File name:

GLP_installer_900223152_com.activision.callofduty.shooter.exe

Full analysis: https://app.any.run/tasks/bb6ea961-93b9-4dec-a011-a1a89792c49e
Verdict: Malicious activity
Analysis date: November 21, 2023, 03:30:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

14C596C34978661885FF79F0D5CF24D0

SHA1:

5D52C3C5B4D07210FE68FED0B3FF6B24BF31C4EE

SHA256:

DD4BD8A2097D961A5FAB0F266F4F53C5131364BBEA4C8E66E42BCAE87B9DE04D

SSDEEP:

98304:IcSfQTi10+AVvro5MSdv9b6fZP0m6A16NJP2O752jGWMDmkQT479D8gPAO8yaDQT:C4ha

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • wmpf_installer.exe (PID: 2040)
      • Market.exe (PID: 3936)
      • TInst.exe (PID: 4060)
    • Creates a writable file in the system directory

      • QMEmulatorService.exe (PID: 3740)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • TInst.exe (PID: 4060)
      • cef_frame_render.exe (PID: 3212)
      • AppMarket.exe (PID: 3824)
    • Reads the Internet Settings

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • WMIC.exe (PID: 2484)
      • AppMarket.exe (PID: 3824)
    • Process drops legitimate windows executable

      • Market.exe (PID: 3936)
      • TInst.exe (PID: 4060)
    • The process drops C-runtime libraries

      • Market.exe (PID: 3936)
      • TInst.exe (PID: 4060)
    • Executes as Windows Service

      • QMEmulatorService.exe (PID: 3740)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • TInst.exe (PID: 4060)
    • Uses WMIC.EXE to obtain computer system information

      • PcyybAssistant.exe (PID: 1420)
    • Reads the BIOS version

      • AppMarket.exe (PID: 3824)
    • Reads security settings of Internet Explorer

      • AppMarket.exe (PID: 3824)
    • Checks Windows Trust Settings

      • AppMarket.exe (PID: 3824)
  • INFO

    • Checks supported languages

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • wmpnscfg.exe (PID: 3412)
      • Market.exe (PID: 3936)
      • TInst.exe (PID: 4060)
      • QMEmulatorService.exe (PID: 3740)
      • AppMarket.exe (PID: 3824)
      • PcyybAssistant.exe (PID: 1420)
      • wmpf_installer.exe (PID: 2040)
      • cef_frame_render.exe (PID: 3052)
      • cef_frame_render.exe (PID: 3432)
      • cef_frame_render.exe (PID: 3212)
      • syzs_dl_svr.exe (PID: 3148)
      • cef_frame_render.exe (PID: 3724)
    • Creates files or folders in the user directory

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • TInst.exe (PID: 4060)
      • PcyybAssistant.exe (PID: 1420)
      • cef_frame_render.exe (PID: 3212)
      • wmpf_installer.exe (PID: 2040)
      • AppMarket.exe (PID: 3824)
    • Reads the machine GUID from the registry

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • wmpnscfg.exe (PID: 3412)
      • TInst.exe (PID: 4060)
      • AppMarket.exe (PID: 3824)
      • wmpf_installer.exe (PID: 2040)
      • syzs_dl_svr.exe (PID: 3148)
      • cef_frame_render.exe (PID: 3212)
    • Reads the computer name

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • wmpnscfg.exe (PID: 3412)
      • Market.exe (PID: 3936)
      • TInst.exe (PID: 4060)
      • QMEmulatorService.exe (PID: 3740)
      • wmpf_installer.exe (PID: 2040)
      • syzs_dl_svr.exe (PID: 3148)
      • AppMarket.exe (PID: 3824)
      • cef_frame_render.exe (PID: 3052)
      • cef_frame_render.exe (PID: 3212)
    • Create files in a temporary directory

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • TInst.exe (PID: 4060)
      • AppMarket.exe (PID: 3824)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3412)
      • taskmgr.exe (PID: 3756)
      • chrome.exe (PID: 3644)
    • Creates files in the program directory

