File name:

XunLeiWebSetup10.1.38.890.exe

Full analysis: https://app.any.run/tasks/0a689b62-d1bf-4eef-8a46-c607ae4e988f
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: February 12, 2021, 15:00:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
adware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3AC0632B0E61703375E7EF9D997702CF

SHA1:

451E03CA2B21E6D7426C0CF649ECD19F22F3AD13

SHA256:

0D8DE3C88D073E369515F9BF6DABC1A98574D8B28EAF0DD061DBB51754A760F2

SSDEEP:

98304:guUJU+R5rhRNb0cE+SA8tNmef9ycNBg8RCkR5fA:guYHRWcfbQAIxf9IK5A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DownloadSDKServer.exe (PID: 2896)
      • DownloadSDKServer.exe (PID: 2076)
      • XLServicePlatform.exe (PID: 376)
      • XLWFPSetup.exe (PID: 2540)
      • Win7AppId.exe (PID: 3124)
      • Win7AppId.exe (PID: 3180)
      • Win7AppId.exe (PID: 3220)
      • xl_ext_chrome_setup.exe (PID: 2960)
      • InstallXLWFP.exe (PID: 2524)
      • InstallXLGuard.exe (PID: 3536)
      • InstallXLWFP.exe (PID: 3024)
      • APlayerCodecs3Embed.exe (PID: 2532)
      • InstallXLGuard.exe (PID: 1456)
      • BHOInstall.exe (PID: 3748)
      • ThunderBHOPlatform.exe (PID: 3760)
      • ThunderInstallHelper.exe (PID: 2320)
      • Thunder.exe (PID: 272)
      • Thunder.exe (PID: 2352)
      • Thunder.exe (PID: 3648)
      • XLLiveUD.exe (PID: 3016)
      • DownloadSDKServer.exe (PID: 2444)
      • Thunder.exe (PID: 2652)
      • Thunder.exe (PID: 3872)
      • Thunder.exe (PID: 3160)
      • Thunder.exe (PID: 1836)
      • XLLiveUD.exe (PID: 3976)
      • xlbrowsershell.exe (PID: 3336)
      • Thunder.exe (PID: 5008)
      • Thunder.exe (PID: 5512)
      • xlbrowsershell.exe (PID: 5144)
      • Thunder.exe (PID: 4776)
      • dgservice.exe (PID: 2284)
      • dgservice.exe (PID: 2980)
      • dgservice.exe (PID: 5680)
      • drivergenius.exe (PID: 2404)
      • dgutil.exe (PID: 5488)
      • Thunder.exe (PID: 4464)
      • dgservice.exe (PID: 4812)
      • dgprotect.exe (PID: 4968)
      • drvinst32.exe (PID: 6040)
      • DownloadSDKServer.exe (PID: 5120)
      • LdsHelper.exe (PID: 4960)
      • ComputerZTray.exe (PID: 5784)
      • drivergenius.exe (PID: 4764)
      • drivergenius.exe (PID: 4448)
      • ComputerZService.exe (PID: 7332)
      • XLServicePlatform.exe (PID: 4952)
      • RunDll.exe (PID: 6864)
      • XLServicePlatform.exe (PID: 8100)
      • RunDll.exe (PID: 1504)
      • RunDll.exe (PID: 7152)
      • NavPlugin.exe (PID: 5924)
      • XLServicePlatform.exe (PID: 8136)
      • Win7AppId.exe (PID: 5476)
      • Win7AppId.exe (PID: 7304)
      • Win7AppId.exe (PID: 2300)
      • Win7AppId.exe (PID: 6204)
      • Win7AppId.exe (PID: 7412)
      • Win7AppId.exe (PID: 6872)
      • XLLiveUD.exe (PID: 6012)
      • Thunder.exe (PID: 3472)
      • XLLiveUD.exe (PID: 6372)
    • Loads dropped or rewritten executable

