URL:

https://download.alicdn.com/wangwang/qianniu_(7.13.00N).exe?spm=a2114k.8808021.0.0&file=qianniu_(7.13.00N).exe

Full analysis: https://app.any.run/tasks/d9631d1e-b643-47d9-9ad7-778711e10cf2
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 08, 2020, 15:44:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

64B1763CF601F6E9AE3EFE389B039CA7

SHA1:

E855DD70DF380E05298E19782DE8ECDB616260FE

SHA256:

24A068BD067D33B9A39B956002114A90BE777D9BF27CD1C9E0095964100CEC2A

SSDEEP:

3:N8SElvJE+UxLRlLLYLAoyDOLdXd9mhfM3VoRlLLYLAC:2SKhQxdRLmAnSpNH3IRLmAC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • qianniu_(7.13.00N).exe (PID: 2004)
      • qianniu_(7.13.00N).exe (PID: 1032)
      • AlibabaProtectCon.exe (PID: 2332)
      • FixQnUpdate.exe (PID: 3056)
      • arphaCrashReport.exe (PID: 3356)
      • arphaCrashReport.exe (PID: 3640)
      • EndProcess.exe (PID: 2244)
      • wwbizsrv.exe (PID: 2520)
      • wwbizsrv.exe (PID: 2852)
      • AlibabaProtect.exe (PID: 2780)
      • AlibabaProtect.exe (PID: 2896)
      • AliApp.exe (PID: 3288)
      • AliApp.exe (PID: 2580)
      • wwbizsrv.exe (PID: 2124)
      • AlibabaProtect.exe (PID: 2380)
    • Loads dropped or rewritten executable

      • pc-sdk-setup.exe (PID: 2772)
      • AliWorkbench.exe (PID: 3672)
      • AlibabaProtect.exe (PID: 2380)
      • AliWorkbench.exe (PID: 932)
      • arphaCrashReport.exe (PID: 3356)
      • FixQnUpdate.exe (PID: 3056)
      • arphaCrashReport.exe (PID: 3640)
      • wwbizsrv.exe (PID: 2520)
      • AliWorkbench.exe (PID: 2520)
      • AliApp.exe (PID: 3288)
      • AliApp.exe (PID: 2580)
      • AliWorkbench.exe (PID: 2208)
      • wwbizsrv.exe (PID: 2124)
    • Changes settings of System certificates

      • AlibabaProtect.exe (PID: 2380)
    • Loads the Task Scheduler COM API

      • AliWorkbench.exe (PID: 3672)
      • AliWorkbench.exe (PID: 2520)
      • AliWorkbench.exe (PID: 2208)
    • Loads the Task Scheduler DLL interface

      • AliWorkbench.exe (PID: 3672)
      • AliWorkbench.exe (PID: 2520)
      • AliWorkbench.exe (PID: 2208)
    • Downloads executable files from the Internet

      • AlibabaProtect.exe (PID: 2380)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2884)
      • pc-sdk-setup.exe (PID: 2772)
      • qianniu_(7.13.00N).exe (PID: 2004)
      • wwbizsrv.exe (PID: 2520)
      • AlibabaProtect.exe (PID: 2380)
    • Modifies the open verb of a shell class

      • qianniu_(7.13.00N).exe (PID: 2004)
    • Creates a software uninstall entry

      • qianniu_(7.13.00N).exe (PID: 2004)
    • Creates files in the program directory

      • AlibabaProtect.exe (PID: 2896)
      • pc-sdk-setup.exe (PID: 2772)
      • AlibabaProtectCon.exe (PID: 2332)
      • AlibabaProtect.exe (PID: 2380)
      • wwbizsrv.exe (PID: 2520)
      • AliWorkbench.exe (PID: 2520)
      • AliApp.exe (PID: 3288)
      • qianniu_(7.13.00N).exe (PID: 2004)
      • AliWorkbench.exe (PID: 2208)
    • Starts application with an unusual extension

      • pc-sdk-setup.exe (PID: 2772)
    • Executed as Windows Service

      • AlibabaProtect.exe (PID: 2380)
      • wwbizsrv.exe (PID: 2852)
    • Low-level read access rights to disk partition

      • AlibabaProtect.exe (PID: 2380)
      • AliWorkbench.exe (PID: 2208)
    • Creates files in the Windows directory

      • AlibabaProtect.exe (PID: 2380)
      • AliWorkbench.exe (PID: 3672)
    • Creates or modifies windows services

