Edit tour

Windows Analysis Report
NVDisplay.Container.exe

Overview

General Information

Sample name:NVDisplay.Container.exe
Analysis ID:1490155
MD5:25a35dd1848a060d8ae2e2e0124d132d
SHA1:372194560fa6897313881d74c12f231639c3d1c8
SHA256:99824d9ba21635461f054a515afa6ea1a6aace55b8902f304c2cfd6aad38b880

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • NVDisplay.Container.exe (PID: 6680 cmdline: "C:\Users\user\Desktop\NVDisplay.Container.exe" MD5: 25A35DD1848A060D8AE2E2E0124D132D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: NVDisplay.Container.exeStatic PE information: certificate valid
Source: NVDisplay.Container.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: C:\dvs\p4\build\sw\gcomp\dev\src\NvContainer\_out\x86_64\release\container\NvContainer.pdb source: NVDisplay.Container.exe
Source: Binary string: V:VC:\dvs\p4\build\sw\gcomp\dev\src\NvContainer\_out\x86_64\release\container\NvContainer.pdb" source: NVDisplay.Container.exe
Source: NVDisplay.Container.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
Source: NVDisplay.Container.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: NVDisplay.Container.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: NVDisplay.Container.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: NVDisplay.Container.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
Source: NVDisplay.Container.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: NVDisplay.Container.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: NVDisplay.Container.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: NVDisplay.Container.exeString found in binary or memory: http://ocsp.digicert.com0
Source: NVDisplay.Container.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: NVDisplay.Container.exeString found in binary or memory: http://ocsp.entrust.net02
Source: NVDisplay.Container.exeString found in binary or memory: http://ocsp.entrust.net03
Source: NVDisplay.Container.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: NVDisplay.Container.exeString found in binary or memory: http://www.entrust.net/rpa03
Source: NVDisplay.Container.exeString found in binary or memory: https://www.entrust.net/rpa0
Source: NVDisplay.Container.exe, 00000000.00000000.2021051270.00007FF7FBFB9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNvContainer.exeB vs NVDisplay.Container.exe
Source: NVDisplay.Container.exeBinary or memory string: OriginalFilenameNvContainer.exeB vs NVDisplay.Container.exe
Source: classification engineClassification label: clean1.winEXE@1/0@0/0
Source: NVDisplay.Container.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\NVDisplay.Container.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: NVDisplay.Container.exeString found in binary or memory: -d/d--directoryload plugins from the specified directory-s/s--servicerun container process as service with the provided name-f/f--logfileoutput traces to the specified log file-l/l--loglevelset logging level to the provided value-t/t--testtimespecify test duration in ms-c/c--childstart container as child-a/a--autoconfigure service container in auto-start mode-m/m--safemodestart container in safe mode (recovery mode)-r/r--recursiverecursively traverse the plugin folder and load plugins from subfolders-p/p--checkperiodspecify self-check period in ms-h/h--helpprint usage help message-b/b--blocklogoffblock user logoff requests-st/st--sendtelemetrysends telemetry using specified container telemetry helper DLL-cfg/cfg--configurationFetches configuration settings based on given identifier%uNvContainer - generic NV host process.
