URL:

https://github.com/pankoza2-pl/malwaredatabase-old

Full analysis: https://app.any.run/tasks/081d9a1c-3ce7-4dfe-ac56-d4dccd5c8e47
Verdict: Malicious activity
Analysis date: June 22, 2024, 21:57:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MD5:

89EF704FE9FCD9DEC53369122D727921

SHA1:

D7A8E3B1E57F5AFCD06E7C58F7FAFC0D303E0F52

SHA256:

F1917B1442611BC18DF396D71113C5BA1D83BB84899D5071668670CB6F21C758

SSDEEP:

3:N8tEdlELlf3VJIcKR0y:2uoLFlSxb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • MBRKiller.exe (PID: 3808)
    • Changes the autorun value in the registry

      • MBRKiller.exe (PID: 3808)
    • Drops the executable file immediately after the start

      • DeathPlus.exe (PID: 2888)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • DeathPlus.exe (PID: 2888)
      • WinRAR.exe (PID: 2016)
    • Starts CMD.EXE for commands execution

      • DeathPlus.exe (PID: 2888)
    • Reads the Internet Settings

      • DeathPlus.exe (PID: 2888)
      • cmd.exe (PID: 684)
      • mshta.exe (PID: 1876)
    • Executing commands from a ".bat" file

      • DeathPlus.exe (PID: 2888)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 684)
    • Probably fake Windows Update

      • schtasks.exe (PID: 832)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 684)
    • The executable file from the user directory is run by the CMD process

      • MBRKiller.exe (PID: 3808)
      • tunnel.exe (PID: 764)
      • CLWCP.exe (PID: 1588)
      • waves.exe (PID: 3436)
      • BitBlt.exe (PID: 1164)
      • icons.exe (PID: 3484)
      • tunnel.exe (PID: 3616)
      • icons.exe (PID: 3940)
      • CLWCP.exe (PID: 1488)
      • scream.exe (PID: 1412)
      • scream.exe (PID: 3352)
      • scream.exe (PID: 1104)
      • scream.exe (PID: 2704)
      • scream.exe (PID: 2696)
      • scream.exe (PID: 2400)
      • scream.exe (PID: 1796)
      • scream.exe (PID: 1916)
      • scream.exe (PID: 3356)
      • scream.exe (PID: 2712)
      • scream.exe (PID: 2708)
      • scream.exe (PID: 2904)
      • scream.exe (PID: 1284)
      • scream.exe (PID: 1404)
      • scream.exe (PID: 2872)
      • scream.exe (PID: 2992)
      • scream.exe (PID: 368)
      • CLWCP.exe (PID: 1588)
      • scream.exe (PID: 2908)
      • scream.exe (PID: 1216)
      • BitBlt.exe (PID: 3624)
      • tunnel.exe (PID: 1788)
      • inv.exe (PID: 1268)
      • icons.exe (PID: 3228)
      • scream.exe (PID: 1280)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 684)
    • Executable content was dropped or overwritten

      • DeathPlus.exe (PID: 2888)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 684)
  • INFO

    • Drops the executable file immediately after the start

      • msedge.exe (PID: 2092)
      • msedge.exe (PID: 3380)
      • WinRAR.exe (PID: 2016)
    • Create files in a temporary directory

      • DeathPlus.exe (PID: 2888)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2016)
    • Checks supported languages

