| File name: | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4 |
| Full analysis: | https://app.any.run/tasks/d1bcc042-1e1d-4a13-9809-c1429d248fa3 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 07, 2021, 16:20:54 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 0C06AA5D2E5DC1B7D54F0C05392CDC3F |
| SHA1: | 13AEE7EA4DA5EA3D3B183C7B3CE9AF0C4EE7D1B5 |
| SHA256: | DE6A53A96906D5549AB0F4DDB4168E4C7C4DE5FABA46B1C3084DF5A19C3EDBE4 |
| SSDEEP: | 24576:gr4L99NOUNcWivc+HBbEzppIdju6e1D9XBG9KuBFdz:y4VOUNcTvc+ezppss1dBG9Kujdz |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2021:04:23 11:27:32+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 14.16 |
| CodeSize: | 876544 |
| InitializedDataSize: | 28672 |
| UninitializedDataSize: | 1347584 |
| EntryPoint: | 0x21fb70 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.2.0.8 |
| ProductVersionNumber: | 3.2.0.8 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| CompanyName: | - |
| FileDescription: | |
| FileVersion: | 3.2.0.8 |
| InternalName: | FastDownloader.exe |
| LegalCopyright: | Copyright (C) 2018 |
| OriginalFileName: | FastDownloader.exe |
| ProductName: | 软件下载器 |
| ProductVersion: | 3.2.0.8 |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 23-Apr-2021 09:27:32 |
| Detected languages: |
|
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 3.2.0.8 |
| InternalName: | FastDownloader.exe |
| LegalCopyright: | Copyright (C) 2018 |
| OriginalFilename: | FastDownloader.exe |
| ProductName: | 软件下载器 |
| ProductVersion: | 3.2.0.8 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000130 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 23-Apr-2021 09:27:32 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00149000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x0014A000 | 0x000D6000 | 0x000D5E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.91587 |
.rsrc | 0x00220000 | 0x00007000 | 0x00006A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.04588 |
.data | 0x00227000 | 0x00000003 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.051876 |
.textbss\x03 | 0x00228000 | 0x00000003 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.051876 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.06216 | 651 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.24731 | 296 | UNKNOWN | Chinese - PRC | RT_ICON |
3 | 3.27183 | 3752 | UNKNOWN | Chinese - PRC | RT_ICON |
4 | 3.91452 | 2216 | UNKNOWN | Chinese - PRC | RT_ICON |
5 | 3.47417 | 1384 | UNKNOWN | Chinese - PRC | RT_ICON |
6 | 3.02843 | 9640 | UNKNOWN | Chinese - PRC | RT_ICON |
7 | 2.82055 | 4264 | UNKNOWN | Chinese - PRC | RT_ICON |
8 | 2.44525 | 1128 | UNKNOWN | Chinese - PRC | RT_ICON |
104 | 2.81158 | 118 | UNKNOWN | Chinese - PRC | RT_GROUP_ICON |
107 | 5.83333 | 76 | UNKNOWN | Chinese - PRC | RT_DIALOG |
COMCTL32.dll |
GDI32.dll |
IMM32.dll |
KERNEL32.DLL |
MSIMG32.dll |
OLEACC.dll |
OLEAUT32.dll |
SHELL32.dll |
SHLWAPI.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 888 | C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding | C:\Windows\explorer.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\joPU7xeCeZURaDlf\Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Edit can Exit code: 0 Version: 1, 0, 0, 1789 Modules
| |||||||||||||||
| 992 | "C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe" --type=utility --field-trial-handle=980,15934390356823165493,15206295435281506762,131072 --disable-features=HardwareMediaKeyHandling --lang=en-US --service-sandbox-type=network --service-request-channel-token=12540606203484817798 --mojo-platform-channel-handle=1052 /prefetch:8 /prefetch:-645351001 | C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe | — | 360se.exe | |||||||||||