      • AlibabaProtect.exe (PID: 2380)
    • Creates files in the driver directory

      • AlibabaProtect.exe (PID: 2380)
    • Creates files in the user directory

      • AliWorkbench.exe (PID: 2520)
    • Application launched itself

      • AliWorkbench.exe (PID: 2520)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2884)
    • Reads the hosts file

      • chrome.exe (PID: 2884)
      • chrome.exe (PID: 4088)
      • AliApp.exe (PID: 3288)
      • AliApp.exe (PID: 2580)
    • Dropped object may contain Bitcoin addresses

      • qianniu_(7.13.00N).exe (PID: 2004)
      • pc-sdk-setup.exe (PID: 2772)
      • AliWorkbench.exe (PID: 2520)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2884)
    • Reads settings of System Certificates

      • AlibabaProtect.exe (PID: 2380)
      • AliWorkbench.exe (PID: 2208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
78
Monitored processes
33
Malicious processes
12
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs qianniu_(7.13.00n).exe no specs qianniu_(7.13.00n).exe alibabaprotectcon.exe pc-sdk-setup.exe nsa6c3.tmp no specs alibabaprotect.exe no specs nsa81c.tmp no specs alibabaprotect.exe no specs alibabaprotect.exe aliworkbench.exe aliworkbench.exe endprocess.exe no specs fixqnupdate.exe no specs wwbizsrv.exe arphacrashreport.exe no specs arphacrashreport.exe no specs wwbizsrv.exe aliworkbench.exe aliapp.exe aliworkbench.exe aliapp.exe wwbizsrv.exe

Process information

PID
CMD
Path
Indicators
Parent process
932"C:\Program Files\AliWorkbench\AliWorkbench.exe" /cleansdk /nouaccheckC:\Program Files\AliWorkbench\AliWorkbench.exe
qianniu_(7.13.00N).exe
User:
admin
Company:
Alibaba Group
Integrity Level:
HIGH
Description:
千牛工作台
Exit code:
0
Modules
Images
c:\program files\aliworkbench\aliworkbench.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
940"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=984,6147491286848509495,8471258549834483080,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=5488056632022281009 --mojo-platform-channel-handle=1292 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1032"C:\Users\admin\Downloads\qianniu_(7.13.00N).exe" C:\Users\admin\Downloads\qianniu_(7.13.00N).exechrome.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\qianniu_(7.13.00n).exe
c:\systemroot\system32\ntdll.dll
1744"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=984,6147491286848509495,8471258549834483080,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=13619230945148009603 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2004"C:\Users\admin\Downloads\qianniu_(7.13.00N).exe" C:\Users\admin\Downloads\qianniu_(7.13.00N).exe
chrome.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\downloads\qianniu_(7.13.00n).exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2124"C:\Program Files\AliWorkbench\7.13.00N\wwbizsrv.exe" /checkC:\Program Files\AliWorkbench\7.13.00N\wwbizsrv.exe
AliWorkbench.exe
User:
admin
Company:
Alibaba Group
Integrity Level:
MEDIUM
Description:
旺旺亮灯服务模块
Exit code:
0
Version:
1.0.0.35
Modules
Images
c:\program files\aliworkbench\7.13.00n\wwbizsrv.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2136"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6d90a9d0,0x6d90a9e0,0x6d90a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2196"C:\Users\admin\AppData\Local\Temp\nso987A.tmp\nsA81C.tmp" "C:\Program Files\AlibabaProtect\1.0.41.959\AlibabaProtect.exe" /startC:\Users\admin\AppData\Local\Temp\nso987A.tmp\nsA81C.tmppc-sdk-setup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\nso987a.tmp\nsa81c.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2208"C:\Program Files\AliWorkbench\AliWorkbench.exe"C:\Program Files\AliWorkbench\AliWorkbench.exe
AliWorkbench.exe
User:
admin
Company:
Alibaba Group
Integrity Level:
MEDIUM
Description:
千牛工作台
Exit code:
0
Modules
Images
c:\program files\aliworkbench\aliworkbench.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2244"C:\Program Files\AliWorkbench\7.13.00N\EndProcess.exe" IMClient-RVC:\Program Files\AliWorkbench\7.13.00N\EndProcess.exeqianniu_(7.13.00N).exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\aliworkbench\7.13.00n\endprocess.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
2 061
Read events
1 838
Write events
220
Delete events
3

