8oaigMv3Dh:uGVLprJ8ArnVMZCUPFcNlXID8en1
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
capcut_capcutpc_0_1.2.6_installer.exepid process 2756 capcut_capcutpc_0_1.2.6_installer.exe 2756 capcut_capcutpc_0_1.2.6_installer.exe 2756 capcut_capcutpc_0_1.2.6_installer.exe 2756 capcut_capcutpc_0_1.2.6_installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
capcut_capcutpc_0_1.2.6_installer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language capcut_capcutpc_0_1.2.6_installer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
capcut_capcutpc_0_1.2.6_installer.exechrome.exepid process 2756 capcut_capcutpc_0_1.2.6_installer.exe 2120 chrome.exe 2120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe Token: SeShutdownPrivilege 2120 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe 2120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2120 wrote to memory of 2616 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2616 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2616 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2672 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2948 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2948 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 2948 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe PID 2120 wrote to memory of 836 2120 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\capcut_capcutpc_0_1.2.6_installer.exe"C:\Users\Admin\AppData\Local\Temp\capcut_capcutpc_0_1.2.6_installer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_6504ad5a3e.exe"C:\Users\Admin\AppData\Local\app_shell_cache_562354\app_package_6504ad5a3e.exe" /s /create_desktop=1 /install_path="C:\Users\Admin\AppData\Local\CapCut\Apps"2⤵PID:2524
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7ad9758,0x7fef7ad9768,0x7fef7ad97782⤵PID:2616
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:22⤵PID:2672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1460 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:82⤵PID:2948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:82⤵PID:836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2148 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:12⤵PID:1268
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2156 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:12⤵PID:1556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1432 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:22⤵PID:1452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3228 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:12⤵PID:2492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:82⤵PID:1672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3752 --field-trial-handle=1396,i,7786678357483545680,3678665458538396893,131072 /prefetch:12⤵PID:1852
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\QtQuick\Window\quickwindow.qmltypes
Filesize215B
MD52006d4b7d0da455aa4c7414653c0018a
SHA16685b8360b97799aa4d6b18789bf84a343e9e891
SHA256a96c7bf5832767bdc9d91e2290a3920aec3abfbf2e3814bce38b49483f16f84a
SHA512703804e6fab0cf44317b7292c547a1348e2e7395e4b71367c32c3b097bcfb3344d3296179bf4ba33a4c752ae58a3873af57d8cdef35a34564205356bb4e6fd84
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\highlight\amazingfeature\scene.config
Filesize284B
MD577e51012d23d27cd7dfb762fb2f22366
SHA1faa1a6848a92f2eba5c6094659efee0eaf289e49
SHA2565b405fa29439f5853937c9714c794f10a01ed033f81866ba52f7f8ea5312b41e
SHA512efa87d35d3b2360809f5de98b7d681c3cdbee6144c1065e7144d098b56126f794b83a7aa692325d532271e7016556d1c9ac2f9eaf2fb480314bbedb951bda2d3
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\saturation\amazingfeature\Transform.lua
Filesize743B