User: admin Company: 360.cn Integrity Level: MEDIUM Description: 360安全浏览器 Exit code: 0 Version: 12.1.2466.0 Modules
| |||||||||||||||
| 1432 | "C:\Users\admin\AppData\Local\Temp\de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe" | C:\Users\admin\AppData\Local\Temp\de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | — | explorer.exe | |||||||||||
User: admin Company: - Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 3.2.0.8 | |||||||||||||||
| 1820 | "C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe" --do-shortcut=0_0_1 --set-homepage-overwrite --silent-install=3_1_1 --have-user-data-dir=true | C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe | — | explorer.exe | |||||||||||
User: admin Company: 360.cn Integrity Level: MEDIUM Description: 360安全浏览器 Exit code: 16 Version: 12.1.2466.0 Modules
| |||||||||||||||
| 1928 | "C:\Users\admin\AppData\Local\Temp\de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe" | C:\Users\admin\AppData\Local\Temp\de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | explorer.exe | ||||||||||||
User: admin Company: - Integrity Level: HIGH Description: Exit code: 0 Version: 3.2.0.8 Modules
| |||||||||||||||
| 3036 | "C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe" --type=gpu-process --field-trial-handle=980,15934390356823165493,15206295435281506762,131072 --disable-features=HardwareMediaKeyHandling --gpu-preferences=KAAAAAAAAADgAAAwAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --service-request-channel-token=382791021750636213 --mojo-platform-channel-handle=996 --ignored=" --type=renderer " /prefetch:2 /prefetch:822062411 | C:\Users\admin\AppData\Roaming\360se6\Application\360se.exe | — | 360se.exe | |||||||||||
User: admin Company: 360.cn Integrity Level: LOW Description: 360安全浏览器 Exit code: 4 Version: 12.1.2466.0 Modules
| |||||||||||||||
| 3356 | "C:\Users\admin\AppData\Local\Temp\{98E5D7E6-1469-4a3c-9917-98FDA90CA593}\qEiLgGzTcByHmDiB.exe" FF0cXRxdKV0cXRhdbV0cXTldDF0fXW1dHF0aXQhdHF04XRxdHF1kXRxdFV0uXRxdEl0MXRxdJ10cXRhdCF0cXQ9dDF0cXW1dHF0ZXTZdHF0SXQxdH10aXRxdHl1tXRxdE106XRxdbV0cXRldEF0cXRBdHF0cXSldHF0ZXQxdHF1QXVddE106XR9dMV0cXRldHF0cXRFdDF0cXWhdHF0ZXRRdHF0QXRxdHF0qXRxdHl1tXRxdEF0qXRxdbV0cXRldNl0cXQ9dDF0fXRldHF0YXRBdHF0TXRxdHF1pXRxdGF0YXRxdEF0cXRxdbl0cXRldEF0cXTtdDF0cXTpdHF0eXW1dHF1QXVddDF0qXR9dNV0cXRpdKl0cXT9dHF0fXRddHF0aXQxdHF0NXQxdHF0nXRxdGV0YXRxdEF0MXRxdJF0cXRldBF0cXRBdHF0cXSVdHF0eXRxdHF0RXQxdH10MXRxdFV0UXRxdP10qXR9dNl0cXRVdCF0cXQRdKl0fXW1dHF0ZXW1dHF1QXVddEF06XRxdOl0cXR5dbV0cXQ9dHF0fXS5dHF0aXSpdHF0LXTpdH10xXRxdFV0UXRxdDV0MXRxdJF0cXRldHF0cXRBdHF0cXSVdHF0ZXRRdHF0SXRxdHF1pXRxdHl0cXRxdEV0MXR9dF10cXRpdaV0cXT5dKl0fXW1dHF0YXWldHF1QXVddBF0MXR9dKV0cXRpdCF0cXQ1dDF0cXSddHF0YXQxdHF08XRxdH10XXRxdFV0MXRxdCl0MXR9dMV0cXRtdGF0cXQVdKl0fXTtdHF0ZXRBdHF0QXQxdHF0lXRxdGV0UXRxdE106XRxdKl0cXRldGF0cXQVdKl0fXTtdHF0ZXRBdHF1QXVddB106XRxdb10cXRldNl0cXRNdOl0fXTFdHF0ZXT5dHF0QXSpdHF1uXRxdGV0MXRxdE106XRxdJV0cXRldBF0cXQRdKl0cXW9dHF0aXRBdHF0TXTpdHF1sXRxdGV0+XRxdEF06XR9dO10cXRtdZV0cXRNdOl0cXWldHF0ZXQRdHF1QXVddEF0MXRxdb10cXRpdBF0cXRBdOl0fXTFdHF0ZXRBdHF0QXSpdHF0nXRxdGV0EXRxdEF0qXRxdKl0cXRldFF0cXQddDF0cXW9dHF0ZXRBdHF0TXTpdH10xXRxdG11lXRxdBV0qXRxdKl0cXRldNl0cXRJdDF0cXSRdHF0eXWldHF1QXVddB10MXR9daV0cXRpdCF0cXRxdHF0cXWBdUF1XXQ== | C:\Users\admin\AppData\Local\Temp\{98E5D7E6-1469-4a3c-9917-98FDA90CA593}\qEiLgGzTcByHmDiB.exe | zOtYaTwRmEtMhEdM.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: 360安全卫士 Exit code: 0 Version: 7, 8, 3, 1381 Modules
| |||||||||||||||