      • DeathPlus.exe (PID: 2888)
      • MBRKiller.exe (PID: 3808)
      • CLWCP.exe (PID: 1588)
      • vlc.exe (PID: 1228)
      • icons.exe (PID: 3484)
      • tunnel.exe (PID: 764)
      • waves.exe (PID: 3436)
      • BitBlt.exe (PID: 1164)
      • icons.exe (PID: 3940)
      • tunnel.exe (PID: 3616)
      • scream.exe (PID: 1412)
      • scream.exe (PID: 3352)
      • scream.exe (PID: 1104)
      • scream.exe (PID: 2704)
      • scream.exe (PID: 2400)
      • CLWCP.exe (PID: 1488)
      • scream.exe (PID: 2696)
      • scream.exe (PID: 1796)
      • scream.exe (PID: 2708)
      • scream.exe (PID: 1916)
      • scream.exe (PID: 3356)
      • scream.exe (PID: 2712)
      • scream.exe (PID: 1280)
      • scream.exe (PID: 2904)
      • scream.exe (PID: 1284)
      • scream.exe (PID: 1404)
      • scream.exe (PID: 2872)
      • scream.exe (PID: 2992)
      • scream.exe (PID: 368)
      • CLWCP.exe (PID: 1588)
      • scream.exe (PID: 2908)
      • scream.exe (PID: 1216)
      • tunnel.exe (PID: 1788)
      • vlc.exe (PID: 3024)
      • icons.exe (PID: 3228)
      • BitBlt.exe (PID: 3624)
      • inv.exe (PID: 1268)
      • vlc.exe (PID: 2220)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 2016)
      • msedge.exe (PID: 2832)
    • Application launched itself

      • msedge.exe (PID: 3380)
    • Reads the computer name

      • vlc.exe (PID: 1228)
      • DeathPlus.exe (PID: 2888)
    • UPX packer has been detected

      • DeathPlus.exe (PID: 2888)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 1876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
97
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winrar.exe deathplus.exe no specs THREAT deathplus.exe cmd.exe no specs taskkill.exe no specs reg.exe no specs bcdedit.exe no specs mbrkiller.exe schtasks.exe no specs vlc.exe notepad.exe no specs clwcp.exe no specs msedge.exe no specs msedge.exe no specs timeout.exe no specs waves.exe no specs timeout.exe no specs taskkill.exe no specs icons.exe no specs timeout.exe no specs taskkill.exe no specs tunnel.exe no specs timeout.exe no specs taskkill.exe no specs bitblt.exe no specs timeout.exe no specs taskkill.exe no specs icons.exe no specs timeout.exe no specs tunnel.exe no specs timeout.exe no specs taskkill.exe no specs taskkill.exe no specs clwcp.exe no specs timeout.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs scream.exe no specs timeout.exe no specs clwcp.exe no specs timeout.exe no specs vlc.exe bitblt.exe no specs icons.exe no specs tunnel.exe no specs timeout.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs inv.exe no specs timeout.exe no specs taskkill.exe no specs timeout.exe no specs reg.exe no specs rundll32.exe no specs timeout.exe no specs taskkill.exe no specs timeout.exe no specs vlc.exe timeout.exe no specs mshta.exe no specs timeout.exe no specs taskkill.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
348taskkill /f /im icons.exeC:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
368"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1324,i,2107990750088796087,11337592523546047010,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
368scream.exe C:\Users\admin\AppData\Local\Temp\501B.tmp\scream.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\501b.tmp\scream.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
684C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\501B.tmp\DeathPlus.bat" "C:\Windows\System32\cmd.exeDeathPlus.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
724timeout 5 /nobreakC:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
748taskkill /f /im BitBlt.exeC:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
764"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4176 --field-trial-handle=1324,i,2107990750088796087,11337592523546047010,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
764tunnel.exe C:\Users\admin\AppData\Local\Temp\501B.tmp\tunnel.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\501b.tmp\tunnel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
764taskkill /f /im explorer.exeC:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
832schtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\Users\admin\AppData\Local\Temp\501B.tmp\MBRKiller.exe"C:\Windows\System32\schtasks.exeMBRKiller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
45 864
Read events
45 713
Write events
108
Delete events
43

Modification events

(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3380) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
9A8867EB177A2F00
(PID) Process:(3380) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
(PID) Process:(3380) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
Executable files
14
Suspicious files
186
Text files
32
Unknown types
1

