analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://25689.xc.mieseng.com/xiaz/WindowsServer2008R2@674_4909.exe

Full analysis: https://app.any.run/tasks/d811fa61-1f7c-45e4-be3e-e62a2bd20497
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 06, 2018, 01:50:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
adware
trojan
Indicators:
MD5:

F46930852E3CC70EE8F88F6E3820B74F

SHA1:

D5F419D3B6B4E7C2A364BF915205823B2552C31E

SHA256:

17A0FE0E839374123875F3B2D185D14FBD855C998E021A834518FACBC51A71AC

SSDEEP:

3:N1K1dd3dtM2pMAS2E/dnP4An:CXd3IAMASHVP4An

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • WindowsServer2008R2@674_4909[1].exe (PID: 2496)
      • LDSGameMasterInstRoad_211601.exe (PID: 3072)
      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
      • ldsgamemaster.exe (PID: 3544)
      • FunInstaller_PS_0107704.exe (PID: 2636)
      • SoftMgrInst.exe (PID: 2888)
      • mkshortcut.exe (PID: 2844)
      • QyUpdate.exe (PID: 3064)
      • QyFragment.exe (PID: 2868)
      • QyFragment.exe (PID: 1996)
      • QyFragment.exe (PID: 2572)
      • QiyiService.exe (PID: 3976)
      • QyFragment.exe (PID: 2372)
      • QyFragment.exe (PID: 3916)
      • QiyiService.exe (PID: 252)
      • QiyiDACL.exe (PID: 1832)
      • QiyiDACL.exe (PID: 3920)
      • QyClient.exe (PID: 3892)
      • QyFragment.exe (PID: 2224)
      • QyPlayer.exe (PID: 3604)
      • zoolsnBhBnHqD12.exe (PID: 2260)
      • 360se.exe (PID: 556)
      • QyKernel.exe (PID: 2424)
      • AlphaUpdateCheck.exe (PID: 1356)
      • AlphaseMiniStart.exe (PID: 1740)
      • AlphaseX.exe (PID: 2096)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3024)
      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • cAgXkQhHpPfGoTmU.exe (PID: 3284)
    • Connects to CnC server

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • FunInstaller_PS_0107704.exe (PID: 2636)
    • Loads dropped or rewritten executable

      • LDSGameMasterInstRoad_211601.exe (PID: 3072)
      • ldsgamemaster.exe (PID: 3544)
      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
      • SoftMgrInst.exe (PID: 2888)
      • rundll32.exe (PID: 3884)
      • regsvr32.exe (PID: 3180)
      • FunInstaller_PS_0107704.exe (PID: 2636)
      • [email protected] (PID: 3052)
      • QiyiDACL.exe (PID: 3920)
      • cAgXkQhHpPfGoTmU.exe (PID: 3284)
      • QiyiService.exe (PID: 252)
      • QiyiDACL.exe (PID: 1832)
      • QiyiService.exe (PID: 3976)
      • QyFragment.exe (PID: 2868)
      • QyPlayer.exe (PID: 3604)
      • QyKernel.exe (PID: 2424)
      • QyClient.exe (PID: 3892)
      • QyFragment.exe (PID: 1996)
      • QyFragment.exe (PID: 2224)
      • QyFragment.exe (PID: 3916)
      • QyFragment.exe (PID: 2572)
      • QyFragment.exe (PID: 2372)
      • explorer.exe (PID: 2028)
      • QyUpdate.exe (PID: 3064)
      • DllHost.exe (PID: 1664)
      • [email protected] (PID: 2064)
      • DllHost.exe (PID: 3020)
      • 360se.exe (PID: 556)
      • AlphaseMiniStart.exe (PID: 1740)
      • AlphaUpdateCheck.exe (PID: 1356)
      • DllHost.exe (PID: 2956)
      • AlphaseX.exe (PID: 2096)
      • rundll32.exe (PID: 2524)
    • Registers / Runs the DLL via REGSVR32.EXE

      • FunInstaller_PS_0107704.exe (PID: 2636)
    • Changes settings of System certificates

      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
    • Adds new firewall rule via NETSH.EXE

    • Changes the autorun value in the registry

  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • LDSGameMasterInstRoad_211601.exe (PID: 3072)
      • ldsgamemaster.exe (PID: 3544)
      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
      • cAgXkQhHpPfGoTmU.exe (PID: 3284)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2920)
      • iexplore.exe (PID: 3024)
      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • LDSGameMasterInstRoad_211601.exe (PID: 3072)
      • ldsgamemaster.exe (PID: 3544)
      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
      • FunInstaller_PS_0107704.exe (PID: 2636)
      • cAgXkQhHpPfGoTmU.exe (PID: 3284)
      • [email protected] (PID: 2064)
      • [email protected] (PID: 3052)
      • QyClient.exe (PID: 3892)
    • Starts Internet Explorer

