File name:

QQPCDownload_home_310053.exe

Full analysis: https://app.any.run/tasks/7c9127c1-9b69-4728-9612-2f50b817505e
Verdict: Malicious activity
Analysis date: April 23, 2024, 06:21:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

4964D7695E2EDC13E9D258105BA85063

SHA1:

F0011B4E1F547BCD42678D9F14966000F2AA9666

SHA256:

9000F28482BEB2BB343E1410BDF4EB4F42A0B524DEFB160E1D310D2F80EADA50

SSDEEP:

98304:cyfAY2verYf46nwRLk9qGmSpx8v8nWfj1jNva9zyNH9brAQyFr+PbpXA6daef5yj:KJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • QQPCDownload_home_310053.exe (PID: 2416)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • QQPCDownload_home_310053.exe (PID: 2416)
    • The process verifies whether the antivirus software is installed

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Reads settings of System Certificates

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Process requests binary or script from the Internet

      • QQPCDownload_home_310053.exe (PID: 2416)
  • INFO

    • Checks supported languages

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Create files in a temporary directory

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Creates files in the program directory

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Creates files or folders in the user directory

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Reads the computer name

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Reads the machine GUID from the registry

      • QQPCDownload_home_310053.exe (PID: 2416)
    • Reads the software policy settings

      • QQPCDownload_home_310053.exe (PID: 2416)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1970:01:06 19:56:48+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 393216
InitializedDataSize: 106496
UninitializedDataSize: -
EntryPoint: 0x13cb8
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.0.6.27
ProductVersionNumber: 2.0.6.27
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileDescription: 腾讯电脑管家在线安装程序
FileVersion: 2.0.6.27
LegalCopyright: Copyright (C) 1998 - 2018 Tencent. All Rights Reserved.
ProductName: 腾讯电脑管家
ProductVersion: 2.0.6.27
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start qqpcdownload_home_310053.exe qqpcdownload_home_310053.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1288"C:\Users\admin\AppData\Local\Temp\QQPCDownload_home_310053.exe" C:\Users\admin\AppData\Local\Temp\QQPCDownload_home_310053.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
腾讯电脑管家在线安装程序
Exit code:
3221226540
Version:
2.0.6.27
Modules
Images
c:\users\admin\appdata\local\temp\qqpcdownload_home_310053.exe
c:\windows\system32\ntdll.dll
2416"C:\Users\admin\AppData\Local\Temp\QQPCDownload_home_310053.exe" C:\Users\admin\AppData\Local\Temp\QQPCDownload_home_310053.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
腾讯电脑管家在线安装程序
Version:
2.0.6.27
Modules
Images
c:\users\admin\appdata\local\temp\qqpcdownload_home_310053.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
4 013
Read events
3 993
Write events
17
Delete events
3

