File name: | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe |
Full analysis: | https://app.any.run/tasks/3ab8b52d-a627-4240-b1fb-e7f07681446e |
Verdict: | Malicious activity |
Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
Analysis date: | October 01, 2019, 08:17:45 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | C27E8E8C3256D30A92C03672BA568757 |
SHA1: | F96AC401215BB44DA1DDD4DA7A163F92A94F55DE |
SHA256: | 2E63511C7101BBC20A5F5D95FB0BCF0C4F55BFB287B34A6FD194C6B68049FE81 |
SSDEEP: | 196608:WFGTeqlUgN7AktVweDO+oPG5eWWi/zio/i:G2O+o+wWrX/ |
.exe | | | Win32 Executable (generic) (3.6) |
---|---|---|
.exe | | | Generic Win/DOS Executable (1.6) |
.exe | | | DOS Executable Generic (1.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2019:03:28 09:14:52+01:00 |
PEType: | PE32 |
LinkerVersion: | 14 |
CodeSize: | 1301504 |
InitializedDataSize: | 8361472 |
UninitializedDataSize: | - |
EntryPoint: | 0x9b534 |
OSVersion: | 5.1 |
ImageVersion: | - |
SubsystemVersion: | 5.1 |
Subsystem: | Windows GUI |
FileVersionNumber: | 1.0.8753.123 |
ProductVersionNumber: | 1.0.8753.123 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Windows, Latin1 |
CompanyName: | Tencent |
FileDescription: | Tencent Gaming Buddy - Install |
FileVersion: | 1.0.8753.123 |
InternalName: | GameDownload |
LegalCopyright: | Copyright © 2017 Tencent. All Rights Reserved. |
OriginalFileName: | GameDownload.exe |
ProductName: | Tencent Gaming Buddy |
ProductVersion: | 1,0,8753,123 |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 28-Mar-2019 08:14:52 |
Detected languages: |
|
Debug artifacts: |
|
CompanyName: | Tencent |
FileDescription: | Tencent Gaming Buddy - Install |
FileVersion: | 1.0.8753.123 |
InternalName: | GameDownload |
LegalCopyright: | Copyright © 2017 Tencent. All Rights Reserved. |
OriginalFilename: | GameDownload.exe |
ProductName: | Tencent Gaming Buddy |
ProductVersion: | 1,0,8753,123 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000130 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 8 |
Time date stamp: | 28-Mar-2019 08:14:52 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0013DBAB | 0x0013DC00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.53524 |
.rdata | 0x0013F000 | 0x0005A05C | 0x0005A200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.02494 |
.data | 0x0019A000 | 0x000060A4 | 0x00004400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.71512 |
.gfids | 0x001A1000 | 0x000003F4 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.05647 |
.tls | 0x001A2000 | 0x00000009 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0203931 |
.QMGuid | 0x001A3000 | 0x00000014 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x001A4000 | 0x007867E0 | 0x00786800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.42495 |
.reloc | 0x0092B000 | 0x00012090 | 0x00012200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.65418 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.89623 | 392 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 2.89005 | 744 | UNKNOWN | Chinese - PRC | RT_ICON |
3 | 2.54353 | 296 | UNKNOWN | Chinese - PRC | RT_ICON |
4 | 4.35478 | 3752 | UNKNOWN | Chinese - PRC | RT_ICON |
5 | 5.17501 | 2216 | UNKNOWN | Chinese - PRC | RT_ICON |
6 | 3.47748 | 1384 | UNKNOWN | Chinese - PRC | RT_ICON |
7 | 3.0167 | 150 | UNKNOWN | Chinese - PRC | RT_STRING |
8 | 2.12138 | 68 | UNKNOWN | Chinese - PRC | RT_STRING |
9 | 4.05874 | 1128 | UNKNOWN | Chinese - PRC | RT_ICON |
10 | 0.867269 | 38 | UNKNOWN | Chinese - PRC | RT_STRING |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
IMM32.dll |
IPHLPAPI.DLL |
KERNEL32.dll |
NETAPI32.dll |
OLEAUT32.dll |
PSAPI.DLL |
SHELL32.dll |
Title | Ordinal | Address |
---|---|---|
curl_easy_cleanup | 1 | 0x00065B20 |
curl_easy_duphandle | 2 | 0x00065B40 |
curl_easy_escape | 3 | 0x000900D0 |
curl_easy_getinfo | 4 | 0x00065D20 |
curl_easy_init | 5 | 0x00065D40 |
curl_easy_pause | 6 | 0x00065D80 |
curl_easy_perform | 7 | 0x00065EA0 |
curl_easy_recv | 8 | 0x00065F90 |
curl_easy_reset | 9 | 0x00065FE0 |
curl_easy_send | 10 | 0x00066090 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
432 | "C:\Users\admin\AppData\Local\Temp\GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe" | C:\Users\admin\AppData\Local\Temp\GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | explorer.exe | ||||||||||||
User: admin Company: Tencent Integrity Level: HIGH Description: Tencent Gaming Buddy - Install Exit code: 0 Version: 1.0.8753.123 Modules
| |||||||||||||||
1716 | "C:\Program Files\txgameassistant\appmarket\AppMarket.exe" -pkg "com.tencent.ig" -apksupplyid 100103 -displayname "PUBG MOBILE" -apkarea en -createdesktopicon -from Downloader | C:\Program Files\txgameassistant\appmarket\AppMarket.exe | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | ||||||||||||