      • explorer.exe (PID: 2028)
      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
    • Reads Internet Cache Settings

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • LDSGameMasterInstRoad_211601.exe (PID: 3072)
      • QyFragment.exe (PID: 3916)
    • Creates files in the program directory

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • ldsgamemaster.exe (PID: 3544)
      • QyFragment.exe (PID: 2868)
      • QyClient.exe (PID: 3892)
      • QyKernel.exe (PID: 2424)
      • [email protected] (PID: 3052)
    • Reads internet explorer settings

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
    • Creates files in the user directory

      • WindowsServer2008R2@674_4909[1].exe (PID: 3400)
      • SoftMgrInst.exe (PID: 2888)
      • FunInstaller_PS_0107704.exe (PID: 2636)
      • [email protected] (PID: 3052)
      • [email protected] (PID: 2064)
      • QyFragment.exe (PID: 2868)
      • QyPlayer.exe (PID: 3604)
      • QyFragment.exe (PID: 2572)
      • QyFragment.exe (PID: 1996)
      • QyFragment.exe (PID: 2372)
      • QyClient.exe (PID: 3892)
      • QyFragment.exe (PID: 2224)
      • 360se.exe (PID: 556)
      • cAgXkQhHpPfGoTmU.exe (PID: 3284)
    • Changes tracing settings of the file or console

      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
    • Uses RUNDLL32.EXE to load library

      • FunInstaller_PS_0107704.exe (PID: 2636)
      • QyClient.exe (PID: 3892)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 3180)
    • Creates or modifies windows services

      • rundll32.exe (PID: 3884)
    • Adds / modifies Windows certificates

      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
    • Connects to unusual port

      • SoftMgrInst.exe (PID: 2888)
    • Creates files in the Windows directory

    • Reads Environment values

    • Uses NETSH.EXE for network configuration

    • Changes IE settings (feature browser emulation)

    • Modifies the open verb of a shell class

    • Creates a software uninstall entry

    • Reads the cookies of Google Chrome

      • QyClient.exe (PID: 3892)
    • Reads the cookies of Mozilla Firefox

      • QyClient.exe (PID: 3892)
    • Application launched itself

      • QyFragment.exe (PID: 2572)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3024)
      • iexplore.exe (PID: 2920)
      • iexplore.exe (PID: 2992)
      • iexplore.exe (PID: 2720)
    • Application launched itself

      • iexplore.exe (PID: 2920)
    • Changes internet zones settings

      • iexplore.exe (PID: 2920)
      • iexplore.exe (PID: 2720)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2992)
    • Creates files in the user directory

      • iexplore.exe (PID: 2992)
    • Dropped object may contain TOR URL's

      • Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe (PID: 2336)
      • cAgXkQhHpPfGoTmU.exe (PID: 3284)
    • Dropped object may contain Bitcoin addresses

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
94
Monitored processes
48
Malicious processes
28
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe windowsserver2008r2@674_4909[1].exe no specs windowsserver2008r2@674_4909[1].exe ldsgamemasterinstroad_211601.exe iexplore.exe iexplore.exe inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe ldsgamemaster.exe funinstaller_ps_0107704.exe softmgrinst.exe rundll32.exe no specs rundll32.exe no specs regsvr32.exe no specs rundll32.exe no specs [email protected] cagxkqhhppfgotmu.exe qiyidacl.exe no specs zoolsnbhbnhqd12.exe qiyidacl.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs qiyiservice.exe no specs qiyiservice.exe [email protected] mkshortcut.exe no specs qyfragment.exe qyclient.exe qykernel.exe qyplayer.exe qyfragment.exe no specs qyfragment.exe qyfragment.exe qyfragment.exe qyfragment.exe no specs qyupdate.exe explorer.exe Thumbnail Cache Out of Proc Server Thumbnail Cache Out of Proc Server 360se.exe alphaseministart.exe alphaupdatecheck.exe alphasex.exe Thumbnail Cache Out of Proc Server rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
2920"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3024"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2920 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2496"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\WindowsServer2008R2@674_4909[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\WindowsServer2008R2@674_4909[1].exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
智能下载器
Exit code:
3221226540
Version:
3.0.0.904
3400"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\WindowsServer2008R2@674_4909[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0UU90R59\WindowsServer2008R2@674_4909[1].exe
iexplore.exe
User:
admin
Integrity Level:
HIGH
Description:
智能下载器
Version:
3.0.0.904
3072C:\Users\admin\AppData\Local\Temp\gzss\LDSGameMasterInstRoad_211601.exeC:\Users\admin\AppData\Local\Temp\gzss\LDSGameMasterInstRoad_211601.exe
WindowsServer2008R2@674_4909[1].exe
User:
admin
Integrity Level:
HIGH
Description:
手机模拟大师
Exit code:
0
Version:
5, 2, 0, 1030
2720"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
WindowsServer2008R2@674_4909[1].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2992"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2720 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2336C:\Users\admin\AppData\Local\Temp\gzss\Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exeC:\Users\admin\AppData\Local\Temp\gzss\Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe
WindowsServer2008R2@674_4909[1].exe
User:
admin
Integrity Level:
HIGH
Description:
extensive
Exit code:
1
Version:
1, 0, 0, 1725
3544"C:\Users\admin\AppData\Local\Temp\ldsgamemaster.exe" /PID="211601" /S /FROM=instC:\Users\admin\AppData\Local\Temp\ldsgamemaster.exe
LDSGameMasterInstRoad_211601.exe
User:
admin
Integrity Level:
HIGH
Description:
手机模拟大师
Exit code:
0
Version:
4.4.2041.1895
2636C:\Users\admin\AppData\Local\Temp\gzss\FunInstaller_PS_0107704.exeC:\Users\admin\AppData\Local\Temp\gzss\FunInstaller_PS_0107704.exe
WindowsServer2008R2@674_4909[1].exe
User:
admin
Company:
北京风行在线技术有限公司
Integrity Level:
HIGH
Description:
风行视频加速器安装程序
Exit code:
0
Version:
1.0.5.71Beta
Total events
17 129
Read events
15 362
Write events
0
Delete events
0