| 3592 | "C:\Users\admin\AppData\Local\Temp\{CC45E416-8546-419e-BC88-61331078626E}\zOtYaTwRmEtMhEdM.exe" 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 | C:\Users\admin\AppData\Local\Temp\{CC45E416-8546-419e-BC88-61331078626E}\zOtYaTwRmEtMhEdM.exe | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: 360安全卫士 Exit code: 0 Version: 7, 8, 3, 1381 Modules
| |||||||||||||||
| 3600 | "C:\Windows\explorer.exe" /select,"C:\Download\\1__3112633__3f7372633d6c6d266c733d6e34623664373335303965__68616f2e3336302e636e__0c6f.exe" | C:\Windows\explorer.exe | — | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters |
| Operation: | write | Name: | TrapPollTimeMilliSecs |
Value: 15000 | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\UIDowner |
| Operation: | write | Name: | usestime |
Value: 1 | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1928) de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (888) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | C:\Download\1__3112633__3f7372633d6c6d266c733d6e34623664373335303965__68616f2e3336302e636e__0c6f.exe | — | |
MD5:— | SHA256:— | |||
| 1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97[1].exe | executable | |
MD5:— | SHA256:— | |||
| 1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | C:\Users\admin\AppData\Local\Temp\joPU7xeCeZURaDlf\Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | executable | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\{2FD50D1C-F9E1-4079-B859-7A5368E112A3}.tmp | binary | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\{8E1C9813-59FB-4e6a-AEED-B4EC724FD385}.tmp | binary | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\360ini[1].cab | compressed | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\{EB3B9FE3-8DB2-46a2-8506-9B3461B3637D}.tmp | binary | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\{AAA21410-8211-4de6-8C28-A86C791F0BC1}.tmp | binary | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\{BCF19431-DADF-4ac2-A5AE-7B8488D6A66B}.tmp | binary | |
MD5:— | SHA256:— | |||
| 952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | C:\Users\admin\AppData\Local\Temp\{5004E13F-6055-4385-A486-E419159D985D}.tmp | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | HEAD | 200 | 104.192.108.21:80 | http://104.192.108.21/gf/360ini.cab | US | — | — | malicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | GET | 200 | 182.92.156.114:80 | http://api.aldtop.com/dll/debug?ver=3&webid=28&softid=5&mac=006bf7f3a3b0458b6d28cd1121441834&mode=followtask&taskid=6&step=0 | CN | — | — | whitelisted |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | GET | 200 | 182.92.156.114:80 | http://api.aldtop.com/dll/debug?ver=3&webid=28&softid=5&mac=006bf7f3a3b0458b6d28cd1121441834&mode=followtask&taskid=1&step=0 | CN | — | — | whitelisted |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | GET | — | 180.163.149.99:80 | http://download.2345.cn/down/2345Explorer_396263.exe | CN | — | — | whitelisted |
952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | GET | 200 | 171.8.167.89:80 | http://s.360.cn/hips/update/inst.htm?m=844a27de9a98d0fa192a1405eea8d485&m2=cb791217310fe22e7ce47777c226eb7550a6b66a2b6f&v=9999999&s=1500&r=0&d=3112601 | CN | — | — | whitelisted |