User: admin Company: Tencent Integrity Level: HIGH Description: Gameloop Exit code: 0 Version: 2.0.12854.123 Modules
| |||||||||||||||
2164 | "C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="bugreport" dir=in program="c:\program files\txgameassistant\appmarket\bugreport.exe" action=allow | C:\Windows\system32\Netsh.exe | — | Tinst.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2168 | "C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TUpdate" dir=in program="c:\program files\txgameassistant\appmarket\GF186\TUpdate.exe" action=allow | C:\Windows\system32\Netsh.exe | — | Tinst.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2476 | "C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="GameDownload" dir=in program="c:\program files\txgameassistant\appmarket\GameDownload.exe" action=allow | C:\Windows\system32\Netsh.exe | — | Tinst.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2672 | "C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器组件" | C:\Windows\system32\Netsh.exe | — | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2880 | "C:\Program Files\txgameassistant\appmarket\TBSWebRenderer.exe" --type=renderer --enable-smooth-scrolling --force-device-scale-factor=1.00 --no-sandbox --enable-begin-frame-scheduling --client-id=GFTBSWebCtrl --primordial-pipe-token=74468B2970B8AE15E8D88419925C1671 --user-agent-extra="Tencent AppMarket/4.8 PopUrl" --lang=en-US --lang=en-US --log-file="C:\Program Files\txgameassistant\appmarket\debug.log" --dummy-exception-handler --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=F0F3001282582F3662E3470F6BC0D220 --mojo-application-channel-token=74468B2970B8AE15E8D88419925C1671 --channel="1716.0.1365560230\454915315" --fix-fasa --mojo-platform-channel-handle=2788 /prefetch:1 | C:\Program Files\txgameassistant\appmarket\TBSWebRenderer.exe | AppMarket.exe | ||||||||||||
User: admin Company: Tencent Integrity Level: HIGH Description: TBSWebRenderer Exit code: 0 Version: 2.0.12854.123 Modules
| |||||||||||||||
3048 | "C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="AppMarket" dir=in program="c:\program files\txgameassistant\appmarket\AppMarket.exe" action=allow | C:\Windows\system32\Netsh.exe | — | Tinst.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3264 | "C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe" | C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Tencent Integrity Level: SYSTEM Description: 腾讯手游助手 Exit code: 0 Version: 2.0.12854.123 Modules
| |||||||||||||||
3368 | "C:\Windows\System32\icacls.exe" C:\Users\admin\AppData\Roaming\Tencent\Config\ /t /setintegritylevel low | C:\Windows\System32\icacls.exe | — | TenioDL.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Tencent\MobileGamePC |
Operation: | write | Name: | SupplyId |
Value: 100103 | |||
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_CURRENT_USER\Software\Tencent\MobileGamePC |
Operation: | write | Name: | sf |
Value: C:\Temp\TxGameDownload\MobileGamePCShared | |||
(PID) Process: | (4048) TenioDL.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (4048) TenioDL.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (4048) TenioDL.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\metnsd\clsid |
Operation: | write | Name: | SequenceID |
Value: C54DA09D128F224A86A7C99329FE2B7B | |||
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_CURRENT_USER\Software\Tencent\MobileGamePC |
Operation: | write | Name: | UserLanguage |
Value: en | |||
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
(PID) Process: | (432) GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_hwbbcs_100103_1_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 |
PID | Process | Filename | Type | |
---|---|---|---|---|
432 | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | C:\test.tmp | — | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Users\admin\AppData\Local\Temp\etilqs_ahYi6iamkfMufD3 | — | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Users\admin\AppData\Local\Temp\etilqs_tN7d4ZFUqJcpz7H | — | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Temp\TxGameDownload\Component\AppMarket\Market.exe.ttd | — | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Users\admin\AppData\Roaming\Tencent\TenioDL\1502\cache\download.db-journal | — | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Temp\TxGameDownload\Component\AppMarket\Market.exe | — | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Users\admin\AppData\Roaming\Tencent\File\user_game.ini | text | |
MD5:— | SHA256:— | |||
432 | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | C:\Temp\TxGameDownload\Component\2656.tmp | xml | |
MD5:— | SHA256:— | |||
432 | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\compoment[1].xml | xml | |