      • GLP_installer_900223152_com.activision.callofduty.shooter.exe (PID: 3508)
      • TInst.exe (PID: 4060)
      • QMEmulatorService.exe (PID: 3740)
      • syzs_dl_svr.exe (PID: 3148)
      • AppMarket.exe (PID: 3824)
    • Dropped object may contain TOR URL's

      • Market.exe (PID: 3936)
      • TInst.exe (PID: 4060)
    • Process checks computer location settings

      • cef_frame_render.exe (PID: 3432)
    • Checks proxy server information

      • AppMarket.exe (PID: 3824)
    • Reads product name

      • AppMarket.exe (PID: 3824)
    • Reads Windows Product ID

      • AppMarket.exe (PID: 3824)
    • Application launched itself

      • chrome.exe (PID: 3644)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 3644)
    • The process uses the downloaded file

      • chrome.exe (PID: 4112)
      • chrome.exe (PID: 4468)
    • Reads Environment values

      • AppMarket.exe (PID: 3824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:20 00:21:33+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 2604544
InitializedDataSize: 1132544
UninitializedDataSize: -
EntryPoint: 0x220be4
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Tencent
FileDescription: Tencent Game Downloader
FileVersion: 1, 0, 0, 1
InternalName: TGBDownloader.exe
LegalCopyright: Copyright ? 2020 Tencent. All Rights Reserved.
OriginalFileName: TGBDownloader.exe
ProductName: Tencent Game Downloader
ProductVersion: 1, 0, 0, 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
117
Monitored processes
61
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start glp_installer_900223152_com.activision.callofduty.shooter.exe wmpnscfg.exe no specs taskmgr.exe no specs market.exe no specs tinst.exe qmemulatorservice.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs appmarket.exe pcyybassistant.exe no specs wmpf_installer.exe wmic.exe no specs syzs_dl_svr.exe cef_frame_render.exe no specs cef_frame_render.exe cef_frame_render.exe no specs systeminfo.exe no specs cef_frame_render.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs glp_installer_900223152_com.activision.callofduty.shooter.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
296"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="QQExternal" dir=in program="c:\program files\txgameassistant\appmarket\QQExternal.exe" action=allowC:\Windows\System32\netsh.exeTInst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
564systeminfoC:\Windows\System32\systeminfo.exeAppMarket.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Displays system information
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\systeminfo.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
564"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3924 --field-trial-handle=808,i,17727809246691282123,7949657409312029582,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
588"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="GameDownload" dir=in program="c:\program files\txgameassistant\appmarket\GameDownload.exe" action=allowC:\Windows\System32\netsh.exeTInst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
948"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=808,i,17727809246691282123,7949657409312029582,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
984"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4876 --field-trial-handle=808,i,17727809246691282123,7949657409312029582,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1032"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TInst" dir=in program="c:\program files\txgameassistant\appmarket\TInst.exe" action=allowC:\Windows\System32\netsh.exeTInst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1064"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3164 --field-trial-handle=808,i,17727809246691282123,7949657409312029582,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1236"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1504 --field-trial-handle=808,i,17727809246691282123,7949657409312029582,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1272"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4776 --field-trial-handle=808,i,17727809246691282123,7949657409312029582,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
25 320
Read events
24 454
Write events
863
Delete events
3

Modification events

(PID) Process:(3508) GLP_installer_900223152_com.activision.callofduty.shooter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
Explorer.EXE
(PID) Process:(3412) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{AB0C745B-1685-4A70-939A-1A5835A87073}\{FC65D7E0-E2D3-4A08-90C0-A600DF3E1EF1}
Operation:delete keyName:(default)
Value:
(PID) Process:(3412) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{AB0C745B-1685-4A70-939A-1A5835A87073}
Operation:delete keyName:(default)
Value:
(PID) Process:(3412) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{198E0182-290A-42EC-9EA3-03409C947D4E}
Operation:delete keyName:(default)
Value:
(PID) Process:(3508) GLP_installer_900223152_com.activision.callofduty.shooter.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3508) GLP_installer_900223152_com.activision.callofduty.shooter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3508) GLP_installer_900223152_com.activision.callofduty.shooter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3508) GLP_installer_900223152_com.activision.callofduty.shooter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3508) GLP_installer_900223152_com.activision.callofduty.shooter.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3756) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
Operation:writeName:UsrColumnSettings
Value:
1C0C0000340400000000000050000000010000001D0C0000350400000000000023000000010000001E0C000036040000000000003C000000010000001F0C000039040000000000004E00000001000000200C000037040000000000004E00000001000000
Executable files
261
Suspicious files
410
Text files
1 963
Unknown types
0