Modification events

(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2552) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2884-13222971873356875
Value:
259
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2884) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:1512-13197841398593750
Value:
0
(PID) Process:(2884) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
256
Suspicious files
70
Text files
2 044
Unknown types
69

Dropped files

PID
Process
Filename
Type
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1e71ddfe-8df0-43b9-a836-6cf07d236d56.tmp
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF39997b.TMPtext
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39997b.TMPtext
MD5:
SHA256:
2884chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
19
DNS requests
10
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2380
AlibabaProtect.exe
POST
200
203.119.175.226:80
http://pcs-sdk-server.alibaba.com/a
CN
text
117 b
unknown
2380
AlibabaProtect.exe
POST
200
203.119.175.226:80
http://pcs-sdk-server.alibaba.com/a
CN
text
18.2 Kb
unknown
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/optionalmodule.xml
US
xml
41.8 Kb
suspicious
2380
AlibabaProtect.exe
POST
200
203.119.175.226:80
http://pcs-sdk-server.alibaba.com/a
CN
text
137 b
unknown
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/SoftPackage/DigitalCert.dll
US
executable
1.01 Mb
suspicious
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/SoftPackage/FeacodeDetector.dll
US
executable
740 Kb
suspicious
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/SoftPackage/ScanEngine.dll
US
executable
313 Kb
suspicious
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/SoftPackage/FileCache.dll
US
executable
306 Kb
suspicious
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/SoftPackage/MatchEngines.dll
US
executable
397 Kb
suspicious
2380
AlibabaProtect.exe
GET
200
47.246.43.251:80
http://dcldshlupt.alicdn.com/data/pcs-sdk/1.0.41.959/SoftPackage/imageformats/qsvg.dll
US
executable
31.6 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4088
chrome.exe
172.217.16.141:443
accounts.google.com
Google Inc.
US
suspicious
4088
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
4088
chrome.exe
47.246.43.252:443
download.alicdn.com
US
suspicious
4088
chrome.exe
172.217.21.195:443
ssl.gstatic.com
Google Inc.
US
whitelisted
4088
chrome.exe
216.58.208.35:443
www.gstatic.com
Google Inc.
US
whitelisted
4088
chrome.exe
172.217.22.110:443
clients1.google.com
Google Inc.
US
whitelisted
2332
AlibabaProtectCon.exe
203.119.175.226:80
pcs-sdk-server.alibaba.com
CN
unknown
4088
chrome.exe
216.58.210.14:443
sb-ssl.google.com
Google Inc.
US
whitelisted
2380
AlibabaProtect.exe
203.119.175.226:80
pcs-sdk-server.alibaba.com
CN
unknown
2332
AlibabaProtectCon.exe
203.119.175.226:443
pcs-sdk-server.alibaba.com
CN
unknown

DNS requests

Domain
IP
Reputation
download.alicdn.com
  • 47.246.43.252
  • 47.246.43.251
suspicious
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
accounts.google.com
  • 172.217.16.141
shared
www.google.com
  • 216.58.208.36
malicious
ssl.gstatic.com
  • 172.217.21.195
whitelisted
www.gstatic.com
  • 216.58.208.35
whitelisted
clients1.google.com
  • 172.217.22.110
whitelisted
sb-ssl.google.com
  • 216.58.210.14
whitelisted
pcs-sdk-server.alibaba.com
  • 203.119.175.226
unknown
dcldshlupt.alicdn.com
  • 47.246.43.251
  • 47.246.43.252
suspicious

Threats

PID
Process
Class
Message
2380
AlibabaProtect.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
2380
AlibabaProtect.exe
Misc activity
ET INFO Packed Executable Download
Process
Message
AliWorkbench.exe
1: Hotfix present and filter active 2: Hotfix not present, filter active if this is an affected system 0: Hotfix present, filter not active Current Filter Status:2
AlibabaProtect.exe
dcp ==> 2380:1528
AlibabaProtect.exe
dcp ==> 2380:4048
AliWorkbench.exe
1: Hotfix present and filter active 2: Hotfix not present, filter active if this is an affected system 0: Hotfix present, filter not active Current Filter Status:2
wwbizsrv.exe
start install: c:\program files\aliworkbench
wwbizsrv.exe
wwbizsrv.exe
wwbizsrv.exe
wwbizsrv.exe
IsNewer
wwbizsrv.exe
copy file from C:\Program Files\AliWorkbench\7.13.00N\wwbizsrv.exe to C:\Program Files\Alibaba\wwbizsrv\wwbizsrv.exe