File name:

com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe

Full analysis: https://app.any.run/tasks/9e5d431c-d28c-4323-9c13-483ac9f353a6
Verdict: Malicious activity
Analysis date: September 16, 2020, 19:26:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

ABED41B3B60EB1D9348E9BF66DA294DF

SHA1:

8574851B18D4133FD06C477E20F5AA2ED9767DCB

SHA256:

C0AC94A4B322299F8C66705B3960D00861EE8D6463C456078674B5212FBCA6E0

SSDEEP:

196608:NRH5KNqlUgN7AktVweDO+oPG5eWWi/zio/i:02O+o+wWrX/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • TenioDL.exe (PID: 1084)
      • QMEmulatorService.exe (PID: 1584)
      • AppMarket.exe (PID: 2812)
      • TBSWebRenderer.exe (PID: 1008)
      • GameDownload.exe (PID: 1676)
    • Application was dropped or rewritten from another process

      • TenioDL.exe (PID: 1084)
      • QMEmulatorService.exe (PID: 1584)
      • Tinst.exe (PID: 2064)
      • AppMarket.exe (PID: 2812)
      • syzs_dl_svr.exe (PID: 2880)
      • GameDownload.exe (PID: 1676)
      • TBSWebRenderer.exe (PID: 1008)
    • Adds new firewall rule via NETSH.EXE

      • Tinst.exe (PID: 2064)
    • Changes settings of System certificates

      • AppMarket.exe (PID: 2812)
      • GameDownload.exe (PID: 1676)
    • Actions looks like stealing of personal data

      • AppMarket.exe (PID: 2812)
  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • QMEmulatorService.exe (PID: 1584)
      • AppMarket.exe (PID: 2812)
      • GameDownload.exe (PID: 1676)
    • Creates files in the user directory

      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • TenioDL.exe (PID: 1084)
      • Tinst.exe (PID: 2064)
      • AppMarket.exe (PID: 2812)
    • Uses ICACLS.EXE to modify access control list

      • TenioDL.exe (PID: 1084)
    • Executable content was dropped or overwritten

      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • Tinst.exe (PID: 2064)
      • Market.exe (PID: 1708)
    • Reads Internet Cache Settings

      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • GameDownload.exe (PID: 1676)
    • Executed as Windows Service

      • QMEmulatorService.exe (PID: 1584)
    • Creates files in the program directory

      • QMEmulatorService.exe (PID: 1584)
      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • Tinst.exe (PID: 2064)
      • AppMarket.exe (PID: 2812)
      • syzs_dl_svr.exe (PID: 2880)
    • Uses NETSH.EXE for network configuration

      • Tinst.exe (PID: 2064)
      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
    • Creates files in the Windows directory

      • QMEmulatorService.exe (PID: 1584)
    • Modifies the open verb of a shell class

      • Tinst.exe (PID: 2064)
    • Creates a software uninstall entry

      • Tinst.exe (PID: 2064)
    • Adds / modifies Windows certificates

      • AppMarket.exe (PID: 2812)
      • GameDownload.exe (PID: 1676)
  • INFO

    • Reads the hosts file

      • com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe (PID: 1852)
      • AppMarket.exe (PID: 2812)
      • GameDownload.exe (PID: 1676)
    • Reads settings of System Certificates

      • AppMarket.exe (PID: 2812)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:05 05:15:32+02:00
PEType: PE32
LinkerVersion: 14
CodeSize: 1325056
InitializedDataSize: 8373248
UninitializedDataSize: -
EntryPoint: 0x9d6db
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 11.0.16777.224
ProductVersionNumber: 11.0.16777.224
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Tencent
FileDescription: Tencent Gaming Buddy - Install
FileVersion: 11.0.16777.224
InternalName: GameDownload
LegalCopyright: Copyright © 2017 Tencent. All Rights Reserved.
OriginalFileName: GameDownload.exe
ProductName: Tencent Gaming Buddy
ProductVersion: 11,0,16777,224