Dropped files

PID
Process
Filename
Type
3508GLP_installer_900223152_com.activision.callofduty.shooter.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Market.exe
MD5:
SHA256:
3936Market.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Setup\aowgameex2.datbinary
MD5:CC7EDFEA17A7F3ADA792B9BFDC64A494
SHA256:8ED433D43AB86EE882F490580B1950E1E43CF00B79DCB7F299CA560BA52DA9E5
3936Market.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Setup\androws_logo.pngimage
MD5:022FC5C29D8CF5EC7ABE4EAE57E5E311
SHA256:88DCCC3165B30052117C4FB9A17D8BD08AE014C8D6EC65366331FC078ABB54AC
3508GLP_installer_900223152_com.activision.callofduty.shooter.exeC:\Users\admin\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.dbtext
MD5:8CDD2558D98B4A8E924575F8C97B7475
SHA256:11C9004AEDA5FA30E4F03083546DEE226DB390CCBCEB7CC2D7F9F9B0CD8A1065
3508GLP_installer_900223152_com.activision.callofduty.shooter.exeC:\test.tmpbinary
MD5:8C332DEE6FAB66071BB1600702AD58DF
SHA256:33BFD1D8901E690C659407FAD5F60F0DC98E05619E66DE42946EAD9C4B8C9573
3936Market.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Setup\AECommonDll.dllexecutable
MD5:797256461980B4D17CE34A6F2516F11D
SHA256:98C333D0BDAE9325311DA7E6A8C2E1D84C135D631FF6C403AABEFBA0AAC8FA85
3936Market.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Setup\AowGame.xmltext
MD5:2298FD5F08A88E6B3473EC4829B03D6C
SHA256:442B7CA43B2E97397D8A9B7E69C088932DEA549F6C31547D29958EFC3BBB9E21
3936Market.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Setup\AndrowsInstaller.exeexecutable
MD5:83D5EF931931B7E387EFEC4C23FA5D21
SHA256:8A880EFEA0429E4415941874CCDF17BEFCD936B2BDCFF6CF2CEEE0DE7FCA8F14
3508GLP_installer_900223152_com.activision.callofduty.shooter.exeC:\Users\admin\AppData\Local\Tencent\TxGameAssistant\TGBDownloader\dr.dllexecutable
MD5:2814ACBD607BA47BDBCDF6AC3076EE95
SHA256:5904A7E4D97EEAC939662C3638A0E145F64FF3DD0198F895C4BF0337595C6A67
3936Market.exeC:\Temp\TxGameDownload\Component\AppMarket\b7daf5d38e9a5cbc589db6bc7e9824d9\Setup\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:6A35A52D536E34BA060A19D06B1DAC80
SHA256:A369EF130749BF8CD9F67055179E6F537F200C060AF47493D49473912A95021E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
413
DNS requests
338
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
484
lsass.exe
GET
200
47.246.48.205:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAv2rDnwXbyWY1vQhu%2Fbuao%3D
unknown
binary
471 b
unknown
484
lsass.exe
GET
200
67.27.159.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c06f5c0780293fe1
unknown
compressed
4.66 Kb
unknown
484
lsass.exe
GET
200
151.101.2.133:80
http://ocsp2.globalsign.com/gsorganizationvalsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSVLM6m9XSaK2pXyc357yFJVjgNwQQUaIa4fXrZbUlrhy8YixU0bNe0eg4CDG5N%2BmMQwoBRs0mcUQ%3D%3D
unknown
binary
1.43 Kb
unknown
484
lsass.exe
GET
200
47.246.48.205:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbJNRrm8KxusAb7DCqnMkE%3D
unknown
binary
471 b
unknown
3824
AppMarket.exe
POST
200
43.154.254.18:80
http://masterconn.qq.com/q.cgi
unknown
binary
155 b
unknown
3824
AppMarket.exe
GET
200
47.246.48.205:80
http://ocsp.digicert.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQhnxEBNL9LgIhfSsTcHsrTt204QgQURNnISjOO01KNp5KUYR%2BayKW37MsCEAb%2BPRd4bXW8gjafag2DOXk%3D
unknown
der
471 b
unknown
484
lsass.exe
GET
200
67.27.159.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?440741f4bd306e5a
unknown
compressed
4.66 Kb
unknown
484
lsass.exe
GET
200
151.101.2.133:80
http://ocsp.globalsign.com/rootr1/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDkcHsQGaDFetObPhfan5
unknown
binary
1.41 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3508
GLP_installer_900223152_com.activision.callofduty.shooter.exe
157.255.4.39:443
master.etl.desktop.qq.com
China Unicom Guangdong IP network
CN
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
3508
GLP_installer_900223152_com.activision.callofduty.shooter.exe
101.33.47.68:8081
oth.eve.mdt.qq.com
Tencent Building, Kejizhongyi Avenue
SG
unknown
3508
GLP_installer_900223152_com.activision.callofduty.shooter.exe
49.51.131.79:443
unifiedaccess.gameloop.com
Tencent Building, Kejizhongyi Avenue
DE
unknown
3508
GLP_installer_900223152_com.activision.callofduty.shooter.exe
43.152.44.160:443
down.gameloop.com
ACE
DE
unknown
4060
TInst.exe
43.152.26.154:443
down.gameloop.com
ACE
DE
unknown
4060
TInst.exe
43.152.26.142:443
down.gameloop.com
ACE
DE
unknown

