| URL: | http://www.downcc.com/soft/350689.html |
| Full analysis: | https://app.any.run/tasks/57797fe6-ea2b-430d-bea1-7c51beaec3cf |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | October 24, 2019, 17:25:18 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | E41F580E4220DF6F13CFEB57DAF71E15 |
| SHA1: | B2FBB03FF13DA9FFE46916E5C4C045BD391F9EF2 |
| SHA256: | DB49C4FDB414B9E167EE908FE771642F4076F71006E26BC7EFF41A1B2AA95B5A |
| SSDEEP: | 3:N1KJS4BLdIKN7QuUJ:Cc4BZI8Q7J |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 284 | regsvr32.exe /s /u C:\Users\admin\AppData\Roaming\finder\finder-search-shellext.dll | C:\Windows\system32\regsvr32.exe | — | Finder_Setup_4127703907_cml_001.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 3 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 292 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,2159112643125025180,2329015755391564346,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=4975188652086040841 --mojo-platform-channel-handle=3196 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 352 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 392 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,2159112643125025180,2329015755391564346,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=91952895460676360 --mojo-platform-channel-handle=3620 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 864 | C:\Windows\system32\svchost.exe -k netsvcs | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 920 | "C:\Users\admin\AppData\Roaming\ksrjzs\rjzscheck.exe" xxrun | C:\Users\admin\AppData\Roaming\ksrjzs\rjzscheck.exe | explorer.exe | ||||||||||||
User: admin Company: 上海萌格电子商务有限公司 Integrity Level: MEDIUM Description: 快速软件助手 Exit code: 0 Version: 1.0 Modules
| |||||||||||||||
| 940 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,2159112643125025180,2329015755391564346,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=2324600066433553403 --mojo-platform-channel-handle=2984 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 976 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,2159112643125025180,2329015755391564346,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14192645804768826165 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1024 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,2159112643125025180,2329015755391564346,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=8642545473014503523 --mojo-platform-channel-handle=3148 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1024 | "C:\Program Files\WanNengZip\WnZipVirtualCD.exe" /install | C:\Program Files\WanNengZip\WnZipVirtualCD.exe | WnZipUtility.exe | ||||||||||||
User: admin Company: www.wn51.com Integrity Level: HIGH Description: 虚拟光盘 Exit code: 0 Version: 1.0.0.11031 Modules
| |||||||||||||||
| (PID) Process: | (352) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2424) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 1928-13216411534241125 |
Value: 259 | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (1928) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 1512-13197841398593750 |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\cd61bf94-3d87-4060-b0f9-b2b65163cae2.tmp | — | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp | — | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old | — | |
MD5:— | SHA256:— | |||
| 864 | svchost.exe | C:\Windows\appcompat\programs\RecentFileCache.bcf | txt | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old | text | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 | — | |
MD5:— | SHA256:— | |||
| 1928 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2184 | chrome.exe | GET | 200 | 47.75.61.68:80 | http://www.downcc.com/inc/downcc.js | US | text | 15.2 Kb | malicious |