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • DownloadSDKServer.exe (PID: 2896)
      • DownloadSDKServer.exe (PID: 2076)
      • BHOInstall.exe (PID: 3748)
      • svchost.exe (PID: 2184)
      • regsvr32.exe (PID: 672)
      • regsvr32.exe (PID: 2840)
      • XLWFPSetup.exe (PID: 2540)
      • regsvr32.exe (PID: 4080)
      • regsvr32.exe (PID: 396)
      • regsvr32.exe (PID: 1180)
      • ThunderBHOPlatform.exe (PID: 3760)
      • APlayerCodecs3Embed.exe (PID: 2532)
      • SearchProtocolHost.exe (PID: 3604)
      • Thunder.exe (PID: 272)
      • explorer.exe (PID: 568)
      • svchost.exe (PID: 872)
      • Thunder.exe (PID: 2352)
      • Thunder.exe (PID: 3648)
      • XLLiveUD.exe (PID: 3016)
      • Thunder.exe (PID: 1836)
      • DownloadSDKServer.exe (PID: 2444)
      • Thunder.exe (PID: 3160)
      • Thunder.exe (PID: 2652)
      • Thunder.exe (PID: 3872)
      • XLLiveUD.exe (PID: 3976)
      • xlbrowsershell.exe (PID: 3336)
      • Thunder.exe (PID: 5008)
      • Thunder.exe (PID: 5512)
      • xlbrowsershell.exe (PID: 5144)
      • Thunder.exe (PID: 4776)
      • dgservice.exe (PID: 2284)
      • dgservice.exe (PID: 2980)
      • dgservice.exe (PID: 5680)
      • drivergenius.exe (PID: 2404)
      • ludashisetup04.exe (PID: 5872)
      • dgutil.exe (PID: 5488)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • dgprotect.exe (PID: 4968)
      • Thunder.exe (PID: 4464)
      • DownloadSDKServer.exe (PID: 5120)
      • chrome.exe (PID: 2432)
      • chrome.exe (PID: 5072)
      • chrome.exe (PID: 5324)
      • chrome.exe (PID: 5236)
      • chrome.exe (PID: 2700)
      • chrome.exe (PID: 2368)
      • chrome.exe (PID: 5560)
      • chrome.exe (PID: 5156)
      • chrome.exe (PID: 1300)
      • chrome.exe (PID: 4204)
      • LdsHelper.exe (PID: 4960)
      • chrome.exe (PID: 4956)
      • chrome.exe (PID: 1776)
      • chrome.exe (PID: 3000)
      • drivergenius.exe (PID: 4764)
      • drivergenius.exe (PID: 4448)
      • ComputerZTray.exe (PID: 5784)
      • chrome.exe (PID: 6760)
      • ComputerZService.exe (PID: 7332)
      • RunDll.exe (PID: 6864)
      • RunDll.exe (PID: 1504)
      • RunDll.exe (PID: 7152)
      • chrome.exe (PID: 4272)
      • regsvr32.exe (PID: 4672)
      • NavPlugin.exe (PID: 5924)
      • svchost.exe (PID: 7532)
      • chrome.exe (PID: 4128)
      • chrome.exe (PID: 6272)
      • chrome.exe (PID: 6408)
      • chrome.exe (PID: 7308)
      • chrome.exe (PID: 1816)
      • chrome.exe (PID: 4016)
      • chrome.exe (PID: 6964)
      • chrome.exe (PID: 6188)
      • XLLiveUD.exe (PID: 6012)
      • chrome.exe (PID: 6484)
      • Thunder.exe (PID: 3472)
    • Registers / Runs the DLL via REGSVR32.EXE

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • ThunderBHOPlatform.exe (PID: 3760)
      • ComputerZTray.exe (PID: 5784)
    • Creates or modifies windows services

      • XLServicePlatform.exe (PID: 376)
      • XLServicePlatform.exe (PID: 8136)
    • Changes settings of System certificates

      • svchost.exe (PID: 2184)
      • Thunder.exe (PID: 272)
      • ludashisetup04.exe (PID: 5872)
      • xlbrowsershell.exe (PID: 3336)
      • ComputerZTray.exe (PID: 5784)
    • Changes the autorun value in the registry

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
    • Actions looks like stealing of personal data

      • dgservice.exe (PID: 5680)
      • explorer.exe (PID: 568)
      • NavPlugin.exe (PID: 5924)
    • Connects to CnC server

      • dgservice.exe (PID: 5680)
      • explorer.exe (PID: 568)
      • dgprotect.exe (PID: 4968)
    • Loads the Task Scheduler COM API

      • ComputerZTray.exe (PID: 5784)
      • explorer.exe (PID: 568)
    • Steals credentials from Web Browsers

