Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
28-08-2020 12:51
Static task
static1
Behavioral task
behavioral1
Sample
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe
Resource
win7
Behavioral task
behavioral2
Sample
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe
Resource
win10v200722
General
-
Target
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe
-
Size
5.4MB
-
MD5
d7d6889bfa96724f7b3f951bc06e8c02
-
SHA1
a897f6fb6fff70c71b224caea80846bcd264cf1e
-
SHA256
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e
-
SHA512
0aabb090791d8b7c5af273793d61bc7ef164343d027e12b58faec66dbdddb724f58b267a423088ce06c52420af80ffe276b448cd3844fee4f929a98b0f64ae75
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe -
Executes dropped EXE 7 IoCs
Processes:
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exesvchost.comframe.exesvchost.comsvchost.comlphsi.exehrss.exepid process 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1928 svchost.com 1612 frame.exe 1704 svchost.com 1532 svchost.com 1028 lphsi.exe 2028 hrss.exe -
Drops startup file 1 IoCs
Processes:
hrss.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\script.lnk hrss.exe -
Loads dropped DLL 22 IoCs
Processes:
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exesvchost.comsvchost.comsvchost.comhrss.exepid process 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1928 svchost.com 1704 svchost.com 1532 svchost.com 1704 svchost.com 1532 svchost.com 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1928 svchost.com 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1928 svchost.com 1928 svchost.com 1928 svchost.com 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1928 svchost.com 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 1928 svchost.com 1928 svchost.com 1928 svchost.com 2028 hrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
JavaScript code in executable 8 IoCs
Processes:
resource yara_rule C:\PROGRA~2\Google\Chrome\APPLIC~1\830410~1.106\INSTAL~1\chrmstp.exe js C:\PROGRA~2\Google\Chrome\APPLIC~1\830410~1.106\INSTAL~1\setup.exe js C:\PROGRA~2\Google\Chrome\APPLIC~1\chrome.exe js C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE js C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE js C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE js C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE js C:\Users\ALLUSE~1\PACKAG~1\{F4220~1\VC_RED~1.EXE js -
Drops file in Program Files directory 91 IoCs
Processes:
svchost.com0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Temp\GUM2396.tmp\GOFB2B~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GO664E~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Chrome\APPLIC~1\830410~1.106\NOTIFI~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~3.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~4.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOF5E2~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~1.EXE svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Chrome\APPLIC~1\CHROME~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOBD5D~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe svchost.com File opened for modification C:\PROGRA~2\Google\Chrome\APPLIC~1\830410~1.106\INSTAL~1\setup.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe svchost.com File opened for modification C:\PROGRA~2\Google\Chrome\APPLIC~1\chrome.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Temp\GUM2396.tmp\GOFB2B~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~4.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Chrome\APPLIC~1\830410~1.106\CHROME~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GO664E~1.EXE svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~2.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe svchost.com -
Drops file in Windows directory 7 IoCs
Processes:
svchost.comsvchost.com0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exesvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Modifies registry class 1 IoCs
Processes:
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1724 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1724 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
vlc.exedescription pid process Token: 33 1724 vlc.exe Token: SeIncBasePriorityPrivilege 1724 vlc.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
vlc.exepid process 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
vlc.exepid process 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe 1724 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1724 vlc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exesvchost.comframe.exesvchost.comsvchost.comdescription pid process target process PID 1588 wrote to memory of 1896 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe PID 1588 wrote to memory of 1896 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe PID 1588 wrote to memory of 1896 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe PID 1588 wrote to memory of 1896 1588 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe PID 1896 wrote to memory of 1928 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe svchost.com PID 1896 wrote to memory of 1928 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe svchost.com PID 1896 wrote to memory of 1928 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe svchost.com PID 1896 wrote to memory of 1928 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe svchost.com PID 1896 wrote to memory of 1724 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe vlc.exe PID 1896 wrote to memory of 1724 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe vlc.exe PID 1896 wrote to memory of 1724 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe vlc.exe PID 1896 wrote to memory of 1724 1896 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe vlc.exe PID 1928 wrote to memory of 1612 1928 svchost.com frame.exe PID 1928 wrote to memory of 1612 1928 svchost.com frame.exe PID 1928 wrote to memory of 1612 1928 svchost.com frame.exe PID 1928 wrote to memory of 1612 1928 svchost.com frame.exe PID 1612 wrote to memory of 1704 1612 frame.exe svchost.com PID 1612 wrote to memory of 1704 1612 frame.exe svchost.com PID 1612 wrote to memory of 1704 1612 frame.exe svchost.com PID 1612 wrote to memory of 1704 1612 frame.exe svchost.com PID 1612 wrote to memory of 1532 1612 frame.exe svchost.com PID 1612 wrote to memory of 1532 1612 frame.exe svchost.com PID 1612 wrote to memory of 1532 1612 frame.exe svchost.com PID 1612 wrote to memory of 1532 1612 frame.exe svchost.com PID 1704 wrote to memory of 1028 1704 svchost.com lphsi.exe PID 1704 wrote to memory of 1028 1704 svchost.com lphsi.exe PID 1704 wrote to memory of 1028 1704 svchost.com lphsi.exe PID 1704 wrote to memory of 1028 1704 svchost.com lphsi.exe PID 1532 wrote to memory of 2028 1532 svchost.com hrss.exe PID 1532 wrote to memory of 2028 1532 svchost.com hrss.exe PID 1532 wrote to memory of 2028 1532 svchost.com hrss.exe PID 1532 wrote to memory of 2028 1532 svchost.com hrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe"C:\Users\Admin\AppData\Local\Temp\0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Public\Video\frame.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Public\Video\frame.exeC:\Users\Public\Video\frame.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Public\Video\lphsi.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Public\Video\lphsi.exeC:\Users\Public\Video\lphsi.exe6⤵
- Executes dropped EXE
PID:1028
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Public\Video\hrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Public\Video\hrss.exeC:\Users\Public\Video\hrss.exe6⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
PID:2028
-
-
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Public\Video\movie.mp4"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1724
-
-