Modification events

No data
Executable files
443
Suspicious files
303
Text files
4 714
Unknown types
60

Dropped files

PID
Process
Filename
Type
2920iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
MD5:
SHA256:
2920iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2920iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF74BC9E095A8E53E2.TMP
MD5:
SHA256:
2920iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF9AFD64881A83CCF5.TMP
MD5:
SHA256:
2920iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{53560D79-F8F9-11E8-91D7-5254004A04AF}.dat
MD5:
SHA256:
3024iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.logtext
MD5:5FAE9D11A079163F24C225FBFB1D2E36
SHA256:E41151B25CE9BBD2B6F9B71AA81F7C69EFCB249F91AEE0B6989CB7CBFDFBFF93
3400WindowsServer2008R2@674_4909[1].exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\z_stat[1].phptext
MD5:21B67A2D39CF91DDD0E401EC766C5531
SHA256:4609554C3D867F7B33F7EB31E8F8924FB3C94D3609E7E1CBED0466C679D4CBC2
3024iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012018120620181207\index.datdat
MD5:17F526BAE9CE77831201F8EFB522E370
SHA256:C96C664404C03B8A0DD9780343B55C6A5FF63702C97665A7578D61EE844F0589
3400WindowsServer2008R2@674_4909[1].exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@pieshua[1].txttext
MD5:2361D89FF66D3114CC7734FE464A937A
SHA256:27CAE90E6C5C05F48800B3E5DD767A4D84BCD5D2C4FD78018CC5B4D6E45F4EA8
2920iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018120620181207\index.datdat
MD5:3FB038EE2BFCB8BD60AAC31B8FF599B8
SHA256:FB82053BC949F61638D0BB7598DB9F8C40FD33F78990E18B280950DED1C69819
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
137
TCP/UDP connections
176
DNS requests
56
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3400
WindowsServer2008R2@674_4909[1].exe
GET
180.95.171.107:80
http://c.pieshua.com/youxi/index_674_2.htm
CN
malicious
3400
WindowsServer2008R2@674_4909[1].exe
POST
200
47.107.217.237:80
http://q.pieshua.com/qy/o
CN
malicious
3400
WindowsServer2008R2@674_4909[1].exe
GET
200
180.95.171.107:80
http://c.pieshua.com/youxi/index_674_3.htm
CN
html
363 b
malicious
3400
WindowsServer2008R2@674_4909[1].exe
GET
200
104.192.108.17:80
http://dl2.360safe.com/partner/Inst3__3112425__3f7372633d6c6d266c733d6e31343463316364383939__68616f2e3336302e636e__0c70.exe
US
executable
341 Kb
malicious
3072
LDSGameMasterInstRoad_211601.exe
GET
104.192.108.21:80
http://dl.ludashi.com/gamemaster/buychannelFull.exe
US
whitelisted
3400
WindowsServer2008R2@674_4909[1].exe
GET
200
180.95.171.107:80
http://c.pieshua.com/youxi/index_674_1.htm
CN
html
363 b
malicious
3024
iexplore.exe
GET
200
120.27.186.114:80
http://25689.xc.mieseng.com/xiaz/WindowsServer2008R2@674_4909.exe
CN
executable
1.28 Mb
suspicious
3400
WindowsServer2008R2@674_4909[1].exe
POST
200
47.107.217.237:80
http://q.pieshua.com/qy/gi
CN
text
29.6 Kb
malicious
3400
WindowsServer2008R2@674_4909[1].exe
GET
200
124.172.114.250:80
http://s95.cnzz.com/z_stat.php?id=1257656622&web_id=1257656622
CN
text
11.4 Kb
whitelisted
3400
WindowsServer2008R2@674_4909[1].exe
GET
200
180.95.171.107:80
http://c.pieshua.com/logo/logo-jua.zip
CN
compressed
613 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2920
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3400
