File name:

GLP_installer_900223150_market.exe

Full analysis: https://app.any.run/tasks/82b0ca17-d81a-4845-9d86-cf9abaaf2d98
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: November 03, 2024, 19:27:45
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
adware
tgbdownloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

E7F4D560E7520EB427EDDB72CB645344

SHA1:

8B9C624F90F150EA10FE5EAC0D219BE2D719280D

SHA256:

8700E903754A00C6CF444F1C437E2944D72887310C11199CCDA97B0E9517A876

SSDEEP:

49152:608OhxtUg9OUi82w6aQp9dgS1GUL38XhCOYc3iJXe9emEPGKOPkQThMYRMnm7LB6:608vdsGaQNgS1C6e6ngKpq+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TGBDOWNLOADER has been detected

      • GLP_installer_900223150_market.exe (PID: 1196)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • GLP_installer_900223150_market.exe (PID: 1196)
    • Creates file in the systems drive root

      • GLP_installer_900223150_market.exe (PID: 1196)
  • INFO

    • Creates files or folders in the user directory

      • GLP_installer_900223150_market.exe (PID: 1196)
    • Create files in a temporary directory

      • GLP_installer_900223150_market.exe (PID: 1196)
    • Reads the computer name

      • GLP_installer_900223150_market.exe (PID: 1196)
    • Checks supported languages

      • GLP_installer_900223150_market.exe (PID: 1196)
    • Reads the machine GUID from the registry

      • GLP_installer_900223150_market.exe (PID: 1196)
    • Reads the software policy settings

      • GLP_installer_900223150_market.exe (PID: 1196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:17 02:57:05+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 2604544
InitializedDataSize: 1211392
UninitializedDataSize: -
EntryPoint: 0x220be4
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Tencent
FileDescription: Tencent Game Downloader
FileVersion: 1, 0, 0, 1
InternalName: TGBDownloader.exe
LegalCopyright: Copyright ? 2020 Tencent. All Rights Reserved.
OriginalFileName: TGBDownloader.exe
ProductName: Tencent Game Downloader
ProductVersion: 1, 0, 0, 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start glp_installer_900223150_market.exe glp_installer_900223150_market.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1196"C:\Users\admin\Desktop\GLP_installer_900223150_market.exe" C:\Users\admin\Desktop\GLP_installer_900223150_market.exe
explorer.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Tencent Game Downloader
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\glp_installer_900223150_market.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
5564"C:\Users\admin\Desktop\GLP_installer_900223150_market.exe" C:\Users\admin\Desktop\GLP_installer_900223150_market.exeexplorer.exe
User:
admin
Company:
Tencent
Integrity Level:
MEDIUM
Description:
Tencent Game Downloader
Exit code:
3221226540
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\desktop\glp_installer_900223150_market.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
3 315
Read events
3 311
Write events
4
Delete events
0

Modification events

(PID) Process:(1196) GLP_installer_900223150_market.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC\Beacon
Operation:writeName:Last_Sid_GLP_installer_900223150_market.exe
Value:
27DBF44F-3363-4EE2-89BD-CFED5AB9A1E8
(PID) Process:(1196) GLP_installer_900223150_market.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
Operation:writeName:TempPath
Value:
C:\Temp\TxGameDownload\Component\
(PID) Process:(1196) GLP_installer_900223150_market.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
Operation:writeName:UserLanguage
Value:
en
(PID) Process:(1196) GLP_installer_900223150_market.exeKey:HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
Operation:writeName:abtestid
Value:
{"Component":"0"}
Executable files
1
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
1196GLP_installer_900223150_market.exeC:\test.tmpbinary
MD5:AF755E08F0DA71B6F3ACD8C7701D8AB2
SHA256:3C3465D112CA66CE9283C46AC887C26F81BCEBCF4BF3EF1BEDC85796BC5E9F84
1196GLP_installer_900223150_market.exeC:\Users\admin\AppData\Local\Tencent\TxGameAssistant\TGBDownloader\dr.dllexecutable
MD5:2814ACBD607BA47BDBCDF6AC3076EE95
SHA256:5904A7E4D97EEAC939662C3638A0E145F64FF3DD0198F895C4BF0337595C6A67
1196GLP_installer_900223150_market.exeC:\Users\admin\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.dbtext
MD5:54AFE3E95CB8818343F5B6DE3D6B7D8A
SHA256:3CB3BAC474FC58BC01593462AFDF3D4A7290563C3283386BAF0F1591EC02FFD3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
45
DNS requests
10
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2660
RUXIMICS.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2660
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
43.152.28.43:443
https://down.gameloop.com/syzs_cms/202402/1d218714941abf910cf39c6d4f265e7d.exe
unknown
GET
43.175.152.67:443
https://down.gameloop.com/syzs_cms/202402/1d218714941abf910cf39c6d4f265e7d.exe
unknown
GET
43.152.29.77:443
https://down.gameloop.com/syzs_cms/202402/1d218714941abf910cf39c6d4f265e7d.exe
unknown
POST
200
49.51.129.71:443
https://unifiedaccess.gameloop.com/syzsclient/update/clientupdate
unknown
text
5.81 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2660
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2660
RUXIMICS.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2660
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
oth.eve.mdt.qq.com
  • 101.33.47.68
  • 101.33.47.206
whitelisted
master.etl.desktop.qq.com
  • 157.255.4.39
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
unifiedaccess.gameloop.com
  • 49.51.131.79
  • 49.51.129.71
malicious
down.gameloop.com
  • 43.175.152.67
  • 43.152.29.77
  • 43.175.152.66
  • 43.152.26.142
  • 43.152.29.72
  • 43.152.26.197
  • 43.152.29.78
  • 43.152.28.77
  • 43.152.28.111
  • 43.152.29.148
  • 43.175.152.62
  • 43.152.26.209
  • 43.152.26.154
  • 43.152.26.151
  • 43.152.28.43
malicious
self.events.data.microsoft.com
  • 52.182.143.214
whitelisted

Threats

Found threats are available for the paid subscriptions
4 ETPRO signatures available at the full report
No debug info