Source: NVDisplay.Container.exeString found in binary or memory: -d/d--directoryload plugins from the specified directory-s/s--servicerun container process as service with the provided name-f/f--logfileoutput traces to the specified log file-l/l--loglevelset logging level to the provided value-t/t--testtimespecify test duration in ms-c/c--childstart container as child-a/a--autoconfigure service container in auto-start mode-m/m--safemodestart container in safe mode (recovery mode)-r/r--recursiverecursively traverse the plugin folder and load plugins from subfolders-p/p--checkperiodspecify self-check period in ms-h/h--helpprint usage help message-b/b--blocklogoffblock user logoff requests-st/st--sendtelemetrysends telemetry using specified container telemetry helper DLL-cfg/cfg--configurationFetches configuration settings based on given identifier%uNvContainer - generic NV host process.
Source: NVDisplay.Container.exeString found in binary or memory: -d/d--directoryload plugins from the specified directory-s/s--servicerun container process as service with the provided name-f/f--logfileoutput traces to the specified log file-l/l--loglevelset logging level to the provided value-t/t--testtimespecify test duration in ms-c/c--childstart container as child-a/a--autoconfigure service container in auto-start mode-m/m--safemodestart container in safe mode (recovery mode)-r/r--recursiverecursively traverse the plugin folder and load plugins from subfolders-p/p--checkperiodspecify self-check period in ms-h/h--helpprint usage help message-b/b--blocklogoffblock user logoff requests-st/st--sendtelemetrysends telemetry using specified container telemetry helper DLL-cfg/cfg--configurationFetches configuration settings based on given identifier%uNvContainer - generic NV host process.
Source: NVDisplay.Container.exeString found in binary or memory: Failed to save auto-start flag %ls to registry for service %ls. Error %ld
Source: NVDisplay.Container.exeString found in binary or memory: Changed service %ls start type to auto-start
Source: NVDisplay.Container.exeString found in binary or memory: Failed to change service to auto-start for %ls. Error %u
Source: NVDisplay.Container.exeString found in binary or memory: Service hostC:\dvs\p4\build\sw\gcomp\dev\src\NvContainer\container\windows\NvcServiceHost.cppService host: failed to create ServiceThread. Error %uService host: wait completed with %uService host failedWaiting for ServiceConfigThread to finishServiceConfigThread finishedFailed to determine SID size. Error %uFailed to allocate memory - %uFailed to create users SID. Error %uFailed to lookup SID. Error %uFailed to create new DACL. Error %uCreated new DACL with added privileges 0x%08lXOpenProcess failed for %u. Error %uOpenProcessToken failed for %u. Error %uFailed to get security info for %u. Error %uSuccessfully adjusted DACL for process %uFailed to update security info for %u. Error %uRecoverySafe mode is ON. Optional plugins will not be loadedServiceAutoStartFailed to save auto-start flag %ls to registry for service %ls. Error %ldService host: failed to register service %ls. Error %uFailed to open SCM. Error %uFailed to open service %ls. Error %uFailed to query service configuration for %ls. Error %uLeaving service %ls start type %u unchangedChanged service %ls start type to auto-startFailed to change service to auto-start for %ls. Error %uServiceConfigThread: Quit event signaledServiceConfigThread: Timeout occurredServiceConfigThread: unknown wait conditionService host:Service host: service registration failedService host: failed to create ServiceConfigThread. Error %uService host: Created ServiceConfigThreadQuit received by window proc for message code: %d. IgnoredService host: quit enabledService host: quit disabledService host control: %u, %u, %pStart-pendingStop-pendingRunningContinue-pendingPause-pendingPausedService host: failed to report '%s' status. Error %uService host: '%s' status reported. Exit code %u
Source: C:\Users\user\Desktop\NVDisplay.Container.exeSection loaded: kernel.appcore.dllJump to behavior
Source: NVDisplay.Container.exeStatic PE information: certificate valid
Source: NVDisplay.Container.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: NVDisplay.Container.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: NVDisplay.Container.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\dvs\p4\build\sw\gcomp\dev\src\NvContainer\_out\x86_64\release\container\NvContainer.pdb source: NVDisplay.Container.exe