MD555f8219de11fd1bab55e136d97f34add
SHA1d728bdc21b7c73165f7c767300c004afd02958e3
SHA256f5ae7d270c41dc064723acb52c96339337d142f327ed98591ebb52c9518a2a78
SHA5125ec44128343bc3cf4b0dffb318ec46e906e247ed4cb9a6839bb514f753b14fcda61070271b81538a9a67605641719119bdc2ad0d33eca614ee732eccdeccbf6c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\saturation\amazingfeature\main.scene
Filesize1KB
MD53717cb9f906065bafdf220f9db92858d
SHA1b16293702cb36fec8f20befa221ae22e00196911
SHA256b97663892b4a96ac2b5888965086c8e6e037e962a76f38529f8471d8b4e7dbad
SHA512e576fdd14c25fe5a32c688e39885fb177b79f4fd7e25d466fee33a0f5879e4727d033080d340c26850248f8549d34d39db190070f44ff017be2d2f5ed8278044
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\saturation\amazingfeature\sticker.config
Filesize243B
MD5a6370133cd32ad029749c4c30bdb80c6
SHA14ae8d816fb891657589f35f1bddd617e721ac379
SHA2566f8d212c18569ba0e1c3b1bc89c8c4b2a16377d94cc26d1d78df1bb920efe379
SHA512b410873382913c3a16a64390b1bd12978c639568c4cac1efbbcecbdd0852926991a9fd00aac60bdc94a489531c656f59b64559976a88c67bf35ddaffa0a9861d
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\saturation\amazingfeature\xshader\gles2_filter.vert
Filesize215B
MD5a1e49a5f219476c5377ad0cd33c5c326
SHA113029ff75a9d8796bb52a40f8126fed9d6e57dce
SHA256ff67b00d9d13e6ab219c94e61e36ad43f1e025d4e3f540f14a6ff26b1b7e8dbf
SHA5127d48ddb5b56b80204be4103d4ac3014cd2f9ed7212f8055a3d3792fd8b06715f8a489401d936c829e1ae53780af4abe0b4e838ee85d052c5019b6e6e29789a1e
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\shadow_highlight_v2_gles2\AmazingFeature\xshader\guideFilter.vert
Filesize245B
MD58b24bd873c1a8b3ad502e3f4a2ec2e96
SHA1c8b663f74c81aa71edb346b15dea3563ea370026
SHA256fb3e9e7a966147cc5cb48b1a087931bfbdea744a0d0e0def0f07070ba48a73cc
SHA51258b485ac1a1e72951ddfea8cfe794ee2db5e55c128f9b398989ac15d9610adfea879c3bb3ea1eb3ac0b29ed1b4892cec70d68761a1711d30124ca7a391f29b44
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\shadow_highlight_v2_gles3\AmazingFeature\LuaRTTI.MarkGen.lua
Filesize222B
MD55dac156aac6bffd08cb0f8c1637f5e5c
SHA140e6585e5de8648725243517781e4d3330caffcb
SHA256cf4f8b5ff1a50eff88236aba7f9bb48e696d337b779d98e911d00f6876800503
SHA5120999fd224c54882d28aa8067e20ee7877b509591901f801d400b613a4fd95af5948d6c512b01d1f7b3aad2203a80f8a3adfec1dd03b6dd3329de87e8583145a3
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\sharpen_v1\AmazingFeature\prefabs\sharp\fshader.vert
Filesize171B
MD5c90a03b7ece36748ed019572f6a5a1ec
SHA14d10c9cad45707369777d69d94aa05546990ff34
SHA256eaf495d1de3a920ca4f87e5bfe868a822d1ac05ae9f8d10651d60a382ecdd1b7
SHA5128d68782086ee3839855c725e206c5f845179a06026df5acf10b77f9ea06bb9b11cb2768c6ccc3c06c030de5122a9f9bb9025952b24ecc9c03c03c52b110d360e
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\temperature_tone_v3\AmazingFeature\sticker.config
Filesize276B
MD502b91a98d687f65158c5d30123166da6
SHA1a9e91db1e43f923942cb58cd242af527a5d9b158
SHA256c3de42b569951c70e76d4adb756b424c0ddaeaea6c1a0b61bf1935b7b7b1ee66
SHA512fe9f10abf7275af089e4cfa8e7a9c83b8b0a2f2763d481f25cb746f5122dedb4250f4a3fe3c0aa4b361e6194233cf31c2e8045baff108489daf4c2e3def04d10
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\tone_v1\amazingfeature\sticker.config
Filesize258B
MD56238b4cd638d16c1136c78c3d84b61ea
SHA103683ded62e4e602b25bdb6ee445dfe760e22b6c
SHA2569c9ba3ebe0c06582ce05df7831d4754061d2ed7c7e3ad6acaaaa563f7bbf7d2f
SHA5126339227384501243997f6f93d8da38ea673c86e6b39de2e2f8c8f46e1e388fc3d4ab4d916246bebb4238524af6d8323a86cb139467849148291551cd63514d1c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\tone_v1\amazingfeature\xshader\gles2_filter.vert
Filesize204B
MD595b57e27cb10a24e4acf91f3f00f0cc8
SHA162c259c7c1050e9de45ee3105983814dcd11f95d