2184 | chrome.exe | GET | 200 | 47.75.61.68:80 | http://www.downcc.com/inc/SoftLinkType.js | US | text | 1.25 Kb | malicious |
2184 | chrome.exe | GET | 200 | 47.75.61.68:80 | http://www.downcc.com/statics/js/down.js | US | html | 3.25 Kb | malicious |
2184 | chrome.exe | GET | 200 | 47.75.61.68:80 | http://www.downcc.com/js/main.js | US | text | 21.8 Kb | malicious |
2184 | chrome.exe | GET | 200 | 175.100.207.232:80 | http://pv.sohu.com/cityjson | HK | text | 84 b | malicious |
2184 | chrome.exe | GET | 200 | 47.75.61.68:80 | http://www.downcc.com/statics/jquery.js | US | text | 90.3 Kb | malicious |
2184 | chrome.exe | GET | 301 | 47.75.61.68:80 | http://pic.downcc.com/upload/2017-10/20171081358148513.jpg | US | html | 169 b | malicious |
2184 | chrome.exe | GET | 200 | 47.75.61.68:80 | http://www.downcc.com/skin/gr/images/c_bad.png | US | image | 521 b | malicious |
2184 | chrome.exe | GET | 301 | 47.75.61.68:80 | http://pic.downcc.com/skin/img/pdf.jpg | US | html | 169 b | malicious |
2184 | chrome.exe | GET | 301 | 47.75.61.68:80 | http://pic.downcc.com/upload/2018-1/20181221414303307.jpg | US | html | 169 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2184 | chrome.exe | 172.217.18.99:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
2184 | chrome.exe | 216.58.205.237:443 | accounts.google.com | Google Inc. | US | whitelisted |
2184 | chrome.exe | 47.75.61.68:80 | www.downcc.com | — | US | unknown |
2184 | chrome.exe | 216.58.208.36:443 | www.google.com | Google Inc. | US | whitelisted |
2184 | chrome.exe | 175.100.207.232:80 | pv.sohu.com | ISP | HK | malicious |
2184 | chrome.exe | 113.96.178.35:443 | cpro.baidustatic.com | No.31,Jin-rong Street | CN | suspicious |
2184 | chrome.exe | 61.184.202.19:80 | pic.xiazaicc.com | No.31,Jin-rong Street | CN | unknown |
2184 | chrome.exe | 216.58.208.35:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
2184 | chrome.exe | 13.35.253.113:443 | jspassport.ssl.qhimg.com | — | US | suspicious |
2184 | chrome.exe | 143.204.214.25:443 | s.ssl.qhres.com | — | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
www.downcc.com |
| malicious |
accounts.google.com |
| shared |
pic.downcc.com |
| malicious |
www.google.com |
| malicious |
pv.sohu.com |
| malicious |
js.downcc.com |
| unknown |
cpro.baidustatic.com |
| whitelisted |
pic.xiazaicc.com |
| malicious |
ssl.gstatic.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2184 | chrome.exe | Misc activity | SUSPICIOUS [PTsecurity] sohu.com External IP Check |
2184 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3388 | 货币银行学易纲最新版_143_350689.exe | Misc activity | SUSPICIOUS [PTsecurity] External IP Check |
3388 | 货币银行学易纲最新版_143_350689.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2692 | 货币银行学易纲最新版_143_350689.exe | Misc activity | ADWARE [PTsecurity] Softcnapp.J PUP |
2692 | 货币银行学易纲最新版_143_350689.exe | Misc activity | ADWARE [PTsecurity] PUA.Softcnapp payload |
2692 | 货币银行学易纲最新版_143_350689.exe | Misc activity | ADWARE [PTsecurity] Softcnapp.J PUP |
2692 | 货币银行学易纲最新版_143_350689.exe | Misc activity | ADWARE [PTsecurity] PUA.Softcnapp payload |
3592 | 1106.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3592 | 1106.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
货币银行学易纲最新版_143_350689.exe | DownloadApp_begin |
iPDFSetup_V1015.exe | error At "CWMIInterface Construction CoInitializeEx" |
ReaderTransSvr.exe | C:\Windows\TEMP\Sea843F.tmp |
ReaderTransSvr.exe | C:\Users\admin\AppData\Roaming\iPDF\SearchIndexTable.sqlite |
ReaderTransSvr.exe | C:\Users\admin\AppData\Roaming\iPDF\SearchIndexTable.sqlitetmp |
ReaderTransSvr.exe | C:\Users\admin\AppData\Roaming\iPDF\SearchIndexTable.sqlite |
ReaderTransSvr.exe | C:\Users\admin\AppData\Roaming\iPDF\SearchIndexTable.sqlitetmp |
ReaderTransSvr.exe | ReopenDataFile |
ReaderTransSvr.exe | C:\Windows\TEMP\Sea843F.tmp |
Services.exe | nTimes = 0 |