nvda_noUIAccess.exe

  • File Path: C:\Program Files (x86)\NVDA\nvda_noUIAccess.exe
  • Description: NVDA application

Screenshot

nvda_noUIAccess.exe nvda_noUIAccess.exe

Hashes

Type Hash
MD5 7B3DEE8C8E3368A7432531303B17A3BB
SHA1 A0959BACE9B0C4485974AE17351DF0798BF57BCF
SHA256 CC4A19EB1F28B8BBEC8988C39DF6410E3405C5D67DB2F3BBEB7946E91FAAFE0F
SHA384 32F0B55428729C4E3EDDF995B9FCCAF14800B5E157D382213ACD8B98981600845D0821FC7A47C9C20AD6C30041D1E124
SHA512 C306FD0E1E17EFB45DF0F0708AB3F1D3E6A5ECF728A65E4F2BF13C46C745FD575A5E9C8618F0F0A56EB20DB4EB93384C34095DF4CB70490AA4B9016D94B1E697
SSDEEP 1536:9Ya1nv7jgVHZL9qTaPtVCVAK29hrKkEC/RKxAuD8:9572HZL9qTGSTwEC/oA9
IMP F234EB5A6DE92D84E1C99397EB8FBBF3
PESHA1 7EA1AF151654F9C1DEE13819297F3BC238002ACD
PE256 C978EA2C7A8C40734E11BECC6A5E8FFCE13373FCEAA537A8A39EEEC2AEA22D69

Runtime Data

Child Processes:

nvdaHelperRemoteLoader.exe

Window Title:

Welcome to NVDA

Open Handles:

Path Type
(R–) C:\Windows\Speech_OneCore\Engines\TTS\en-US\NUSData\M1033David.keyboard.WVE File
(R-D) C:\Windows\Fonts\StaticCache.dat File
(R-D) C:\Windows\System32\en-US\kernel32.dll.mui File
(R-D) C:\Windows\System32\en-US\KernelBase.dll.mui File
(R-D) C:\Windows\System32\en-US\wdmaud.drv.mui File
(R-D) C:\Windows\SysWOW64\en-US\msacm32.drv.mui File
(R-D) C:\Windows\SysWOW64\oleacc.dll File
(RW-) C:\Program Files (x86)\NVDA File
(RW-) C:\Users\user\AppData\Local\Temp\nvda.log File
(RW-) C:\Windows File
(RW-) C:\Windows\SysWOW64 File
(RW-) C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.488_none_11b1e5df2ffd8627 File
(RW-) C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.508_none_429cdbca8a8ffa94 File
\BaseNamedObjects__ComCatalogCache__ Section
\BaseNamedObjects\NLS_CodePage_1252_3_2_0_0 Section
\BaseNamedObjects\NLS_CodePage_437_3_2_0_0 Section
\Sessions\1\BaseNamedObjects{36FA255B-DC7A-4F34-BE3E-63F56C955F09}-Map-GLOBAL Section
\Sessions\1\BaseNamedObjects\windows_shell_global_counters Section
\Sessions\1\Windows\Theme2547664911 Section
\Windows\Theme3854699184 Section

Loaded Modules:

Path
C:\Program Files (x86)\NVDA\nvda_noUIAccess.exe
C:\Windows\SYSTEM32\ntdll.dll
C:\Windows\System32\wow64.dll
C:\Windows\System32\wow64cpu.dll
C:\Windows\System32\wow64win.dll

Signature

  • Status: Signature verified.
  • Serial: 05A5D5961B5ACC20CC6D4929DA8ADC85
  • Thumbprint: 48F05E5489B4ED66E5C7D110CD0371047457CFA6
  • Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
  • Subject: E=sysadmin@nvaccess.org, CN=NV Access Limited, O=NV Access Limited, L=Camp Mountain, S=Queensland, C=AU

File Metadata

  • Original Filename: nvda_noUIAccess.exe
  • Product Name: NVDA
  • Company Name: NV Access
  • File Version: 2020.2.0.20631
  • Product Version: 2020.2
  • Language: English (United States)
  • Legal Copyright: Copyright (C) 2006-2020 NVDA Contributors
  • Machine Type: 32-bit

File Scan

  • VirusTotal Detections: 0/69
  • VirusTotal Link: https://www.virustotal.com/gui/file/cc4a19eb1f28b8bbec8988c39df6410e3405c5d67db2f3bbeb7946e91faafe0f/detection/

File Similarity (ssdeep match)

File Score
C:\Program Files (x86)\NVDA\nvda.exe 80
C:\Program Files (x86)\NVDA\nvda.exe 40
C:\Program Files (x86)\NVDA\nvda_dmp.exe 47
C:\Program Files (x86)\NVDA\nvda_eoaProxy.exe 41
C:\Program Files (x86)\NVDA\nvda_eoaProxy.exe 68
C:\Program Files (x86)\NVDA\nvda_noUIAccess.exe 36
C:\Program Files (x86)\NVDA\nvda_slave.exe 69
C:\Program Files (x86)\NVDA\nvda_slave.exe 43
C:\Program Files (x86)\NVDA\nvda_uiAccess.exe 80
C:\Program Files (x86)\NVDA\nvda_uiAccess.exe 40

MIT License. Copyright (c) 2020-2021 Strontic.