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 05-Jul-2019 03:15:32
Detected languages:
  • Chinese - PRC
  • English - United States
Debug artifacts:
  • D:\Devops\agent\workspace\p-8a453db8192f4c9bad1a0cd31d8dbbda\src\svn\Client\Output\Binfinal\GameDownload\GameDownload.pdb
CompanyName: Tencent
FileDescription: Tencent Gaming Buddy - Install
FileVersion: 11.0.16777.224
InternalName: GameDownload
LegalCopyright: Copyright © 2017 Tencent. All Rights Reserved.
OriginalFilename: GameDownload.exe
ProductName: Tencent Gaming Buddy
ProductVersion: 11,0,16777,224

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000138

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 8
Time date stamp: 05-Jul-2019 03:15:32
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x001436BE
0x00143800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.53958
.rdata
0x00145000
0x0005C3E8
0x0005C400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.99618
.data
0x001A2000
0x00006434
0x00004600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.75872
.gfids
0x001A9000
0x000003EC
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.97234
.tls
0x001AA000
0x00000009
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.0203931
.QMGuid
0x001AB000
0x00000014
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x001AC000
0x007867E8
0x00786800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.42496
.reloc
0x00933000
0x000129D4
0x00012A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.6543

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.89623
392
UNKNOWN
English - United States
RT_MANIFEST
2
2.89005
744
UNKNOWN
Chinese - PRC
RT_ICON
3
2.54353
296
UNKNOWN
Chinese - PRC
RT_ICON
4
4.35478
3752
UNKNOWN
Chinese - PRC
RT_ICON
5
5.17501
2216
UNKNOWN
Chinese - PRC
RT_ICON
6
3.47748
1384
UNKNOWN
Chinese - PRC
RT_ICON
7
3.0167
150
UNKNOWN
Chinese - PRC
RT_STRING
8
2.12138
68
UNKNOWN
Chinese - PRC
RT_STRING
9
4.05874
1128
UNKNOWN
Chinese - PRC
RT_ICON
10
0.867269
38
UNKNOWN
Chinese - PRC
RT_STRING

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
IMM32.dll
IPHLPAPI.DLL
KERNEL32.dll
NETAPI32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll

Exports

Title
Ordinal
Address
curl_easy_cleanup
1
0x00067C80
curl_easy_duphandle
2
0x00067CA0
curl_easy_escape
3
0x000921E0
curl_easy_getinfo
4
0x00067E80
curl_easy_init
5
0x00067EA0
curl_easy_pause
6
0x00067EE0
curl_easy_perform
7
0x00068000
curl_easy_recv
8
0x000680F0
curl_easy_reset
9
0x00068140
curl_easy_send
10
0x000681F0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
19
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start com.tencent.ig$100103$abed41b3b60eb1d9348e9bf66da294df$_specialpackage_190.exe teniodl.exe icacls.exe no specs market.exe tinst.exe qmemulatorservice.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs appmarket.exe netsh.exe no specs syzs_dl_svr.exe tbswebrenderer.exe gamedownload.exe netsh.exe no specs com.tencent.ig$100103$abed41b3b60eb1d9348e9bf66da294df$_specialpackage_190.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1008"C:\Program Files\txgameassistant\appmarket\TBSWebRenderer.exe" --type=renderer --enable-smooth-scrolling --force-device-scale-factor=1.00 --no-sandbox --enable-begin-frame-scheduling --client-id=TGB_Market --primordial-pipe-token=27673A08CC010EE271F061E791871997 --user-agent-extra="TGBSdk/3.9.0 Tencent AppMarket/3.11.726.100" --lang=en-US --lang=en-US --log-file="C:\Program Files\txgameassistant\appmarket\debug.log" --dummy-exception-handler --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=95E9C701F252717D98AA35474BED90B1 --mojo-application-channel-token=27673A08CC010EE271F061E791871997 --channel="2812.0.1243181814\1963815806" --fix-fasa --mojo-platform-channel-handle=2848 /prefetch:1C:\Program Files\txgameassistant\appmarket\TBSWebRenderer.exe
AppMarket.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
TBSWebRenderer
Exit code:
0
Version:
3.11.726.100
Modules
Images
c:\program files\txgameassistant\appmarket\tbswebrenderer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\txgameassistant\appmarket\minicorelib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1084C:\Users\admin\AppData\Roaming\Tencent\TxGameAssistant\GameDownload\TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\TxGameAssistant\GameDownload\TenioDL.exe
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
腾讯游戏云加速下载引擎(旋风Inside)
Exit code:
0
Version:
2, 0, 15, 26
Modules
Images
c:\users\admin\appdata\roaming\tencent\txgameassistant\gamedownload\teniodl.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\imm32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1252"C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器组件"C:\Windows\system32\Netsh.execom.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1508"C:\Windows\System32\icacls.exe" C:\Users\admin\AppData\Roaming\Tencent\Config\ /t /setintegritylevel lowC:\Windows\System32\icacls.exeTenioDL.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
1584"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe
services.exe
User:
SYSTEM
Company:
Tencent
Integrity Level:
SYSTEM
Description:
腾讯手游助手
Exit code:
0
Version:
3.11.726.100
Modules
Images
c:\program files\txgameassistant\appmarket\qmemulatorservice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1676"C:\Program Files\TxGameAssistant\AppMarket\GameDownload.exe" -component -noupdate -from appmark -notiywnd 196978 -pkg com.tencent.ig -vdiver aow_44 -downspeedlimit 0 -no_install_vdi -no_install_vdi44 -no_install_vbox -install_aow_rootfs -aeparam -engine aow -aeparamendC:\Program Files\TxGameAssistant\AppMarket\GameDownload.exe
AppMarket.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Gameloop - Install
Exit code:
0
Version:
3.11.726.100
Modules
Images
c:\program files\txgameassistant\appmarket\gamedownload.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\psapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
1708"C:\Temp\TxGameDownload\Component\AppMarket\Market.exe" C:\Temp\TxGameDownload\Component\AppMarket\Market.exe
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\temp\txgamedownload\component\appmarket\market.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1852"C:\Users\admin\AppData\Local\Temp\com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe" C:\Users\admin\AppData\Local\Temp\com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
explorer.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Tencent Gaming Buddy - Install
Exit code:
0
Version:
11.0.16777.224
Modules
Images
c:\users\admin\appdata\local\temp\com.tencent.ig$100103$abed41b3b60eb1d9348e9bf66da294df$_specialpackage_190.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\psapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
1920"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TUpdate" dir=in program="c:\program files\txgameassistant\appmarket\GF186\TUpdate.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2064"C:\Temp\TxGameDownload\Component\AppMarket\Setup\Tinst.exe" C:\Temp\TxGameDownload\Component\AppMarket\Setup\Tinst.exe
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
User:
admin
Integrity Level:
HIGH
Description:
TMarketInst
Exit code:
0
Version:
3.11.726.100
Modules
Images
c:\temp\txgamedownload\component\appmarket\setup\tinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
1 637
Read events
717
Write events
918
Delete events
2

Modification events

(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Tencent\MobileGamePC
Operation:writeName:SupplyId
Value:
100103
(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_CURRENT_USER\Software\Tencent\MobileGamePC
Operation:writeName:sf
Value:
C:\Temp\TxGameDownload\MobileGamePCShared
(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_CURRENT_USER\Software\Tencent\MobileGamePC
Operation:writeName:UserLanguage
Value:
en
(PID) Process:(1084) TenioDL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1084) TenioDL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1084) TenioDL.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\metnsd\clsid
Operation:writeName:SequenceID
Value:
D25DC2577E6C7C4BA1EFFA397F2C96DB
(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1852) com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
238
Suspicious files
143
Text files
1 686
Unknown types
108

Dropped files

PID
Process
Filename
Type
1852com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeC:\test.tmp
MD5:
SHA256:
1084TenioDL.exeC:\Users\admin\AppData\Local\Temp\etilqs_pwezoTPJN5wU6VU
MD5:
SHA256:
1084TenioDL.exeC:\Users\admin\AppData\Local\Temp\etilqs_tdh4q2a8Py3f0F9
MD5:
SHA256:
1084TenioDL.exeC:\Temp\TxGameDownload\Component\AppMarket\Market.exe.ttd
MD5:
SHA256:
1084TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\TenioDL\1502\cache\download.db-journal
MD5:
SHA256:
1852com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeC:\Users\admin\AppData\Local\Temp\Cab525C.tmp
MD5:
SHA256:
1852com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeC:\Users\admin\AppData\Local\Temp\Tar525D.tmp
MD5:
SHA256:
1084TenioDL.exeC:\Temp\TxGameDownload\Component\AppMarket\Market.exe
MD5:
SHA256:
1708Market.exeC:\Temp\TxGameDownload\Component\AppMarket\Setup\AowGame.xmltext
MD5:
SHA256:
1852com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A053CFB63FC8E6507871752236B5CCD5_BAF66407D863B465065B7E5475ADA340der
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
544
DNS requests
101
Threats
57