SHA256add8f8c4c8e970dcdbe6ca1ab7180f7124cafc4e5dd909d8b0d7cf1734b3409e
SHA512a7ed5a37e5216b44f1a4451ffc2dafef2463ccbd8153a9d393d2b09da3dcd812e3cdec4975782c9484388698057c1994ef48b9371d26b83f56288a87acbe4b1c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\vignetting\amazingfeature\Transform.lua
Filesize716B
MD599b4753a045f720a4c6a1bcb875bd72c
SHA14afc8b19876ead7a7ad903f13521c2b443de1496
SHA2564e4b7c19259ebab2fbe29d179122a20584b783f12632bfc2d214d82e522c303b
SHA51215a857fa869f37dd777f261821947bbc27214d5993a6a7431fdecd88468cdd81c59a876534c0459c46f33cd7a6b03aa827160014ae729f16fbde19dfce3afb73
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\DefaultAdjustBundle\vignetting_v1\AmazingFeature\js-meta.json
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\LogWheel\log_wheel_v1\Wheel\scene.config
Filesize363B
MD58d61b3b6f3944a129228b01ab04a3a86
SHA1dd2a509da1175dd99095748b029c3b868d6f67c7
SHA256468a132a03b8569130faf2c5d8e0f05f3f7602a336b0510534026c11a73ab460
SHA512abd1ac6afff2b3ea5e8e454d4aa86dab711d8686ebaacfe66b141ec25755abc512b6252f8c786eff44ffc49f8483942a6c66c703bb2602f6f9b1a576b66f121f
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\anim.prefab
Filesize477B
MD59eaa91c4a6c3d873483059d0a1a76ab5
SHA1b100bd90dc01b7409963a0b4e9ea3c19ce475140
SHA256e9d87f8022efa9374e74d61c310d8bc11a98925b8d2e771ab75e1b865164c02e
SHA512a656a600c2aede10ed708f7fcfcde22b59b06aef2034b5715dc6c60c12fee3e1fea2a964c21e91fe1c0956c160472b62e4ef67bcf992b750b8ba3e651721ed83
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\blend.material
Filesize552B
MD57cdae2b4822bcd006e9d2ffce3e84453
SHA1720111dacf341b7ce908bd282058169a62239154
SHA256e8986f58f72446435468272d8d4e7c95a4fce58b3ad4838ed634b999196d3736
SHA5120ae64df166e18d7770a28c317565d5238b578202cb6c7bd2c9db55e185a61f79ae03f0530955f748dc387889c73f01479e23f7d21cb3dcbe44f2107905131a91
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\config.json
Filesize64B
MD5c1b0a3e521b261389e09efaf5f6fa2d9
SHA1976b181838ba45780eb4b2f9b629a1f7d1cf763d
SHA25607232ba6befad39df9079b18e7c66235a11b2b375626c80cabd0b46f9b7d948f
SHA51257d70636ebcbb3c0521da860d4cbbe9516a91e1b7b529e7e12781aa534c8c3a7c2d8f31c8c5fabb0acfbd6c81eedc292b3cbb8d0f01d306f12c249417a205a94
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\content.json
Filesize65B
MD577af16e6914627f13e1ffb90509cace4
SHA1329bafa669c548a0b9cc2ed266de24b0ec8608df
SHA256424c068d0f0e848d3b8f25ec1a55f1086df3c87ad95eca13fe6b265c46400fc0
SHA5124e96216696d5f8e43fbb5ba951dfeb5e32ad1d48fe0737c3725c5c4d4f2531bba18afa1b82d694f2a0029a1a0f37dd24236eaac8ba0d296b6e0fddd70ec60790
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\xshader\blend.vert
Filesize283B
MD5e3f125658d61f243d3b7b2ac1ed189c8
SHA1cff0ff4f418c4bb98d0349f0872ca55e8b3ef384
SHA2562719896bc6ff9ed2ff5532a937ac685668479e4bcd19ef11ed708cdbf52c2fd5
SHA512f224b7828c9bd272114a9a75d73858bd36ecfefd042c2d8adcd07216a781f7eb57d5ea019e0107c974cad483b8930814cc8e9c23966491a468ab207612e4bfe3
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\MixMode\840ca85a1a33e6fc3ea78bbdb2db8f60\xshader\blend.xshader
Filesize726B
MD55e0a7ae043616ffe49e0ca2dce2d6827
SHA1c95e3ef200a811775c4b0c7517a1603f41a9605f
SHA256a1a1915919f200668689f83694e4fb7b6bba2e3ff6cc2bacc7b84d36b7c48fc0
SHA512547ed7454ac05a68de5458ab998daf2fe167bbe18c3aea00499b9209aa3adea489688359a3ac688e39250b4abe99cee79657a98eaa1ef4eed7d201619020584e
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\PrimaryWheel\primary_wheel_v0\algorithmConfig.json
Filesize382B
MD52742644266425cbe36e1517602961e99
SHA19ac55196393e328a65f4cf6e5872822060f9ce5e
SHA25628251cedc501cb7285fe4c06af3714af3ec068834cc15c1ddcd913f91572ace0