      • explorer.exe (PID: 568)
      • NavPlugin.exe (PID: 5924)
  • SUSPICIOUS

    • Drops a file with too old compile date

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • XLWFPSetup.exe (PID: 2540)
      • XLServicePlatform.exe (PID: 376)
      • ThunderBHOPlatform.exe (PID: 3760)
      • xl_ext_chrome_setup.exe (PID: 2960)
      • DownloadSDKServer.exe (PID: 2076)
      • APlayerCodecs3Embed.exe (PID: 2532)
      • XLLiveUD.exe (PID: 3016)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • ludashisetup04.exe (PID: 5872)
      • XLServicePlatform.exe (PID: 8136)
      • XLLiveUD.exe (PID: 6012)
    • Drops a file that was compiled in debug mode

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • XLServicePlatform.exe (PID: 376)
      • XLWFPSetup.exe (PID: 2540)
      • ThunderBHOPlatform.exe (PID: 3760)
      • regsvr32.exe (PID: 4080)
      • xl_ext_chrome_setup.exe (PID: 2960)
      • regsvr32.exe (PID: 672)
      • regsvr32.exe (PID: 396)
      • regsvr32.exe (PID: 1180)
      • svchost.exe (PID: 2184)
      • APlayerCodecs3Embed.exe (PID: 2532)
      • XLLiveUD.exe (PID: 3016)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • dgservice.exe (PID: 5680)
      • ludashisetup04.exe (PID: 5872)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • XLServicePlatform.exe (PID: 8136)
      • XLLiveUD.exe (PID: 6012)
    • Uses NETSH.EXE for network configuration

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • ThunderInstallHelper.exe (PID: 2320)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
    • Reads CPU info

      • DownloadSDKServer.exe (PID: 2896)
      • DownloadSDKServer.exe (PID: 2076)
      • DownloadSDKServer.exe (PID: 2444)
      • DownloadSDKServer.exe (PID: 5120)
    • Low-level read access rights to disk partition

      • DownloadSDKServer.exe (PID: 2896)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • DownloadSDKServer.exe (PID: 2076)
      • XLServicePlatform.exe (PID: 376)
      • BHOInstall.exe (PID: 3748)
      • svchost.exe (PID: 2184)
      • InstallXLWFP.exe (PID: 2524)
      • InstallXLWFP.exe (PID: 3024)
      • InstallXLGuard.exe (PID: 3536)
      • InstallXLGuard.exe (PID: 1456)
      • Thunder.exe (PID: 272)
      • Thunder.exe (PID: 2352)
      • Thunder.exe (PID: 3648)
      • XLLiveUD.exe (PID: 3016)
      • Thunder.exe (PID: 1836)
      • Thunder.exe (PID: 3160)
      • Thunder.exe (PID: 2652)
      • DownloadSDKServer.exe (PID: 2444)
      • XLLiveUD.exe (PID: 3976)
      • Thunder.exe (PID: 5008)
      • Thunder.exe (PID: 5512)
      • Thunder.exe (PID: 4776)
      • ludashisetup04.exe (PID: 5872)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • Thunder.exe (PID: 4464)
      • DownloadSDKServer.exe (PID: 5120)
      • LdsHelper.exe (PID: 4960)
      • ComputerZTray.exe (PID: 5784)
      • ComputerZService.exe (PID: 7332)
      • NavPlugin.exe (PID: 5924)
      • XLServicePlatform.exe (PID: 8100)
      • XLServicePlatform.exe (PID: 8136)
      • svchost.exe (PID: 7532)
      • XLLiveUD.exe (PID: 6012)
      • Thunder.exe (PID: 3472)
    • Executable content was dropped or overwritten

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • XLServicePlatform.exe (PID: 376)
      • XLWFPSetup.exe (PID: 2540)
      • ThunderBHOPlatform.exe (PID: 3760)
      • DownloadSDKServer.exe (PID: 2076)
      • xl_ext_chrome_setup.exe (PID: 2960)
      • regsvr32.exe (PID: 672)
      • regsvr32.exe (PID: 4080)
      • regsvr32.exe (PID: 396)
      • regsvr32.exe (PID: 1180)
      • svchost.exe (PID: 2184)
      • APlayerCodecs3Embed.exe (PID: 2532)
      • XLLiveUD.exe (PID: 3016)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • dgservice.exe (PID: 5680)
      • ludashisetup04.exe (PID: 5872)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • XLServicePlatform.exe (PID: 8136)
      • XLLiveUD.exe (PID: 6012)
    • Creates a directory in Program Files