Source: Binary string: V:VC:\dvs\p4\build\sw\gcomp\dev\src\NvContainer\_out\x86_64\release\container\NvContainer.pdb" source: NVDisplay.Container.exe
Source: NVDisplay.Container.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: NVDisplay.Container.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: NVDisplay.Container.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: NVDisplay.Container.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: NVDisplay.Container.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: NVDisplay.Container.exeStatic PE information: section name: .didat
Source: NVDisplay.Container.exeStatic PE information: section name: _RDATA
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1490155 Sample: NVDisplay.Container.exe Startdate: 08/08/2024 Architecture: WINDOWS Score: 1 4 NVDisplay.Container.exe 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://aia.entrust.net/ts1-chain256.cer010%URL Reputationsafe
http://crl.entrust.net/ts1ca.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net020%URL Reputationsafe
http://www.entrust.net/rpa030%URL Reputationsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
https://www.entrust.net/rpa00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://aia.entrust.net/ts1-chain256.cer01NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
http://crl.entrust.net/ts1ca.crl0NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net03NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net02NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
http://www.entrust.net/rpa03NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
http://crl.entrust.net/2048ca.crl0NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
https://www.entrust.net/rpa0NVDisplay.Container.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1490155
Start date and time:2024-08-08 19:27:30 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:NVDisplay.Container.exe
Detection:CLEAN
Classification:clean1.winEXE@1/0@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • VT rate limit hit for: NVDisplay.Container.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.453788434500371
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:NVDisplay.Container.exe
File size:1'014'752 bytes
MD5:25a35dd1848a060d8ae2e2e0124d132d
SHA1:372194560fa6897313881d74c12f231639c3d1c8
SHA256:99824d9ba21635461f054a515afa6ea1a6aace55b8902f304c2cfd6aad38b880
SHA512:a8e0e6d5e69887017fed220072a9512387b2162755218cd4b0512de24f36e767e3a3d2af0ed9c680c8957110c50dfffb3326791f07ba1a23d621d68239147033
SSDEEP:24576:2ZPo9KDpIHEE0rpZQESit86xUR6sCGkMrg:2ZPgKDpIH0pZQESc86xUR6t5
TLSH:432539456E9BC5EAC17BA13FC5461943E9BEF602031393CB4B914A753B136E34E3A392
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........J\..+2..+2..+2..@6..+2..@1..+2..@7.d+2..^6..+2..^1..+2..^7..+2..v3..+2..+3..+2..^7..+2..^6..+2..^2..+2..^...+2..^0..+2.Rich.+2
Icon Hash:0cd3c0cad8c13244
Entrypoint:0x140036bd0
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x621DBDA6 [Tue Mar 1 06:31:02 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:f9bbd9a50a1378278fd166c16250f282
Signature Valid:true
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 18/10/2022 02:00:00 16/10/2025 01:59:59
Subject Chain
  • CN=NVIDIA Corporation, OU=1-F, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
Version:3
Thumbprint MD5:ADDD0E5C2C1FCB87E286ABF0F7292AF3
Thumbprint SHA-1:01DF5BFEFA251B27AC1933E4E4CB61F21C44D57B
Thumbprint SHA-256:CCDDF490761FD36F95BB22F6593DE9E2AC4BB190A617F1090DC9224E2713888D
Serial:0D0194CD1E3142205135D1C636E4E9BA
Instruction
dec eax
sub esp, 28h
call 00007F3970F180F4h
dec eax
add esp, 28h
jmp 00007F3970F17523h
int3
int3
jmp 00007F3970F16B48h
int3
int3
int3
dec eax
mov eax, esp
dec esp
mov dword ptr [eax+20h], ecx
dec esp
mov dword ptr [eax+18h], eax
dec eax
mov dword ptr [eax+10h], edx
push ebx
push esi
push edi
inc ecx
push esi
dec eax
sub esp, 38h