SHA512e308c625a22b625631f81cfa4c9fc20e92efd082c5a6a0dc0aaf58b3b4924c21e40fe1da2faa0506e06f8c3e1bd4411b972dae5470b5424f77554ea48003f56c
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\PrimaryWheel\primary_wheel_v1\Wheel\sticker.config
Filesize276B
MD5ceeafc08b27c8bf1264a372e6572b243
SHA1a2b1c88dab2b2fa57adc0ce4863edf269654dc70
SHA2568695d8d1cd532f86c340a46ff20f6c96f25f842d6c6f2d3c67b29e3c8d706fb0
SHA512e14ded5b310ffcf969f94f3248e7f95f1a078616a05b90f47918581bbc983951c54e8d6d61538817a2d9e5ed868bf53e9623c0a19586ea8cebfbfdb6f81d29c9
-
C:\Users\Admin\AppData\Local\CapCut\Apps\202483104514081_1\JYPacket\4.1.0.1647\Resources\image_h5_sticker_publish\static\css\sticker-publish-collection.bbaa332b.css
Filesize15KB
MD578a39c78f36f0305b75b659171e894f6
SHA199cbb2d17670acc33e0b7030369b46ff16ddf62e
SHA256bc4db337419452015714560742969469ce9b78150d2d481c45eaa71b47c7a8f1
SHA51239b8748a47680f157394ac16fdae233a8b0d154d9c4f722988f484dceb22832d751e62b739eacc99e2a4a15fb31252b85dbc5d3df58717957b587e1851fdffd5
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
168B
MD5272b1c6e2a90974eeccfa2c252e746e5
SHA1a9626eca98370b3627544d24412edeff1086501d
SHA25600af7f0b3ac2e4f14ef662520c565707316b51f3c2740acfc8b503e9495fac52
SHA51224610c791083461c6f27bfa79646af8752c6c4be482cb4e9d0cabb8a943bc913491f9699e634a84d5fc01defa246623248552b36b53189305d913dfb3d875dc8
-
Filesize
168B
MD570fcd5af6d241ca4ea0921200c9b3df1
SHA14d90f81eb079de4e12ca0a921f3c0af9aa21d7ef
SHA25685bfbacf9780d8f8c6abaff0f059276e4b3a1bd9d68f26d5861e5f29a14f8c5a
SHA512673e0a4ce4fadec60c716a0b295fb5380445ecd9313426964952936309526902c5d4cebc8682c9e5d80c19294643ff89c708fc7ac8c1e5b299839881cdfb1eee
-
Filesize
4KB
MD57e96409e4a092ef094b2e7f2440f04e8
SHA1720981f9cc076a380d6eb12176e06a881e23ddb1
SHA25672cea85202941f7cceed5c4c38be682751f7cd2da392470d3f666c06b8dbdbce
SHA512f1be8717372f5a8efc79fe6338b9c17a8a4f5207cd1b903c0a9b3521a194618d783f428bd8d2dbc6315fd58bd0a8f26752229cf108b83bb1ecda5179fe161d93
-
Filesize
4KB
MD5aec46b864b8b3cb7ff1c00a64e49edd8
SHA1541c2623652f3488cac60a530e97c276bf02108c
SHA25664ab1d80751ee498d81b87df6d09e34f2ef157771483e994792c44cc84134dc2
SHA5127ca1786f49162aa65e6503e0c43e1e09969c7edd6f3e2116c4f22bac40b6837a46ffddc6301bc9a63731752a5bd25ef00a63448cfeef19edfccf183cca4123b7
-
Filesize
4KB
MD500cf028a00ef37cde81642a75269fd17
SHA1f9e574cd1b0a1318a299a1cd6a32df7c3090fbab
SHA256e8ff4c08eb55cd95e9b6907d197454e1d1bc853b73f81cc5f8fba0ead15108bf
SHA5126f85b47fdbd07c4653c1db986cc3937fe775cbe9eb16be0821eeaa65087e67117037fb6ec0593aae60663ba4b4f6e4aa201e354b5c17d80064131a6ec27febca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
751KB
MD52d97c2e0353cb0c63212ecacd326bb17
SHA153ac7d8a0f19314158a2e74f3d6f0d17103c1d37
SHA256fe604c8747171a85f883b08fcaf32a64d59ff7c7ed89e862ad252d366ab66368
SHA512392fce704b17aa367c6c8a09ccdf7505242aaed552a1772e14b828754d01ea3d1e7eef8936067fb87c7dec645783e80ace16aba8e342501ab09964d0363eefff
-
Filesize
2KB
MD533ec04738007e665059cf40bc0f0c22b
SHA14196759a922e333d9b17bda5369f14c33cd5e3bc
SHA25650f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be
SHA5122318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
1.2MB
MD5f181413906a465fd0dd68cc4a3d98803
SHA15aa28be48047dd0b672ab98d5e7cbd8260486b4b
SHA256e28ff7b8fc4b1eb2d1f394ce15de2fc031cda58db645038c8c07581c31e79dda
SHA5128d0116bcbc3938b2ebdddf77dec87e4b6c872382d20b555571b0bc3e4a35f88d16bc450004f875a8271165b71bdbae5d4d474a5bfda4c7787da63f4325009c25
-
Filesize
2.3MB
MD5c052c0a2ed833d924b7799625413ac1c
SHA1bdd08a29f4de283ba0eb3cda4abc26f6e85d4d5e
SHA256098972cf9ddc9d574130e025a252a99b278de9cc0ae700acfb8c935c24eb1172
SHA51289e67c29d5d8a401a70a5b572844f24bfde82d5d4259ecc5e6f12be0ddb434995a2e985914fc421973998e3fdc48b133e269e8bb1da513ec66199f01060162f1