952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | GET | 200 | 104.192.108.21:80 | http://104.192.108.21/gf/360ini.cab | US | compressed | 1.97 Mb | malicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | GET | 200 | 182.92.156.114:80 | http://api.aldtop.com/hp?ver=3&webid=28&softid=5&mac=006bf7f3a3b0458b6d28cd1121441834&sdsoft=0&userev=0&rnd=41 | CN | text | 2.53 Kb | whitelisted |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | POST | 200 | 47.114.82.123:80 | http://client.aldtop.com/api/v1/collect | CN | text | 155 b | suspicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | GET | 200 | 60.205.177.239:80 | http://downloader.aldtop.com/client/debug?step=0&theme=22&softid=5&webid=28&channelid=28&user=54c549905d39dca42e9b8478c0c658a8&session=1bade8f6d2e681b1a1c0d07056ba906d&city=0&sdsoft=0&system=6.1&isdeveloper=0&webid=28&channelid=28&softid=5&rnd=26299 | CN | text | 3 b | malicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | GET | 200 | 60.205.177.239:80 | http://downloader.aldtop.com/client/ad/28?winver=6.1&sdsoft=0&webid=28&channelid=&softid=5&ver=5.5.1.50&usesnum=1&mac=54c549905d39dca42e9b8478c0c658a8&filename=de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe&errcode=0&userev=0&filesize=913520&filemd5=5db8d59c3daff95545af69168f8ff828&sys=x32&encry=1&rnd=26256 | CN | text | 82.2 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | 104.192.108.20:443 | dl.360safe.com | Beijing Qihu Technology Company Limited | US | malicious |
952 | Inst3__3112601__3f7372633d6c6d266c733d6e30316264363462333966__68616f2e3336302e636e__0c97.exe | 104.192.108.21:80 | dl.360safe.com | Beijing Qihu Technology Company Limited | US | malicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | 47.114.82.123:80 | client.aldtop.com | — | CN | unknown |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | 182.92.156.114:80 | api.aldtop.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | malicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | 120.52.95.242:80 | resource.aldtop.com | China Unicom IP network | CN | malicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | 58.218.215.149:80 | img.aldtop.com | No.31,Jin-rong Street | CN | suspicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | 104.192.108.19:80 | dl.360safe.com | Beijing Qihu Technology Company Limited | US | suspicious |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | 180.163.149.99:80 | download.2345.cn | China Telecom (Group) | CN | unknown |
3592 | zOtYaTwRmEtMhEdM.exe | 104.192.108.19:80 | dl.360safe.com | Beijing Qihu Technology Company Limited | US | suspicious |
3592 | zOtYaTwRmEtMhEdM.exe | 104.192.108.17:443 | dl.360safe.com | Beijing Qihu Technology Company Limited | US | malicious |
Domain | IP | Reputation |
|---|---|---|
client.aldtop.com |
| suspicious |
downloader.aldtop.com |
| unknown |
resource.aldtop.com |
| suspicious |
api.aldtop.com |
| whitelisted |
img.aldtop.com |
| suspicious |
dl.360safe.com |
| whitelisted |
statapi.aldtop.com |
| unknown |
dl2.360safe.com |
| malicious |
download.2345.cn |
| whitelisted |
s.360.cn |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | A Network Trojan was detected | AV TROJAN Downer.C Variant Checkin |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Potentially Bad Traffic | ET MALWARE Downer.B Variant Checkin |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | A Network Trojan was detected | ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible )) |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | A Network Trojan was detected | ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible )) |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | A Network Trojan was detected | ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible )) |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | A Network Trojan was detected | ET MALWARE User-Agent (User-Agent Mozilla/4.0 (compatible )) |
1928 | de6a53a96906d5549ab0f4ddb4168e4c7c4de5faba46b1c3084df5a19c3edbe4.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3592 | zOtYaTwRmEtMhEdM.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |