File name:

GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe

Full analysis: https://app.any.run/tasks/3ab8b52d-a627-4240-b1fb-e7f07681446e
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: October 01, 2019, 08:17:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C27E8E8C3256D30A92C03672BA568757

SHA1:

F96AC401215BB44DA1DDD4DA7A163F92A94F55DE

SHA256:

2E63511C7101BBC20A5F5D95FB0BCF0C4F55BFB287B34A6FD194C6B68049FE81

SSDEEP:

196608:WFGTeqlUgN7AktVweDO+oPG5eWWi/zio/i:G2O+o+wWrX/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • TenioDL.exe (PID: 4048)
      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • Tinst.exe (PID: 3628)
      • QMEmulatorService.exe (PID: 3264)
      • AppMarket.exe (PID: 1716)
      • TBSWebRenderer.exe (PID: 2880)
    • Adds new firewall rule via NETSH.EXE

      • Tinst.exe (PID: 3628)
    • Application was dropped or rewritten from another process

      • TenioDL.exe (PID: 4048)
      • QMEmulatorService.exe (PID: 3264)
      • Tinst.exe (PID: 3628)
      • TBSWebRenderer.exe (PID: 2880)
  • SUSPICIOUS

    • Creates files in the user directory

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • TenioDL.exe (PID: 4048)
      • Tinst.exe (PID: 3628)
      • AppMarket.exe (PID: 1716)
    • Low-level read access rights to disk partition

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • AppMarket.exe (PID: 1716)
    • Uses ICACLS.EXE to modify access control list

      • TenioDL.exe (PID: 4048)
    • Executable content was dropped or overwritten

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • Tinst.exe (PID: 3628)
      • Market.exe (PID: 3952)
    • Reads Internet Cache Settings

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • AppMarket.exe (PID: 1716)
    • Executed as Windows Service

      • QMEmulatorService.exe (PID: 3264)
    • Modifies the open verb of a shell class

      • Tinst.exe (PID: 3628)
    • Uses NETSH.EXE for network configuration

      • Tinst.exe (PID: 3628)
      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
    • Creates a software uninstall entry

      • Tinst.exe (PID: 3628)
    • Creates files in the program directory

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • AppMarket.exe (PID: 1716)
      • Tinst.exe (PID: 3628)
  • INFO

    • Reads the hosts file

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • AppMarket.exe (PID: 1716)
    • Reads settings of System Certificates

      • GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe (PID: 432)
      • AppMarket.exe (PID: 1716)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:03:28 09:14:52+01:00
PEType: PE32
LinkerVersion: 14
CodeSize: 1301504
InitializedDataSize: 8361472
UninitializedDataSize: -
EntryPoint: 0x9b534
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.8753.123
ProductVersionNumber: 1.0.8753.123
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Tencent
FileDescription: Tencent Gaming Buddy - Install
FileVersion: 1.0.8753.123
InternalName: GameDownload
LegalCopyright: Copyright © 2017 Tencent. All Rights Reserved.
OriginalFileName: GameDownload.exe
ProductName: Tencent Gaming Buddy
ProductVersion: 1,0,8753,123

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 28-Mar-2019 08:14:52
Detected languages:
  • Chinese - PRC
  • English - United States
Debug artifacts:
  • D:\jenkins_Trunk\workspace\RO\qqpcmgr_proj\AndroidEmulator\Output\Binfinal\GameDownload\GameDownload.pdb
CompanyName: Tencent
FileDescription: Tencent Gaming Buddy - Install
FileVersion: 1.0.8753.123
InternalName: GameDownload
LegalCopyright: Copyright © 2017 Tencent. All Rights Reserved.
OriginalFilename: GameDownload.exe
ProductName: Tencent Gaming Buddy
ProductVersion: 1,0,8753,123

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000130

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 8
Time date stamp: 28-Mar-2019 08:14:52
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0013DBAB
0x0013DC00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.53524
.rdata
0x0013F000
0x0005A05C
0x0005A200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.02494
.data
0x0019A000
0x000060A4
0x00004400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.71512
.gfids
0x001A1000
0x000003F4
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.05647
.tls
0x001A2000
0x00000009
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.0203931
.QMGuid
0x001A3000
0x00000014
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x001A4000
0x007867E0
0x00786800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.42495
.reloc
0x0092B000
0x00012090
0x00012200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.65418

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.89623
392
UNKNOWN
English - United States
RT_MANIFEST
2
2.89005
744
UNKNOWN
Chinese - PRC
RT_ICON
3
2.54353
296
UNKNOWN
Chinese - PRC
RT_ICON
4
4.35478
3752
UNKNOWN
Chinese - PRC
RT_ICON
5
5.17501
2216
UNKNOWN
Chinese - PRC
RT_ICON
6
3.47748
1384
UNKNOWN
Chinese - PRC
RT_ICON
7
3.0167
150
UNKNOWN
Chinese - PRC
RT_STRING
8
2.12138
68
UNKNOWN
Chinese - PRC
RT_STRING
9
4.05874
1128
UNKNOWN
Chinese - PRC
RT_ICON
10
0.867269
38
UNKNOWN
Chinese - PRC
RT_STRING

