| URL: | http://25689.xc.mieseng.com/xiaz/WindowsServer2008R2@674_4909.exe |
| Full analysis: | https://app.any.run/tasks/d811fa61-1f7c-45e4-be3e-e62a2bd20497 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | December 06, 2018, 01:50:21 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | F46930852E3CC70EE8F88F6E3820B74F |
| SHA1: | D5F419D3B6B4E7C2A364BF915205823B2552C31E |
| SHA256: | 17A0FE0E839374123875F3B2D185D14FBD855C998E021A834518FACBC51A71AC |
| SSDEEP: | 3:N1K1dd3dtM2pMAS2E/dnP4An:CXd3IAMASHVP4An |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 252 | "C:\Program Files\IQIYI Video\LStyle\6.6.76.6256\QiyiService.exe" -i | C:\Program Files\IQIYI Video\LStyle\6.6.76.6256\QiyiService.exe | — | IQIYIsetup_baizhu@kb014.exe | |||||||||||
User: admin Company: BEIJING QIYI CENTURY SCIENCE&TECHNOLOGY CO.,LTD. Integrity Level: HIGH Description: 爱奇艺视频平台服务 Exit code: 1 Version: 6.5.6.557 Modules
| |||||||||||||||
| 556 | "C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe" --do-shortcut=0_0_1 --set-homepage-overwrite --silent-install=3_1_1 --have-user-data-dir=true | C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe | explorer.exe | ||||||||||||
User: admin Company: 360.cn Integrity Level: MEDIUM Description: 360安全浏览器 Exit code: 15 Version: 9.1.0.326 Modules
| |||||||||||||||
| 1356 | "C:\Users\admin\AppData\Roaming\AlphaSE\AlphaUpdateCheck.exe" AlphaChecker | C:\Users\admin\AppData\Roaming\AlphaSE\AlphaUpdateCheck.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Chrome安全浏览器升级模块 Exit code: 0 Version: 1, 0, 0, 2001 Modules
| |||||||||||||||
| 1664 | C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5} | C:\Windows\system32\DllHost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1740 | "C:\Users\admin\AppData\Roaming\AlphaSE\AlphaseMiniStart.exe" | C:\Users\admin\AppData\Roaming\AlphaSE\AlphaseMiniStart.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1832 | "C:\Program Files\IQIYI Video\LStyle\6.6.76.6256\QiyiDACL.exe" QiyiUpdate "C:\Program Files\Common Files\IQIYI Video" true | C:\Program Files\IQIYI Video\LStyle\6.6.76.6256\QiyiDACL.exe | — | IQIYIsetup_baizhu@kb014.exe | |||||||||||
User: admin Company: 爱奇艺 Integrity Level: HIGH Description: 爱奇艺组件 Exit code: 0 Version: 2.0.0.1 Modules
| |||||||||||||||
| 1996 | C:\Program Files\IQIYI Video\LStyle\6.6.76.6256\QyFragment.exe PipeName=list::QyClient.exe::::list::QyFragment.exe::::,ProductNameInner=list | C:\Program Files\IQIYI Video\LStyle\6.6.76.6256\QyFragment.exe | QyClient.exe | ||||||||||||
User: admin Company: 爱奇艺 Integrity Level: MEDIUM Description: 爱奇艺视频辅助程序 Exit code: 0 Version: 6.6.76.6256 Modules
| |||||||||||||||
| 2028 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2064 | C:\Users\admin\AppData\Local\Temp\gzss\ASE@8717.exe /s | C:\Users\admin\AppData\Local\Temp\gzss\ASE@8717.exe | WindowsServer2008R2@674_4909[1].exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Chrome安全浏览器 Exit code: 0 Version: 1, 0, 0, 1 Modules
| |||||||||||||||
| 2096 | "C:\Users\admin\AppData\Roaming\alphase\AlphaseX.exe" | C:\Users\admin\AppData\Roaming\alphase\AlphaseX.exe | AlphaUpdateCheck.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {53560D79-F8F9-11E8-91D7-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 3 | |||
| (PID) Process: | (2920) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E2070C00040006000100320025008602 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2920 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 2920 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 2920 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF74BC9E095A8E53E2.TMP | — | |
MD5:— | SHA256:— | |||
| 2920 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF9AFD64881A83CCF5.TMP | — | |
MD5:— | SHA256:— | |||
| 2920 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{53560D79-F8F9-11E8-91D7-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
| 3024 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.log | text | |
MD5:— | SHA256:— | |||
| 3400 | WindowsServer2008R2@674_4909[1].exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\z_stat[1].php | text | |
MD5:— | SHA256:— | |||
| 3400 | WindowsServer2008R2@674_4909[1].exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@pieshua[1].txt | text | |
MD5:— | SHA256:— | |||
| 3024 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\WindowsServer2008R2@674_4909[1].exe | executable | |
MD5:— | SHA256:— | |||
| 2920 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\WindowsServer2008R2@674_4909[1].exe | executable | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3400 | WindowsServer2008R2@674_4909[1].exe | GET | — | 180.95.171.107:80 | http://c.pieshua.com/youxi/index_674_2.htm | CN | — | — | malicious |