Dropped files

PID
Process
Filename
Type
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF4e859.TMP
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF4e878.TMP
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF4e887.TMP
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF4e8b6.TMP
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG.old~RF4e953.TMPtext
MD5:3E3FAD7BC02D9F39F64DACB4E9DD2624
SHA256:43C8C6C59477341650E102E67EE991E2414C4F098AD0EA0C1C4CEF3966F7CBDD
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:4B74C392839DDD59792975091A30DB00
SHA256:7A5A3B8CC4D5BB579FA5E6C6A831964FB245A5CFF9AD3B80F5E9DC34DA4A7D53
3380msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG.oldtext
MD5:E744678A0B77869F3FE20FC4804AE614
SHA256:9F7ECF44A669E66308A0551D0D6FF2844682B5B3580DC91A15320F166FF675F5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
40
DNS requests
43
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
213.155.157.155:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
1060
svchost.exe
GET
304
213.155.157.168:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
unknown
1372
svchost.exe
GET
200
213.155.157.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
1372
svchost.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3380
msedge.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2092
msedge.exe
140.82.121.3:443
github.com
GITHUB
US
unknown
2092
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2092
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
2092
msedge.exe
185.199.110.154:443
github.githubassets.com
FASTLY
US
unknown
2092
msedge.exe
185.199.108.133:443
avatars.githubusercontent.com
FASTLY
US
unknown

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.121.3
  • 140.82.121.4
shared
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
github.githubassets.com
  • 185.199.110.154
  • 185.199.111.154
  • 185.199.108.154
  • 185.199.109.154
whitelisted
avatars.githubusercontent.com
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
whitelisted
github-cloud.s3.amazonaws.com
  • 52.217.205.25
  • 52.216.211.137
  • 3.5.28.62
  • 3.5.12.15
  • 16.182.106.161
  • 52.217.0.236
  • 3.5.27.182
  • 52.217.230.33
shared
user-images.githubusercontent.com
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.110.133
whitelisted
www.bing.com
  • 80.239.150.25
  • 80.239.150.51
  • 80.239.150.104
  • 80.239.150.24
  • 80.239.150.33
  • 80.239.150.83
  • 80.239.150.65
  • 80.239.150.105
  • 80.239.150.11
  • 80.239.150.80
  • 80.239.150.81
  • 80.239.150.8
whitelisted
collector.github.com
  • 140.82.114.21
whitelisted
api.github.com
  • 140.82.121.6
whitelisted

Threats

No threats detected
Process
Message
vlc.exe
main libvlc debug: using multimedia timers as clock source
vlc.exe
main libvlc debug: min period: 1 ms, max period: 1000000 ms
vlc.exe
main libvlc debug: searching plug-in modules
vlc.exe
main libvlc debug: loading plugins cache file C:\Program Files\VideoLAN\VLC\plugins\plugins.dat
vlc.exe
main libvlc debug: VLC media player - 3.0.11 Vetinari
vlc.exe
main libvlc debug: Copyright © 1996-2020 the VideoLAN team
vlc.exe
main libvlc debug: revision 3.0.11-0-gdc0c5ced72
vlc.exe
main libvlc debug: configured with ../extras/package/win32/../../../configure '--enable-update-check' '--enable-lua' '--enable-faad' '--enable-flac' '--enable-theora' '--enable-avcodec' '--enable-merge-ffmpeg' '--enable-dca' '--enable-mpc' '--enable-libass' '--enable-schroedinger' '--enable-realrtsp' '--enable-live555' '--enable-dvdread' '--enable-shout' '--enable-goom' '--enable-caca' '--enable-qt' '--enable-skins2' '--enable-sse' '--enable-mmx' '--enable-libcddb' '--enable-zvbi' '--disable-telx' '--enable-nls' '--host=i686-w64-mingw32' '--with-breakpad=https://win.crashes.videolan.org' 'host_alias=i686-w64-mingw32' 'PKG_CONFIG_LIBDIR=/home/jenkins/workspace/vlc-release/windows/vlc-release-win32-x86/contrib/i686-w64-mingw32/lib/pkgconfig'
vlc.exe
main libvlc debug: recursively browsing `C:\Program Files\VideoLAN\VLC\plugins'
vlc.exe
main libvlc error: stale plugins cache: modified C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_concat_plugin.dll