dec ebp
mov esi, ecx
dec ecx
mov ebx, eax
dec eax
mov esi, edx
mov byte ptr [eax-38h], 00000000h
dec eax
mov edi, edx
dec ecx
imul edi, eax
dec eax
add edi, ecx
dec eax
mov dword ptr [eax+08h], edi
dec eax
mov eax, ebx
dec eax
dec ebx
dec eax
mov dword ptr [esp+70h], ebx
dec eax
test eax, eax
je 00007F3970F1774Bh
dec eax
sub edi, esi
dec eax
mov dword ptr [esp+60h], edi
dec eax
mov ecx, edi
dec ecx
mov eax, esi
dec eax
mov edx, dword ptr [0006BA1Ch]
call edx
jmp 00007F3970F17709h
mov byte ptr [esp+20h], 00000001h
dec eax
add esp, 38h
inc ecx
pop esi
pop edi
pop esi
pop ebx
ret
int3
dec ebp
arpl ax, ax
jmp 00007F3970F176C1h
dec eax
mov dword ptr [esp+08h], ebx
push edi
dec eax
sub esp, 20h
dec eax
mov edi, dword ptr [ecx]
dec eax
mov ebx, ecx
cmp dword ptr [edi], E06D7363h
je 00007F3970F1773Fh
dec eax
mov ebx, dword ptr [esp+30h]
xor eax, eax
dec eax
add esp, 20h
pop edi
ret
call 00007F3970F188CFh
dec eax
mov dword ptr [eax], edi
dec eax
mov ebx, dword ptr [ebx+08h]
call 00007F3970F188D7h
dec eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xc47b00x58.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0xc48080x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd90000x21810.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xcd0000x963c.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0xf30000x4be0.rsrc
IMAGE_DIRECTORY_ENTRY_BASERELOC0xfb0000xc08.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xb56e80x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xb57900x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa9c400x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xa20000x650.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc468c0x60.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xa01d60xa0200ae36fb1444bd4f93e3ac43b5b8067936False0.44458369925839186data6.41079136367007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xa20000x23e4c0x240000fb7d3607d2a2e5d2ffde8c48e7e3f23False0.34759521484375OpenPGP Public Key5.208802659242257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xc60000x612c0x260070a3d30110ad56a1cd30375b7164b9bbFalse0.19449013157894737data3.5529144363971814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xcd0000x963c0x9800445cf24d8edd5dfdb30cf3601f9f1cc4False0.4973016036184211PEX Binary Archive5.970528807311775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.didat0xd70000x300x200e6e9f19d20ab19642b6158a7ad31e909False0.056640625data0.35064057787291114IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
_RDATA0xd80000x1800x2007088bcbec4af56067fadb975e64f8ec8False0.3359375data3.2525265821445117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xd90000x218100x21a00f12be6f09af899736c70749801593e34False0.22983707016728624data4.704931928489124IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xfb0000xc080xe00f61863cf6ebae549539b37ce0717162aFalse0.4361049107142857data5.056637225563827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xd935c0x2a17PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9395823665893271
RT_ICON0xdbd740x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 16384, 256 important colorsEnglishUnited States0.09643003693065244
RT_ICON0xe099c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.18523454157782515
RT_ICON0xe18440x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.24458483754512636
RT_ICON0xe20ec0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.23444700460829493
RT_ICON0xe27b40x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.2203757225433526
RT_ICON0xe2d1c0x27cbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9359968587415334
RT_ICON0xe54e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.06272920856500651
RT_ICON0xf5d100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.11639004149377594
RT_ICON0xf82b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.14845215759849906
RT_ICON0xf93600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.19836065573770492
RT_ICON0xf9ce80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.22783687943262412