Modification events

(PID) Process:(2416) QQPCDownload_home_310053.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2416) QQPCDownload_home_310053.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates
Operation:delete valueName:9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Value:
(PID) Process:(2416) QQPCDownload_home_310053.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
(PID) Process:(2416) QQPCDownload_home_310053.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
(PID) Process:(2416) QQPCDownload_home_310053.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\9F6134C5FA75E4FDDE631B232BE961D6D4B97DB6
Operation:writeName:Blob
Value:
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
Executable files
2
Suspicious files
3
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Roaming\tencent\QQPCMgr\Download\QQPCMgr_Setup.exe
MD5:
SHA256:
2416QQPCDownload_home_310053.exeC:\ProgramData\Tencent\DeskUpdate\GlobalMgr.dbtext
MD5:8CDD2558D98B4A8E924575F8C97B7475
SHA256:11C9004AEDA5FA30E4F03083546DEE226DB390CCBCEB7CC2D7F9F9B0CD8A1065
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Local\Temp\TencentDownload\~1bda01\setup.xmlxml
MD5:F02E931FB506F4333628E70BF293F7A6
SHA256:99F5802133241F98CB6DE44915055A4C0A0F7F702EC3F2BE1978484BAAABD4F9
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Local\Temp\TencentDownload\~1bda01\beacon_sdk.dllexecutable
MD5:573EC741BA9393C06292C329CA78E50C
SHA256:0118930D91B51E6E4DFEA02C4B81C152CBB848E227C02A1DCDC0909B167FDAD0
2416QQPCDownload_home_310053.exeC:\ProgramData\Tencent\DeskUpdate\Guid.dbtext
MD5:2AC1F87114E7539F0B64AAF4BC7F7185
SHA256:B25764CD4587517E37ADAB7400D731DD369BA2BF3AF887534F7C0A131705609C
2416QQPCDownload_home_310053.exeC:\ProgramData\Tencent\DeskUpdate\GuidReport.dattext
MD5:6A84643077F08F59EA457F53F653388A
SHA256:B63B5B11E3827ED7D8E6172A6863238ACA1B60C0B1AD829E5EB3E5532A247A8B
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Local\Temp\DB97.tmpbinary
MD5:B863D416FED15A11A210929DF96C336D
SHA256:62171771DDCA42946F012680F9C85DA263B5EB9AA72C5FF4B5DEC33010D4A905
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Roaming\Tencent\QQPCMgr\Download\versiontext
MD5:17B9EE62C39A71847413E116CB9B34C7
SHA256:8E3907E000A92A62534E7F740D744EE5AEF103E90C6F9446190CD8F176089176
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.dbtext
MD5:6EC4FC4BC8278AB2D4975104D579AABE
SHA256:413C8AFC89C197E1A0B801B66EDCD5A837BD6D9B4C771FE003D1D35051B93E6C
2416QQPCDownload_home_310053.exeC:\Users\admin\AppData\Roaming\Tencent\beacon\bc_0WIN0DJ6VL4UY2KW_09.db-journalbinary
MD5:7380BA0EC5F0D68FE8D81D65D0E392F2
SHA256:09BFF822918DF8EB24E7660B6DF725289C327A59D6F0AEA10A8A9A6839322040
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
51
DNS requests
16
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2416
QQPCDownload_home_310053.exe
GET
200
43.135.106.117:80
http://c.gj.qq.com/fcgi-bin/downurlquery?id=310053&guid=QN2U1b7Dzh7mpexpBaSMgwCHmWvsNcmd85%2BhSySW6hQQtIqhlF3/4kJePT22Tx/n&ver=15.10.10335.201
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
200
43.135.106.184:80
http://c.gj.qq.com/packconfig?serviceid=2230&clientver=1000&gjguid=11f1295c9e6d3008bd3f9e1362c96ff5&check=6364593&livetime=0
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
122.189.171.103:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
122.189.171.103:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
122.189.171.103:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
122.189.171.103:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
122.189.171.103:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
116.131.226.145:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
2416
QQPCDownload_home_310053.exe
GET
116.131.226.145:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/versetup/update/PCMgr_Setup_169_24712_211.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2416
QQPCDownload_home_310053.exe
157.255.4.39:443
master.etl.desktop.qq.com
China Unicom Guangdong IP network
CN
unknown
2416
QQPCDownload_home_310053.exe
43.135.106.184:80
c.gj.qq.com
Tencent Building, Kejizhongyi Avenue
HK
unknown
2416
QQPCDownload_home_310053.exe
43.135.106.117:80
c.gj.qq.com
Tencent Building, Kejizhongyi Avenue
HK
unknown
2416
QQPCDownload_home_310053.exe
101.33.47.68:8081
oth.eve.mdt.qq.com
Tencent Building, Kejizhongyi Avenue
SG
unknown
2416
QQPCDownload_home_310053.exe
101.33.47.206:8081
oth.eve.mdt.qq.com
Tencent Building, Kejizhongyi Avenue
SG
unknown
2416
QQPCDownload_home_310053.exe
122.189.171.103:80
dlied6.qq.com
CHINA UNICOM China169 Backbone
CN
unknown

DNS requests

Domain
IP
Reputation
c.gj.qq.com
  • 43.135.106.184
  • 43.135.106.117
unknown
master.etl.desktop.qq.com
  • 157.255.4.39
whitelisted
oth.eve.mdt.qq.com
  • 101.33.47.68
  • 101.33.47.206
unknown
dlied6.qq.com
  • 122.189.171.103
  • 122.189.171.73
  • 119.167.147.66
  • 39.91.183.123
  • 116.131.226.145
  • 58.251.60.36
  • 116.153.60.30
  • 58.144.226.104
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info