WindowsServer2008R2@674_4909[1].exe
124.172.114.250:80
s95.cnzz.com
China Unicom Guangzhou network
CN
unknown
3400
WindowsServer2008R2@674_4909[1].exe
116.207.118.90:443
s22.cnzz.com
No.31,Jin-rong Street
CN
unknown
3400
WindowsServer2008R2@674_4909[1].exe
198.11.132.221:443
cnzz.mmstat.com
Alibaba (China) Technology Co., Ltd.
US
suspicious
3024
iexplore.exe
120.27.186.114:80
25689.xc.mieseng.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
suspicious
3400
WindowsServer2008R2@674_4909[1].exe
104.192.108.17:80
dl2.360safe.com
Beijing Qihu Technology Company Limited
US
malicious
3400
WindowsServer2008R2@674_4909[1].exe
203.119.129.114:443
z1.cnzz.com
CN
malicious
3400
WindowsServer2008R2@674_4909[1].exe
104.192.108.21:80
dl.ludashi.com
Beijing Qihu Technology Company Limited
US
malicious
3400
WindowsServer2008R2@674_4909[1].exe
59.46.4.208:443
s19.cnzz.com
No.31,Jin-rong Street
CN
unknown
3400
WindowsServer2008R2@674_4909[1].exe
203.119.206.93:443
z4.cnzz.com
CN
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
25689.xc.mieseng.com
  • 120.27.186.114
  • 114.55.188.114
  • 101.201.62.45
  • 139.224.39.0
suspicious
q.pieshua.com
  • 47.107.217.237
malicious
c.pieshua.com
  • 180.95.171.107
  • 180.95.171.108
  • 180.95.171.109
  • 180.95.171.55
  • 180.95.171.56
  • 180.95.171.57
  • 180.95.171.58
  • 180.95.171.106
malicious
s95.cnzz.com
  • 124.172.114.250
  • 124.172.114.249
whitelisted
s22.cnzz.com
  • 116.207.118.89
  • 116.207.118.90
suspicious
c.cnzz.com
  • 116.207.118.90
  • 116.207.118.89
whitelisted
z1.cnzz.com
  • 203.119.129.114
whitelisted
cnzz.mmstat.com
  • 198.11.132.221
whitelisted
z4.cnzz.com
  • 203.119.206.93
whitelisted

Threats

PID
Process
Class
Message
3024
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3024
iexplore.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3400
WindowsServer2008R2@674_4909[1].exe
Misc activity
ADWARE [PTsecurity] PUA:Win32/XingSof
3400
WindowsServer2008R2@674_4909[1].exe
Misc activity
ADWARE [PTsecurity] PUA:Win32/XingSof
3400
WindowsServer2008R2@674_4909[1].exe
A Network Trojan was detected
SC ADWARE not-a-virus:Downloader.Win32.Agent / Win32/Adware.Qjwmonkey
3400
WindowsServer2008R2@674_4909[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3400
WindowsServer2008R2@674_4909[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3072
LDSGameMasterInstRoad_211601.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3400
WindowsServer2008R2@674_4909[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3400
WindowsServer2008R2@674_4909[1].exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
9 ETPRO signatures available at the full report
Process
Message
WindowsServer2008R2@674_4909[1].exe
[0]
WindowsServer2008R2@674_4909[1].exe
[1]
WindowsServer2008R2@674_4909[1].exe
[2]
WindowsServer2008R2@674_4909[1].exe
[4]
WindowsServer2008R2@674_4909[1].exe
[4]
WindowsServer2008R2@674_4909[1].exe
[5]
FunInstaller_PS_0107704.exe
Tried to RegisterCallback without an AtExitManager.
FunInstaller_PS_0107704.exe
Tried to RegisterCallback without an AtExitManager.
FunInstaller_PS_0107704.exe
Tried to RegisterCallback without an AtExitManager.
FunInstaller_PS_0107704.exe
Tried to RegisterCallback without an AtExitManager.