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • xl_ext_chrome_setup.exe (PID: 2960)
      • ThunderBHOPlatform.exe (PID: 3760)
      • regsvr32.exe (PID: 4080)
      • XLWFPSetup.exe (PID: 2540)
      • Thunder.exe (PID: 2352)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • xlbrowsershell.exe (PID: 3336)
      • dgservice.exe (PID: 5680)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • ludashisetup04.exe (PID: 5872)
      • ComputerZService.exe (PID: 7332)
    • Creates files in the program directory

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XLServicePlatform.exe (PID: 376)
      • xl_ext_chrome_setup.exe (PID: 2960)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • ThunderBHOPlatform.exe (PID: 3760)
      • XLWFPSetup.exe (PID: 2540)
      • regsvr32.exe (PID: 4080)
      • regsvr32.exe (PID: 672)
      • regsvr32.exe (PID: 396)
      • regsvr32.exe (PID: 1180)
      • svchost.exe (PID: 2184)
      • Thunder.exe (PID: 2352)
      • Thunder.exe (PID: 272)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • xlbrowsershell.exe (PID: 3336)
      • dgservice.exe (PID: 5680)
      • drivergenius.exe (PID: 2404)
      • dgprotect.exe (PID: 4968)
      • ludashisetup04.exe (PID: 5872)
      • drivergenius.exe (PID: 4764)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • ComputerZService.exe (PID: 7332)
      • XLServicePlatform.exe (PID: 8136)
    • Creates a software uninstall entry

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • ludashisetup04.exe (PID: 5872)
    • Creates files in the user directory

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • explorer.exe (PID: 568)
      • Thunder.exe (PID: 272)
      • dgservice.exe (PID: 5680)
      • drivergenius.exe (PID: 2404)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • ludashisetup04.exe (PID: 5872)
      • drivergenius.exe (PID: 4764)
      • ComputerZTray.exe (PID: 5784)
      • NavPlugin.exe (PID: 5924)
    • Drops a file with a compile date too recent

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • ludashisetup04.exe (PID: 5872)
    • Changes default file association

      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • regsvr32.exe (PID: 1180)
      • Thunder.exe (PID: 2352)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 672)
      • regsvr32.exe (PID: 2840)
      • regsvr32.exe (PID: 4080)
      • regsvr32.exe (PID: 396)
      • regsvr32.exe (PID: 1180)
      • APlayerCodecs3Embed.exe (PID: 2532)
      • dgprotect.exe (PID: 4968)
      • regsvr32.exe (PID: 4672)
    • Creates files in the Windows directory

      • XLWFPSetup.exe (PID: 2540)
      • svchost.exe (PID: 2184)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • dgservice.exe (PID: 5680)
      • svchost.exe (PID: 872)
      • svchost.exe (PID: 7532)
    • Creates files in the driver directory

      • XLWFPSetup.exe (PID: 2540)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • dgservice.exe (PID: 5680)
    • Removes files from Windows directory

      • svchost.exe (PID: 2184)
      • dgservice.exe (PID: 5680)
      • svchost.exe (PID: 7532)
    • Adds / modifies Windows certificates

      • svchost.exe (PID: 2184)
      • Thunder.exe (PID: 272)
      • ludashisetup04.exe (PID: 5872)
      • xlbrowsershell.exe (PID: 3336)
      • ComputerZTray.exe (PID: 5784)
    • Application launched itself

      • Thunder.exe (PID: 272)
      • Thunder.exe (PID: 2352)
      • xlbrowsershell.exe (PID: 3336)
      • dgservice.exe (PID: 5680)
    • Starts itself from another location

      • XLLiveUD.exe (PID: 3016)
      • XLLiveUD.exe (PID: 6012)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • DG_SETUP_6020_20201228.exe (PID: 2596)
    • Executed as Windows Service

      • dgservice.exe (PID: 5680)
    • Creates or modifies windows services

      • dgservice.exe (PID: 5680)
      • ludashisetup04.exe (PID: 5872)
      • ComputerZTray.exe (PID: 5784)
    • Changes the started page of IE

      • dgservice.exe (PID: 5680)
    • Searches for installed software

      • ComputerZTray.exe (PID: 5784)
    • Executed via COM

      • unsecapp.exe (PID: 6620)
  • INFO

    • Manual execution by user

      • taskmgr.exe (PID: 3948)
    • Dropped object may contain Bitcoin addresses

      • XunLeiWebSetup10.1.38.890.exe (PID: 3900)
      • XunLeiSetup10.1.38.890.exe (PID: 2136)
      • XLLiveUD.exe (PID: 3016)
      • DG_SETUP_6020_20201228.exe (PID: 2596)
      • ludashisetup04.exe (PID: 5872)
      • XMPSetup6.1.2.650xmpkb.exe (PID: 2280)
      • XLLiveUD.exe (PID: 6012)
    • Reads settings of System Certificates