MD5:— | SHA256:— | |||
4048 | TenioDL.exe | C:\Users\admin\AppData\Roaming\Tencent\Config\p2p_common.ini | text | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4048 | TenioDL.exe | GET | — | 203.205.138.96:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | — | — | whitelisted |
4048 | TenioDL.exe | GET | — | 203.205.138.84:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | — | — | whitelisted |
— | — | GET | — | 203.205.138.231:80 | http://s.pc.qq.com/gameassistant/tip/com.activision.callofduty.shooter_1569912494.html | CN | — | — | whitelisted |
4048 | TenioDL.exe | GET | 206 | 203.205.138.86:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | binary | 2.75 Mb | whitelisted |
4048 | TenioDL.exe | GET | 206 | 203.205.138.225:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | binary | 512 Kb | whitelisted |
— | — | GET | 200 | 203.205.218.69:80 | http://syzs.qq.com/downloads/xml/ConfigFileInfo.xml | CN | xml | 782 b | whitelisted |
1716 | AppMarket.exe | GET | 200 | 203.205.218.69:80 | http://syzs.qq.com/downloads/xml/ConfigFileInfo.xml | CN | xml | 782 b | whitelisted |
4048 | TenioDL.exe | GET | 206 | 203.205.138.229:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | binary | 8.63 Mb | whitelisted |
4048 | TenioDL.exe | GET | 206 | 203.205.138.113:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | binary | 8.63 Mb | whitelisted |
4048 | TenioDL.exe | GET | 206 | 203.205.138.230:80 | http://dldir1.qq.com/syzs/oversea_component/Market_2.0.12854.123_oversea_v2.dat | CN | binary | 2.82 Mb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
432 | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | 58.251.106.185:443 | master.etl.desktop.qq.com | China Unicom Guangdong IP network | CN | malicious |
432 | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | 125.39.248.35:8000 | p2pupgrade.gamedl.qq.com | CHINA UNICOM China169 Backbone | CN | unknown |
4048 | TenioDL.exe | 125.39.248.36:14309 | config.gamedl.qq.com | CHINA UNICOM China169 Backbone | CN | unknown |
4048 | TenioDL.exe | 60.28.190.146:8000 | ps2.gamedl.qq.com | CHINA UNICOM China169 Backbone | CN | unknown |
4048 | TenioDL.exe | 163.177.93.178:8000 | stun.qqlive.qq.com | China Unicom Shenzen network | CN | unknown |
4048 | TenioDL.exe | 125.39.248.35:8000 | p2pupgrade.gamedl.qq.com | CHINA UNICOM China169 Backbone | CN | unknown |
— | — | 163.177.93.177:8000 | — | China Unicom Shenzen network | CN | unknown |
— | — | 140.207.128.153:8000 | — | China Unicom Shanghai network | CN | unknown |
432 | GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | 203.205.218.69:80 | syzs.qq.com | — | CN | unknown |
— | — | 185.183.107.227:25335 | — | M247 Ltd | AT | unknown |
Domain | IP | Reputation |
---|---|---|
masterconn.qq.com |
| whitelisted |
master.etl.desktop.qq.com |
| whitelisted |
p2pupgrade.gamedl.qq.com |
| unknown |
masterconn2.qq.com |
| unknown |
config.gamedl.qq.com |
| whitelisted |
stat.gamedl.qq.com |
| unknown |
stun.qqlive.qq.com |
| suspicious |
ps2.gamedl.qq.com |
| unknown |
p2pupdate.gamedl.qq.com |
| unknown |
syzs.qq.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Generic Protocol Command Decode | SURICATA TLS error message encountered |
— | — | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
— | — | Generic Protocol Command Decode | SURICATA TLS error message encountered |
— | — | Generic Protocol Command Decode | ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false) |
— | — | Generic Protocol Command Decode | ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false) |
— | — | Generic Protocol Command Decode | ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true) |
— | — | Generic Protocol Command Decode | ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false) |
— | — | Generic Protocol Command Decode | ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false) |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Generic Protocol Command Decode | SURICATA TLS error message encountered |
Process | Message |
---|---|
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | [Downloader] GetLogicalDrives 4
|
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | [Downloader] DriverType C: = 3
|
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | [Downloader] GetLogicalDrives 4
|
GameDownload_PUBG_MOBILE_hwbbcs_100103_1.0.8753.123.exe | [Downloader] DriverType C: = 3
|
AppMarket.exe | [1001/091905:INFO:exception_record.cc(518)] [QB]Process ID: 1716 Type: 1
|
AppMarket.exe | [1001/091905:ERROR:main_delegate.cc(792)] Could not load cef_extensions.pak
|
TBSWebRenderer.exe | [1001/091905:INFO:exception_record.cc(518)] [QB]Process ID: 2880 Type: 2
|
TBSWebRenderer.exe | [1001/091905:ERROR:main_delegate.cc(792)] Could not load cef_extensions.pak
|