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
IMM32.dll
IPHLPAPI.DLL
KERNEL32.dll
NETAPI32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll

Exports

Title
Ordinal
Address
curl_easy_cleanup
1
0x00065B20
curl_easy_duphandle
2
0x00065B40
curl_easy_escape
3
0x000900D0
curl_easy_getinfo
4
0x00065D20
curl_easy_init
5
0x00065D40
curl_easy_pause
6
0x00065D80
curl_easy_perform
7
0x00065EA0
curl_easy_recv
8
0x00065F90
curl_easy_reset
9
0x00065FE0
curl_easy_send
10
0x00066090
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
16
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start gamedownload_pubg_mobile_hwbbcs_100103_1.0.8753.123.exe teniodl.exe icacls.exe no specs market.exe tinst.exe qmemulatorservice.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs appmarket.exe netsh.exe no specs tbswebrenderer.exe gamedownload_pubg_mobile_hwbbcs_100103_1.0.8753.123.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
432"C:\Users\admin\AppData\Local\Temp\GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe" C:\Users\admin\AppData\Local\Temp\GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
explorer.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Tencent Gaming Buddy - Install
Exit code:
0
Version:
1.0.8753.123
Modules
Images
c:\users\admin\appdata\local\temp\gamedownload_pubg_mobile_hwbbcs_100103_1.0.8753.123.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\psapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
1716"C:\Program Files\txgameassistant\appmarket\AppMarket.exe" -pkg "com.tencent.ig" -apksupplyid 100103 -displayname "PUBG MOBILE" -apkarea en -createdesktopicon -from DownloaderC:\Program Files\txgameassistant\appmarket\AppMarket.exe
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Gameloop
Exit code:
0
Version:
2.0.12854.123
Modules
Images
c:\program files\txgameassistant\appmarket\appmarket.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2164"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="bugreport" dir=in program="c:\program files\txgameassistant\appmarket\bugreport.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2168"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TUpdate" dir=in program="c:\program files\txgameassistant\appmarket\GF186\TUpdate.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2476"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="GameDownload" dir=in program="c:\program files\txgameassistant\appmarket\GameDownload.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2672"C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器组件"C:\Windows\system32\Netsh.exeGameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2880"C:\Program Files\txgameassistant\appmarket\TBSWebRenderer.exe" --type=renderer --enable-smooth-scrolling --force-device-scale-factor=1.00 --no-sandbox --enable-begin-frame-scheduling --client-id=GFTBSWebCtrl --primordial-pipe-token=74468B2970B8AE15E8D88419925C1671 --user-agent-extra="Tencent AppMarket/4.8 PopUrl" --lang=en-US --lang=en-US --log-file="C:\Program Files\txgameassistant\appmarket\debug.log" --dummy-exception-handler --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=F0F3001282582F3662E3470F6BC0D220 --mojo-application-channel-token=74468B2970B8AE15E8D88419925C1671 --channel="1716.0.1365560230\454915315" --fix-fasa --mojo-platform-channel-handle=2788 /prefetch:1C:\Program Files\txgameassistant\appmarket\TBSWebRenderer.exe
AppMarket.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
TBSWebRenderer
Exit code:
0
Version:
2.0.12854.123
Modules
Images
c:\program files\txgameassistant\appmarket\tbswebrenderer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3048"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="AppMarket" dir=in program="c:\program files\txgameassistant\appmarket\AppMarket.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
3264"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exeservices.exe
User:
SYSTEM
Company:
Tencent
Integrity Level:
SYSTEM
Description:
腾讯手游助手
Exit code:
0
Version:
2.0.12854.123
Modules
Images
c:\program files\txgameassistant\appmarket\qmemulatorservice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3368"C:\Windows\System32\icacls.exe" C:\Users\admin\AppData\Roaming\Tencent\Config\ /t /setintegritylevel lowC:\Windows\System32\icacls.exeTenioDL.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
Total events
1 268
Read events
436
Write events
831
Delete events
1

Modification events

(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Tencent\MobileGamePC
Operation:writeName:SupplyId
Value:
100103
(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_CURRENT_USER\Software\Tencent\MobileGamePC
Operation:writeName:sf
Value:
C:\Temp\TxGameDownload\MobileGamePCShared
(PID) Process:(4048) TenioDL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(4048) TenioDL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(4048) TenioDL.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\metnsd\clsid
Operation:writeName:SequenceID
Value:
C54DA09D128F224A86A7C99329FE2B7B
(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_CURRENT_USER\Software\Tencent\MobileGamePC
Operation:writeName:UserLanguage
Value:
en
(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
136
Suspicious files
54
Text files
691
Unknown types
11