      • svchost.exe (PID: 2184)
      • Thunder.exe (PID: 272)
      • ludashisetup04.exe (PID: 5872)
      • xlbrowsershell.exe (PID: 3336)
      • chrome.exe (PID: 4204)
      • ComputerZTray.exe (PID: 5784)
      • explorer.exe (PID: 568)
    • Reads the hosts file

      • Thunder.exe (PID: 272)
      • xlbrowsershell.exe (PID: 3336)
      • XLLiveUD.exe (PID: 3976)
      • chrome.exe (PID: 2432)
      • chrome.exe (PID: 5072)
      • chrome.exe (PID: 4204)
    • Application launched itself

      • chrome.exe (PID: 2432)
      • chrome.exe (PID: 5072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:09:10 10:03:53+02:00
PEType: PE32
LinkerVersion: 14
CodeSize: 141824
InitializedDataSize: 4776448
UninitializedDataSize: -
EntryPoint: 0x100da
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 10.1.38.890
ProductVersionNumber: 10.1.38.890
FileFlagsMask: 0x003f
FileFlags: Special build
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: ShenZhen Xunlei Networking Technologies,LTD
FileDescription: XunLeiWebSetup10.1.38.890xl
FileVersion: 10.1.38.890
InternalName: XunLeiWebSetup10.1.38.890xl 2
LegalCopyright: Copyright (c) 2003-2020 Xunlei Networking Technologies,LTD
LegalTrademarks: Xunlei
OriginalFileName: XunLeiWebSetup10.1.38.890xl
ProductName: Thunder
ProductVersion: 10.1.38.890
SpecialBuild: 100001

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 10-Sep-2020 08:03:53
Detected languages:
  • Chinese - PRC
  • English - United States
Debug artifacts:
  • D:\thunderx_bin\trunk\build\setup\pdb\Release\OnlineInstall.pdb
CompanyName: 深圳市迅雷网络技术有限公司
FileDescription: 安装迅雷X 开始极速下载!
FileVersion: 10.1.38.890
InternalName: XunLeiWebSetup10.1.38.890xl
LegalCopyright: 版权所有 (C) 2020 深圳市迅雷网络技术有限公司
LegalTrademarks: 迅雷X
OriginalFilename: XunLeiWebSetup10.1.38.890xl
ProductName: 迅雷X
ProductVersion: 10.1.38.890
SpecialBuild: 100001

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 7
Time date stamp: 10-Sep-2020 08:03:53
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00022941
0x00022A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.51207
.rdata
0x00024000
0x00009588
0x00009600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.01906
.data
0x0002E000
0x000038C0
0x00000C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.01856
.gfids
0x00032000
0x00000128
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
2.34458
.tls
0x00033000
0x00000009
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.0203931
.rsrc
0x00034000
0x0048205C
0x00482200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.97756
.reloc
0x004B7000
0x0000184C
0x00001A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.46637

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.18951
2247
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.0671
67624
Latin 1 / Western European
Chinese - PRC
RT_ICON
3
4.14584
38056
Latin 1 / Western European
Chinese - PRC
RT_ICON
4
4.18886
16936
Latin 1 / Western European
Chinese - PRC
RT_ICON
5
4.28795
9640
Latin 1 / Western European
Chinese - PRC
RT_ICON
6
4.28685
6760
Latin 1 / Western European
Chinese - PRC
RT_ICON
7
2.1901
84
Latin 1 / Western European
Chinese - PRC
RT_STRING
8
4.32682
2440
Latin 1 / Western European
Chinese - PRC
RT_ICON
9
4.12246
1128
Latin 1 / Western European
Chinese - PRC
RT_ICON
106
1.79879
16
Latin 1 / Western European
Chinese - PRC
RT_ACCELERATOR

Imports

ADVAPI32.dll
KERNEL32.dll
OLEAUT32.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
208
Monitored processes
134
Malicious processes
48
Suspicious processes
15