DNS requests

Domain
IP
Reputation
master.etl.desktop.qq.com
  • 157.255.4.39
whitelisted
oth.eve.mdt.qq.com
  • 101.33.47.68
  • 101.33.47.206
unknown
unifiedaccess.gameloop.com
  • 49.51.131.79
  • 49.51.129.71
  • 150.109.28.234
  • 150.109.28.54
unknown
down.gameloop.com
  • 43.152.44.160
  • 43.152.26.197
  • 43.152.26.142
  • 43.152.26.58
  • 43.152.26.154
  • 43.152.26.151
  • 43.152.26.221
  • 43.152.26.104
unknown
webapp.gameloop.com
  • 43.152.26.154
  • 43.152.44.160
  • 43.152.26.104
  • 43.152.26.197
  • 43.152.26.58
  • 43.152.26.151
  • 43.152.26.221
  • 43.152.26.142
unknown
masterconn11.qq.com
  • 157.255.4.39
whitelisted
dldir1.qq.com
  • 116.148.161.178
  • 123.234.2.67
  • 116.136.170.200
  • 113.59.44.92
  • 119.167.147.187
  • 116.136.170.130
  • 119.167.147.208
whitelisted
sy.guanjia.qq.com
  • 121.14.78.51
  • 121.14.76.247
  • 121.14.76.43
whitelisted
masterconn.qq.com
  • 43.154.254.18
whitelisted
ctldl.windowsupdate.com
  • 67.27.159.254
  • 8.241.11.254
  • 8.238.191.126
  • 67.27.157.254
  • 8.241.9.126
whitelisted

Threats

No threats detected
Process
Message
GLP_installer_900223152_com.activision.callofduty.shooter.exe
Standard VGA Graphics Adapter
AppMarket.exe
[Downloader] GetLogicalDrives 4
AppMarket.exe
[Downloader] DriverType C: = 3
AppMarket.exe
[Downloader] GetLogicalDrives 4
AppMarket.exe
[Downloader] DriverType C: = 3