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1084
TenioDL.exe
GET
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
whitelisted
1084
TenioDL.exe
GET
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
whitelisted
1084
TenioDL.exe
GET
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
whitelisted
2812
AppMarket.exe
POST
200
203.205.239.243:80
http://masterconn.qq.com/q.cgi
CN
pi3
165 b
whitelisted
1084
TenioDL.exe
GET
206
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
binary
14.3 Mb
whitelisted
1084
TenioDL.exe
GET
206
2.16.186.75:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
binary
2.00 Mb
whitelisted
1084
TenioDL.exe
GET
206
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
binary
4.88 Mb
whitelisted
1084
TenioDL.exe
GET
206
2.16.186.75:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
binary
7.85 Mb
whitelisted
1084
TenioDL.exe
GET
206
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
binary
8.50 Mb
whitelisted
1084
TenioDL.exe
GET
206
2.16.186.104:80
http://dldir1.qq.com/syzs/oversea_component/Market_3.11.726.100.dat
unknown
binary
3.38 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1852
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
111.161.108.243:8000
p2pupgrade.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
1852
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
58.251.106.185:443
master.etl.desktop.qq.com
China Unicom Guangdong IP network
CN
malicious
1084
TenioDL.exe
111.161.108.243:8000
p2pupgrade.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
1084
TenioDL.exe
220.194.106.243:14309
config.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
1084
TenioDL.exe
220.194.108.75:8000
ps2.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
1084
TenioDL.exe
163.177.93.178:8000
stun.qqlive.qq.com
China Unicom Shenzen network
CN
unknown
163.177.93.177:8000
China Unicom Shenzen network
CN
unknown
45.92.228.15:20639
unknown
1852
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
203.205.253.140:80
syzs.qq.com
CN
suspicious
116.128.140.66:8000
CN
unknown

DNS requests

Domain
IP
Reputation
p2pupgrade.gamedl.qq.com
  • 111.161.108.243
  • 111.161.108.227
unknown
masterconn.qq.com
  • 203.205.239.243
whitelisted
master.etl.desktop.qq.com
  • 58.251.106.185
whitelisted
masterconn2.qq.com
  • 123.151.71.34
unknown
config.gamedl.qq.com
  • 220.194.106.243
  • 220.194.106.77
whitelisted
stat.gamedl.qq.com
  • 111.161.108.102
  • 111.161.108.43
  • 220.194.106.177
  • 220.194.106.140
  • 220.194.106.240
  • 111.161.108.18
unknown
stun.qqlive.qq.com
  • 163.177.93.178
  • 163.177.93.188
  • 163.177.93.245
  • 220.249.245.24
  • 220.249.245.138
suspicious
ps2.gamedl.qq.com
  • 220.194.108.75
  • 60.28.190.146
unknown
p2pupdate.gamedl.qq.com
  • 111.161.108.243
  • 111.161.108.227
unknown
syzs.qq.com
  • 203.205.253.140
  • 203.205.253.183
unknown

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA TLS error message encountered
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
Generic Protocol Command Decode
SURICATA TLS error message encountered
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
SURICATA TLS error message encountered
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
3 ETPRO signatures available at the full report
Process
Message
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
[Downloader] DriverType C: = 3
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
[Downloader] GetLogicalDrives 4
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
[Downloader] DriverType C: = 3
com.tencent.ig$100103$ABED41B3B60EB1D9348E9BF66DA294DF$_SpecialPackage_190.exe
[Downloader] DriverType C: = 3
AppMarket.exe
Standard VGA Graphics Adapter
AppMarket.exe
[0916/202817:INFO:exception_record.cc(518)] [QB]Process ID: 2812 Type: 1
TBSWebRenderer.exe
[0916/202820:INFO:exception_record.cc(518)] [QB]Process ID: 1008 Type: 2
GameDownload.exe
[Downloader] GetLogicalDrives 4
GameDownload.exe
[Downloader] GetLogicalDrives 4
GameDownload.exe
[Downloader] DriverType C: = 3