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start xunleiwebsetup10.1.38.890.exe netsh.exe no specs downloadsdkserver.exe taskmgr.exe no specs xunleisetup10.1.38.890.exe netsh.exe no specs netsh.exe no specs downloadsdkserver.exe xlserviceplatform.exe xlwfpsetup.exe xl_ext_chrome_setup.exe win7appid.exe no specs win7appid.exe no specs win7appid.exe no specs bhoinstall.exe thunderbhoplatform.exe regsvr32.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe installxlwfp.exe no specs svchost.exe regsvr32.exe netsh.exe no specs installxlwfp.exe regsvr32.exe netsh.exe no specs regsvr32.exe aplayercodecs3embed.exe netsh.exe no specs installxlguard.exe no specs installxlguard.exe netsh.exe no specs searchprotocolhost.exe no specs netsh.exe no specs netsh.exe no specs thunderinstallhelper.exe no specs netsh.exe no specs netsh.exe no specs thunder.exe explorer.exe svchost.exe netsh.exe no specs thunder.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs dg_setup_6020_20201228.exe thunder.exe xlliveud.exe downloadsdkserver.exe thunder.exe netsh.exe no specs thunder.exe thunder.exe thunder.exe xlliveud.exe xlbrowsershell.exe thunder.exe thunder.exe no specs xlbrowsershell.exe no specs thunder.exe no specs dgservice.exe ludashisetup04.exe dgservice.exe dgservice.exe xmpsetup6.1.2.650xmpkb.exe drivergenius.exe dgutil.exe thunder.exe no specs dgservice.exe no specs netsh.exe no specs dgprotect.exe ping.exe no specs netsh.exe no specs drvinst32.exe downloadsdkserver.exe ping.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs ldshelper.exe chrome.exe no specs computerztray.exe chrome.exe no specs chrome.exe no specs drivergenius.exe drivergenius.exe chrome.exe no specs netsh.exe no specs computerzservice.exe xlserviceplatform.exe no specs xlserviceplatform.exe rundll.exe no specs rundll.exe no specs rundll.exe no specs unsecapp.exe no specs regsvr32.exe no specs navplugin.exe chrome.exe no specs xlserviceplatform.exe win7appid.exe no specs win7appid.exe no specs win7appid.exe no specs chrome.exe no specs svchost.exe win7appid.exe no specs win7appid.exe no specs xlliveud.exe win7appid.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs thunder.exe no specs chrome.exe no specs xlliveud.exe no specs chrome.exe no specs chrome.exe no specs xunleiwebsetup10.1.38.890.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
272"C:\Program Files\Thunder Network\Thunder\Program\Thunder.exe" -StartType:InstallC:\Program Files\Thunder Network\Thunder\Program\Thunder.exe
XunLeiWebSetup10.1.38.890.exe
User:
admin
Company:
深圳市迅雷网络技术有限公司
Integrity Level:
HIGH
Description:
迅雷X
Exit code:
0
Version:
10,1,38,890
Modules
Images
c:\program files\thunder network\thunder\program\thunder.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
376"C:\Program Files\Thunder Network\Thunder\Program\XLServicePlatform.exe" -iC:\Program Files\Thunder Network\Thunder\Program\XLServicePlatform.exe
XunLeiSetup10.1.38.890.exe
User:
admin
Integrity Level:
HIGH
Description:
InstallX 应用程序
Exit code:
0
Version:
2, 0, 0, 5
Modules
Images
c:\program files\thunder network\thunder\program\xlserviceplatform.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
396regsvr32 /s "C:\Program Files\Thunder Network\Thunder\BHO\ShlExt.dll"C:\Windows\system32\regsvr32.exe
XunLeiSetup10.1.38.890.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
568C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
588"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="DownloadSDKServer" dir=in action=allow program="C:\Program Files\Thunder Network\Thunder\Program\resources\bin\SDK\DownloadSDKServer.exe" C:\Windows\system32\netsh.exeXunLeiSetup10.1.38.890.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
672regsvr32 /s "C:\Program Files\Thunder Network\Thunder\BHO\ThunderAgent.dll"C:\Windows\system32\regsvr32.exe
XunLeiSetup10.1.38.890.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
872C:\Windows\system32\svchost.exe -k netsvcsC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1180regsvr32 /s "C:\Program Files\Thunder Network\Thunder\BHO\ThunderMyComputerIcon.dll"C:\Windows\system32\regsvr32.exe
XunLeiSetup10.1.38.890.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1300"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1084,8851116486075808745,1753509976705299296,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=11524956368277329378 --mojo-platform-channel-handle=1600 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1456"C:\Program Files\Thunder Network\Thunder\Program\InstallXLGuard.exe" -iC:\Program Files\Thunder Network\Thunder\Program\InstallXLGuard.exe
XLWFPSetup.exe
User:
admin
Company:
深圳市迅雷网络技术有限公司
Integrity Level:
HIGH
Description:
XLGUARD驱动安装程序
Exit code:
0
Version:
1, 0, 0, 3
Modules
Images
c:\program files\thunder network\thunder\program\installxlguard.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcp90.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
Total events
21 682
Read events
16 216
Write events
5 421
Delete events
45