Dropped files

PID
Process
Filename
Type
432GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeC:\test.tmp
MD5:
SHA256:
4048TenioDL.exeC:\Users\admin\AppData\Local\Temp\etilqs_ahYi6iamkfMufD3
MD5:
SHA256:
4048TenioDL.exeC:\Users\admin\AppData\Local\Temp\etilqs_tN7d4ZFUqJcpz7H
MD5:
SHA256:
4048TenioDL.exeC:\Temp\TxGameDownload\Component\AppMarket\Market.exe.ttd
MD5:
SHA256:
4048TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\TenioDL\1502\cache\download.db-journal
MD5:
SHA256:
4048TenioDL.exeC:\Temp\TxGameDownload\Component\AppMarket\Market.exe
MD5:
SHA256:
4048TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\File\user_game.initext
MD5:
SHA256:
432GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeC:\Temp\TxGameDownload\Component\2656.tmpxml
MD5:
SHA256:
432GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\compoment[1].xmlxml
MD5:
SHA256:
4048TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\Config\p2p_common.initext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
42
DNS requests
28
Threats
47

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4048
TenioDL.exe
GET
203.205.138.96:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
whitelisted
4048
TenioDL.exe
GET
203.205.138.84:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
whitelisted
GET
203.205.138.231:80
http://s.pc.qq.com/gameassistant/tip/com.activision.callofduty.shooter_1569912494.html
CN
whitelisted
4048
TenioDL.exe
GET
206
203.205.138.86:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
binary
2.75 Mb
whitelisted
4048
TenioDL.exe
GET
206
203.205.138.225:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
binary
512 Kb
whitelisted
GET
200
203.205.218.69:80
http://syzs.qq.com/downloads/xml/ConfigFileInfo.xml
CN
xml
782 b
whitelisted
1716
AppMarket.exe
GET
200
203.205.218.69:80
http://syzs.qq.com/downloads/xml/ConfigFileInfo.xml
CN
xml
782 b
whitelisted
4048
TenioDL.exe
GET
206
203.205.138.229:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
binary
8.63 Mb
whitelisted
4048
TenioDL.exe
GET
206
203.205.138.113:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
binary
8.63 Mb
whitelisted
4048
TenioDL.exe
GET
206
203.205.138.230:80
http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat
CN
binary
2.82 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
432
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
58.251.106.185:443
master.etl.desktop.qq.com
China Unicom Guangdong IP network
CN
malicious
432
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
125.39.248.35:8000
p2pupgrade.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
4048
TenioDL.exe
125.39.248.36:14309
config.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
4048
TenioDL.exe
60.28.190.146:8000
ps2.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
4048
TenioDL.exe
163.177.93.178:8000
stun.qqlive.qq.com
China Unicom Shenzen network
CN
unknown
4048
TenioDL.exe
125.39.248.35:8000
p2pupgrade.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
163.177.93.177:8000
China Unicom Shenzen network
CN
unknown
140.207.128.153:8000
China Unicom Shanghai network
CN
unknown
432
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
203.205.218.69:80
syzs.qq.com
CN
unknown
185.183.107.227:25335
M247 Ltd
AT
unknown

DNS requests

Domain
IP
Reputation
masterconn.qq.com
  • 203.205.142.202
whitelisted
master.etl.desktop.qq.com
  • 58.251.106.185
  • 58.250.137.93
whitelisted
p2pupgrade.gamedl.qq.com
  • 125.39.248.35
  • 125.39.247.36
unknown
masterconn2.qq.com
  • 123.151.71.34
unknown
config.gamedl.qq.com
  • 125.39.248.36
  • 220.194.106.125
whitelisted
stat.gamedl.qq.com
  • 125.39.248.44
  • 125.39.248.45
  • 111.161.93.163
  • 111.161.93.164
  • 111.161.93.165
  • 125.39.248.43
unknown
stun.qqlive.qq.com
  • 163.177.93.178
  • 220.249.245.138
  • 220.249.245.24
  • 163.177.93.245
  • 163.177.93.188
suspicious
ps2.gamedl.qq.com
  • 60.28.190.146
  • 125.39.248.51
unknown
p2pupdate.gamedl.qq.com
  • 125.39.248.35
  • 125.39.247.36
unknown
syzs.qq.com
  • 203.205.218.69
  • 203.205.146.22
unknown

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA TLS error message encountered
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
Generic Protocol Command Decode
SURICATA TLS error message encountered
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Generic Protocol Command Decode
SURICATA TLS error message encountered
4 ETPRO signatures available at the full report
Process
Message
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
[Downloader] GetLogicalDrives 4
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
[Downloader] DriverType C: = 3
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
[Downloader] GetLogicalDrives 4
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe
[Downloader] DriverType C: = 3
AppMarket.exe
[1001/091905:INFO:exception_record.cc(518)] [QB]Process ID: 1716 Type: 1
AppMarket.exe
[1001/091905:ERROR:main_delegate.cc(792)] Could not load cef_extensions.pak
TBSWebRenderer.exe
[1001/091905:INFO:exception_record.cc(518)] [QB]Process ID: 2880 Type: 2
TBSWebRenderer.exe
[1001/091905:ERROR:main_delegate.cc(792)] Could not load cef_extensions.pak