RT_GROUP_ICON0xfa1500xaedataEnglishUnited States0.6264367816091954
RT_VERSION0xfa2000x314dataEnglishUnited States0.4606598984771574
RT_MANIFEST0xfa5140x2faASCII text, with very long lines (762), with no line terminatorsEnglishUnited States0.4776902887139108
DLLImport
SHLWAPI.dllPathIsRelativeW
KERNEL32.dllVerSetConditionMask, CreateFileW, GetFileAttributesW, GetFullPathNameW, OutputDebugStringW, SetLastError, CreateProcessA, CreateProcessW, GetSystemDirectoryW, FreeLibrary, GetModuleFileNameA, GetModuleFileNameW, GetProcAddress, LoadLibraryExW, lstrcmpA, VerifyVersionInfoW, FileTimeToSystemTime, ExpandEnvironmentStringsW, DeleteFileW, FindClose, FindFirstFileW, FindNextFileW, OutputDebugStringA, Sleep, GetCurrentThreadId, ProcessIdToSessionId, GetSystemTime, GetSystemTimeAsFileTime, CreateTimerQueueTimer, DeleteTimerQueueTimer, GetModuleHandleExW, MoveFileW, MultiByteToWideChar, WideCharToMultiByte, CreateToolhelp32Snapshot, Process32FirstW, RemoveVectoredContinueHandler, CreateDirectoryW, FindCloseChangeNotification, FindFirstChangeNotificationW, FindNextChangeNotification, GetCurrentDirectoryW, GetErrorMode, SetErrorMode, GetCommandLineW, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RemoveDirectoryW, DeviceIoControl, HeapSize, GetProcessHeap, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, GetStringTypeW, GetFileSizeEx, ReadConsoleW, ReadFile, SetStdHandle, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetConsoleCtrlHandler, GetCurrentThread, EnumSystemLocalesW, AddVectoredContinueHandler, RemoveVectoredExceptionHandler, AddVectoredExceptionHandler, SetUnhandledExceptionFilter, RtlCaptureStackBackTrace, RtlUnwind, GetModuleHandleW, WaitForMultipleObjects, OpenEventW, LocalFree, LocalAlloc, OpenProcess, CreateThread, GetCurrentProcessId, CreateEventW, WaitForSingleObject, SetEvent, GetLastError, CloseHandle, GetCurrentProcess, GetProcessTimes, SetDefaultDllDirectories, HeapReAlloc, Process32NextW, FormatMessageA, SetCurrentDirectoryW, FindFirstFileExW, GetDiskFreeSpaceExW, GetFileAttributesExW, GetFileInformationByHandle, GetFinalPathNameByHandleW, SetEndOfFile, SetFileAttributesW, SetFileInformationByHandle, SetFilePointerEx, SetFileTime, GetTempPathW, AreFileApisANSI, CreateDirectoryExW, CopyFileW, MoveFileExW, CreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, ResetEvent, WaitForSingleObjectEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, InitializeSListHead, InterlockedPushEntrySList, InterlockedFlushSList, RtlUnwindEx, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, GetFileType, GetStdHandle, WriteConsoleW, GetCPInfo, WriteFile, HeapAlloc, HeapFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID
USER32.dllPeekMessageW, GetMessageW, ShutdownBlockReasonDestroy, ShutdownBlockReasonCreate, SetWindowLongPtrW, GetWindowLongPtrW, LoadStringW, UnregisterClassW, RegisterClassW, DefWindowProcW, PostMessageW, DispatchMessageW, TranslateMessage, DestroyWindow, PostThreadMessageW, CreateWindowExW
SHELL32.dllCommandLineToArgvW
ADVAPI32.dllRegDeleteValueW, RegSetKeyValueW, RegOpenKeyExW, GetUserNameW, BuildExplicitAccessWithNameW, SetSecurityInfo, GetSecurityInfo, SetEntriesInAclW, StartServiceCtrlDispatcherW, SetServiceStatus, RegisterServiceCtrlHandlerExW, QueryServiceConfigW, OpenServiceW, OpenSCManagerW, CloseServiceHandle, ChangeServiceConfigW, RegGetValueW, RegSetValueExW, RegCreateKeyExW, RegCloseKey, LookupAccountSidW, CreateWellKnownSid, OpenProcessToken
NameOrdinalAddress
NvOptimusEnablement10x1400c6000
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
0246810s020406080100

Click to jump to process

Click to jump to process

Target ID:0
Start time:13:28:19
Start date:08/08/2024
Path:C:\Users\user\Desktop\NVDisplay.Container.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\NVDisplay.Container.exe"
Imagebase:0x7ff7fbed0000
File size:1'014'752 bytes
MD5 hash:25A35DD1848A060D8AE2E2E0124D132D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

No disassembly