Modification events

(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
Operation:writeName:C:\Users\admin\AppData\Local\Temp\XunLeiWebSetup10.1.38.890.exe
Value:
1
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3900) XunLeiWebSetup10.1.38.890.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(568) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:P:\Hfref\nqzva\NccQngn\Ybpny\Grzc\KhaYrvJroFrghc10.1.38.890.rkr
Value:
00000000000000000100000000000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000
(PID) Process:(568) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
Executable files
1 166
Suspicious files
439
Text files
3 208
Unknown types
160

Dropped files

PID
Process
Filename
Type
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\check@250.pngimage
MD5:
SHA256:
872svchost.exeC:\Windows\appcompat\programs\RecentFileCache.bcftxt
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource.7zcompressed
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\confirm_btn@250.pngimage
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\cancel_btn@250.pngimage
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\close_btn@250.pngimage
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\install_bkg.pngimage
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\install_static_bkg3@250.pngimage
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\download_btn@250.pngimage
MD5:
SHA256:
3900XunLeiWebSetup10.1.38.890.exeC:\Users\admin\AppData\Local\Temp\OnlineInstall\10.1.38.890\OnlineResource\resource\install_static_bkg2@250.pngimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
547
TCP/UDP connections
674
DNS requests
348
Threats
69

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2896
DownloadSDKServer.exe
GET
183.136.197.99:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
suspicious
2896
DownloadSDKServer.exe
GET
115.231.155.240:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
suspicious
2896
DownloadSDKServer.exe
GET
183.136.197.99:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
suspicious
2896
DownloadSDKServer.exe
GET
115.231.155.240:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
suspicious
2896
DownloadSDKServer.exe
GET
115.231.155.240:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
suspicious
2896
DownloadSDKServer.exe
GET
115.231.155.247:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
suspicious
3900
XunLeiWebSetup10.1.38.890.exe
GET
200
61.130.28.116:80
http://static-xl9-ssl.xunlei.com/json/thunderx_bind_config_xl.json
CN
text
3.47 Kb
suspicious
2896
DownloadSDKServer.exe
GET
206
183.136.197.99:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
binary
1.00 Mb
suspicious
2896
DownloadSDKServer.exe
POST
120.79.103.155:80
http://dlcfg.client.v6.chub.sandai.net/query
CN
unknown
2896
DownloadSDKServer.exe
GET
206
183.136.197.99:80
http://down.sandai.net/thunderx/XunLeiSetup10.1.38.890.exe
CN
binary
1.00 Mb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5.13.69.91:57461
RCS & RDS
RO
unknown
3900
XunLeiWebSetup10.1.38.890.exe
47.101.179.215:8099
stat.download.xunlei.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
malicious
3900
XunLeiWebSetup10.1.38.890.exe
61.130.28.116:80
static-xl9-ssl.xunlei.com
No.31,Jin-rong Street
CN
suspicious
2896
DownloadSDKServer.exe
47.92.100.53:8000
hub5pnc.sandai.net
Hangzhou Alibaba Advertising Co.,Ltd.
CN
malicious
2896
DownloadSDKServer.exe
112.64.218.60:80
dconf.xcloud.sandai.net
China Unicom Shanghai network
CN
unknown
111.206.4.176:8000
hub5pn.wap.sandai.net
China Unicom Beijing Province Network
CN
unknown
2896
DownloadSDKServer.exe
140.206.220.105:80
pc.grpc.xnet.sandai.net
China Unicom Shanghai network
CN
unknown
2896
DownloadSDKServer.exe
212.129.33.59:6881
dht.transmissionbt.com
Online S.a.s.
FR
suspicious
82.221.103.244:6881
router.utorrent.com
Thor Data Center ehf
IS
suspicious
67.215.246.10:6881
router.bittorrent.com
QuadraNet, Inc
US
suspicious