3072 | LDSGameMasterInstRoad_211601.exe | GET | — | 104.192.108.21:80 | http://dl.ludashi.com/gamemaster/buychannelFull.exe | US | — | — | whitelisted |
3072 | LDSGameMasterInstRoad_211601.exe | GET | — | 104.192.108.21:80 | http://dl.ludashi.com/gamemaster/buychannelFull.exe | US | — | — | whitelisted |
3024 | iexplore.exe | GET | 200 | 120.27.186.114:80 | http://25689.xc.mieseng.com/xiaz/WindowsServer2008R2@674_4909.exe | CN | executable | 1.28 Mb | suspicious |
3400 | WindowsServer2008R2@674_4909[1].exe | POST | 200 | 47.107.217.237:80 | http://q.pieshua.com/qy/gi | CN | text | 29.6 Kb | malicious |
3400 | WindowsServer2008R2@674_4909[1].exe | GET | 200 | 180.95.171.107:80 | http://c.pieshua.com/youxi/index_674_1.htm | CN | html | 363 b | malicious |
3400 | WindowsServer2008R2@674_4909[1].exe | POST | 200 | 47.107.217.237:80 | http://q.pieshua.com/qy/gl | CN | text | 27.6 Kb | malicious |
3400 | WindowsServer2008R2@674_4909[1].exe | GET | 200 | 180.95.171.107:80 | http://c.pieshua.com/logo/logo-jua.zip | CN | compressed | 613 Kb | malicious |
3400 | WindowsServer2008R2@674_4909[1].exe | GET | 200 | 180.95.171.107:80 | http://c.pieshua.com/skin/skin_18091401.zip | CN | compressed | 256 Kb | malicious |
3400 | WindowsServer2008R2@674_4909[1].exe | GET | 200 | 124.172.114.250:80 | http://s95.cnzz.com/z_stat.php?id=1257656622&web_id=1257656622 | CN | text | 11.4 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3400 | WindowsServer2008R2@674_4909[1].exe | 59.46.4.208:443 | s19.cnzz.com | No.31,Jin-rong Street | CN | unknown |
3400 | WindowsServer2008R2@674_4909[1].exe | 203.119.128.195:443 | z8.cnzz.com | — | CN | malicious |
2920 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3024 | iexplore.exe | 120.27.186.114:80 | 25689.xc.mieseng.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | suspicious |
3400 | WindowsServer2008R2@674_4909[1].exe | 47.107.217.237:80 | q.pieshua.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | suspicious |
3400 | WindowsServer2008R2@674_4909[1].exe | 180.95.171.107:80 | c.pieshua.com | CHINA UNICOM China169 Backbone | CN | unknown |
3400 | WindowsServer2008R2@674_4909[1].exe | 124.172.114.250:80 | s95.cnzz.com | China Unicom Guangzhou network | CN | unknown |
3400 | WindowsServer2008R2@674_4909[1].exe | 116.207.118.89:443 | s22.cnzz.com | No.31,Jin-rong Street | CN | unknown |
3400 | WindowsServer2008R2@674_4909[1].exe | 116.207.118.90:443 | s22.cnzz.com | No.31,Jin-rong Street | CN | unknown |
3400 | WindowsServer2008R2@674_4909[1].exe | 104.192.108.21:80 | dl.ludashi.com | Beijing Qihu Technology Company Limited | US | malicious |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
25689.xc.mieseng.com |
| suspicious |
q.pieshua.com |
| malicious |
c.pieshua.com |
| malicious |
s95.cnzz.com |
| whitelisted |
s22.cnzz.com |
| suspicious |
c.cnzz.com |
| whitelisted |
z1.cnzz.com |
| whitelisted |
cnzz.mmstat.com |
| whitelisted |
z4.cnzz.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3024 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3024 | iexplore.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3400 | WindowsServer2008R2@674_4909[1].exe | Misc activity | ADWARE [PTsecurity] PUA:Win32/XingSof |
3400 | WindowsServer2008R2@674_4909[1].exe | Misc activity | ADWARE [PTsecurity] PUA:Win32/XingSof |
3400 | WindowsServer2008R2@674_4909[1].exe | A Network Trojan was detected | SC ADWARE not-a-virus:Downloader.Win32.Agent / Win32/Adware.Qjwmonkey |
3400 | WindowsServer2008R2@674_4909[1].exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3400 | WindowsServer2008R2@674_4909[1].exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3072 | LDSGameMasterInstRoad_211601.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3400 | WindowsServer2008R2@674_4909[1].exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3400 | WindowsServer2008R2@674_4909[1].exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
WindowsServer2008R2@674_4909[1].exe | [0] |
WindowsServer2008R2@674_4909[1].exe | [1] |
WindowsServer2008R2@674_4909[1].exe | [2] |
WindowsServer2008R2@674_4909[1].exe | [4] |
WindowsServer2008R2@674_4909[1].exe | [4] |
WindowsServer2008R2@674_4909[1].exe | [5] |
FunInstaller_PS_0107704.exe | Tried to RegisterCallback without an AtExitManager.
|
FunInstaller_PS_0107704.exe | Tried to RegisterCallback without an AtExitManager.
|
FunInstaller_PS_0107704.exe | Tried to RegisterCallback without an AtExitManager.
|
FunInstaller_PS_0107704.exe | Tried to RegisterCallback without an AtExitManager.
|