DNS requests

Domain
IP
Reputation
stat.download.xunlei.com
  • 47.101.179.215
malicious
static-xl9-ssl.xunlei.com
  • 61.130.28.116
  • 61.130.28.113
  • 61.130.28.120
  • 61.130.28.119
  • 61.130.28.115
  • 61.130.28.118
  • 61.130.28.114
  • 61.130.28.117
  • 115.220.8.229
  • 115.220.8.230
  • 115.220.8.228
  • 115.220.8.231
  • 115.220.8.224
  • 115.220.8.226
  • 115.220.8.225
  • 115.220.8.227
suspicious
dconf.xcloud.sandai.net
  • 112.64.218.60
unknown
hub5pnc.sandai.net
  • 47.92.100.53
  • 47.92.99.221
malicious
hub5pn.wap.sandai.net
  • 111.206.4.176
  • 111.206.4.164
  • 153.3.232.174
  • 157.255.225.53
  • 153.3.232.175
  • 118.212.146.21
  • 58.144.251.1
  • 118.212.146.20
  • 157.255.225.49
  • 211.91.242.37
  • 211.91.242.38
  • 58.144.251.2
malicious
pc.grpc.xnet.sandai.net
  • 140.206.220.105
  • 140.206.225.167
unknown
gslb.xcloud.sandai.net
  • 140.206.225.144
  • 123.125.222.180
suspicious
hubciddata.sandai.net
  • 106.14.169.88
malicious
g3.hub5pn.sandai.net
  • 111.206.4.195
  • 58.144.251.2
  • 123.6.27.16
  • 111.206.4.194
  • 123.6.27.49
  • 123.6.27.68
  • 58.144.251.1
  • 111.206.4.182
  • 157.255.225.55
  • 111.206.4.177
unknown
pctest.v6.shub.sandai.net
unknown

Threats

PID
Process
Class
Message
2896
DownloadSDKServer.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
2896
DownloadSDKServer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2896
DownloadSDKServer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2896
DownloadSDKServer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2896
DownloadSDKServer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2076
DownloadSDKServer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3748
BHOInstall.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (HTTP Downloader)
3748
BHOInstall.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (HTTP Downloader)
2184
svchost.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .dll file with no User-Agent
2184
svchost.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
14 ETPRO signatures available at the full report
Process
Message
XunLeiSetup10.1.38.890.exe
..
XunLeiSetup10.1.38.890.exe
..
regsvr32.exe
[2840:3628] [15:03 02] Debug <np_tdieplat.dll> [osshell.cpp:270 Xunlei::Platform::OSShell::GetAppDatalowPath] using SHGetKnownFolderPath with FOLDERID_LocalAppDataLow
regsvr32.exe
[2840:3628] [15:03 03] Message <np_tdieplat.dll> [osshell.cpp:39 Xunlei::Platform::OSShell::InstallRuntime] Initializing running environment ...
regsvr32.exe
[2840:3628] [15:03 03] Debug <np_tdieplat.dll> [osshell.cpp:49 Xunlei::Platform::OSShell::InstallRuntime] Current environment directories C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\
regsvr32.exe
[2840:3628] [15:03 03] Debug <np_tdieplat.dll> [osshell.cpp:56 Xunlei::Platform::OSShell::InstallRuntime] Adding local module directory C:\Program Files\Thunder Network\Thunder\Thunder BHO Platform to work environment
regsvr32.exe
[2840:3628] [15:03 03] Debug <np_tdieplat.dll> [osshell.cpp:103 Xunlei::Platform::OSShell::InstallRuntime] --------------- Current Environment --------------
regsvr32.exe
[2840:3628] [15:03 03] Debug <np_tdieplat.dll> [osshell.cpp:103 Xunlei::Platform::OSShell::InstallRuntime] --------------- Current Environment --------------
regsvr32.exe
[2840:3628] [15:03 03] Debug <np_tdieplat.dll> [osshell.cpp:270 Xunlei::Platform::OSShell::GetAppDatalowPath] using SHGetKnownFolderPath with FOLDERID_LocalAppDataLow
regsvr32.exe
[2840:3628] [15:03 03] Debug <np_tdieplat.dll> [osshell.cpp:106 Xunlei::Platform::OSShell::InstallRuntime] GetModulePath : C:\Program Files\Thunder Network\Thunder\Thunder BHO Platform\np_tdieplat.dll