File name:

《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe

Full analysis: https://app.any.run/tasks/84c3616b-5e50-40ae-ab0a-ef21cf109168
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: January 13, 2020, 03:19:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
adware
adload
trojan
riskware
yantai
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

7D153606F4220AD10FB33407A6A1E8FB

SHA1:

BA3C6FA16A4CA0238A5373C281504C685BF32A07

SHA256:

E0FA7A19E42E0D78DCA623AFEC928CAE53A40704886BF38326DD22CBA92DB9D8

SSDEEP:

24576:QBkX8AWseDUm5jYPkPct++SzE5dq8emKPRXgetWpl/7QPTQV2/K0TZ1ededj:FX8jDUfPsc4+Szg75g2/yQVoVEdedj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADLOAD was detected

      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
    • Connects to CnC server

      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
    • Loads dropped or rewritten executable

      • LDSGameMasterInstRoad_213701.exe (PID: 2004)
      • ldsgamemaster.exe (PID: 3952)
      • SoftMgrInst.exe (PID: 1316)
      • GameMasterHelper.exe (PID: 3896)
      • RegSvr32.exe (PID: 516)
      • RegSvr32.exe (PID: 2384)
      • svchost.exe (PID: 864)
      • LDSGameHall.exe (PID: 2432)
      • explorer.exe (PID: 352)
      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • update.exe (PID: 1188)
      • DownloadSDKServer.exe (PID: 3652)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • DownloadSDKServer.exe (PID: 2728)
      • XLWFPSetup.exe (PID: 2424)
      • svchost.exe (PID: 2112)
      • regsvr32.exe (PID: 2256)
      • regsvr32.exe (PID: 4000)
      • BHOInstall.exe (PID: 3080)
      • regsvr32.exe (PID: 3248)
      • ThunderBHOPlatform.exe (PID: 2156)
      • APlayerCodecs3Embed.exe (PID: 892)
      • regsvr32.exe (PID: 2744)
      • SearchProtocolHost.exe (PID: 3488)
      • BirdHelper.exe (PID: 3384)
      • LdsHelper.exe (PID: 516)
      • PDFRunningHelper.exe (PID: 1880)
      • regsvr32.exe (PID: 2416)
    • Downloads executable files from the Internet

      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
      • ldsgamemaster.exe (PID: 3952)
      • svchost.exe (PID: 2112)
    • Application was dropped or rewritten from another process

      • ldsgamemaster.exe (PID: 3952)
      • LDSGameMasterInstRoad_213701.exe (PID: 2004)
      • SoftMgrInst.exe (PID: 1316)
      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • GameMasterHelper.exe (PID: 3896)
      • LDSGameHall.exe (PID: 2432)
      • DownloadSDKServer.exe (PID: 3652)
      • update.exe (PID: 1188)
      • DownloadSDKServer.exe (PID: 2728)
      • InstallXLWFP.exe (PID: 4072)
      • XLWFPSetup.exe (PID: 2424)
      • InstallXLWFP.exe (PID: 3492)
      • InstallXLGuard.exe (PID: 3376)
      • InstallXLGuard.exe (PID: 3336)
      • XLServicePlatform.exe (PID: 2276)
      • XLServicePlatform.exe (PID: 2556)
      • XLServicePlatform.exe (PID: 2596)
      • Win7AppId.exe (PID: 3328)
      • Win7AppId.exe (PID: 284)
      • Win7AppId.exe (PID: 3560)
      • Win7AppId.exe (PID: 2736)
      • Win7AppId.exe (PID: 3364)
      • Win7AppId.exe (PID: 2516)
      • ThunderBHOPlatform.exe (PID: 2156)
      • BHOInstall.exe (PID: 3080)
      • xl_ext_chrome_setup.exe (PID: 3324)
      • APlayerCodecs3Embed.exe (PID: 892)
      • BirdHelper.exe (PID: 3384)
      • pdfServer.exe (PID: 3104)
      • pdfServer.exe (PID: 2248)
      • LdsHelper.exe (PID: 516)
      • PDFRunningHelper.exe (PID: 1880)
    • Changes settings of System certificates

      • ldsgamemaster.exe (PID: 3952)
    • Registers / Runs the DLL via REGSVR32.EXE

      • ldsgamemaster.exe (PID: 3952)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • ThunderBHOPlatform.exe (PID: 2156)
    • Creates or modifies windows services

      • XLServicePlatform.exe (PID: 2596)
    • Changes the autorun value in the registry

      • XunLeiSetup10.1.28.676.exe (PID: 4056)
  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • LDSGameMasterInstRoad_213701.exe (PID: 2004)
      • ldsgamemaster.exe (PID: 3952)
      • GameMasterHelper.exe (PID: 3896)
      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • LDSGameHall.exe (PID: 2432)
      • DownloadSDKServer.exe (PID: 3652)
      • update.exe (PID: 1188)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • DownloadSDKServer.exe (PID: 2728)
      • XLServicePlatform.exe (PID: 2556)
      • InstallXLWFP.exe (PID: 4072)
      • InstallXLGuard.exe (PID: 3376)
      • InstallXLGuard.exe (PID: 3336)
      • svchost.exe (PID: 2112)
      • XLServicePlatform.exe (PID: 2596)
      • InstallXLWFP.exe (PID: 3492)
      • BHOInstall.exe (PID: 3080)
      • BirdHelper.exe (PID: 3384)
      • PDFRunningHelper.exe (PID: 1880)
      • LdsHelper.exe (PID: 516)
    • Creates files in the program directory

      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
      • ldsgamemaster.exe (PID: 3952)
      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • XLWFPSetup.exe (PID: 2424)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • XLServicePlatform.exe (PID: 2596)
      • regsvr32.exe (PID: 3248)
      • regsvr32.exe (PID: 2256)
      • ThunderBHOPlatform.exe (PID: 2156)
      • xl_ext_chrome_setup.exe (PID: 3324)
      • regsvr32.exe (PID: 2744)
      • svchost.exe (PID: 2112)
    • Creates files in the user directory

      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
      • SoftMgrInst.exe (PID: 1316)
      • ldsgamemaster.exe (PID: 3952)
      • LDSGameHall.exe (PID: 2432)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • explorer.exe (PID: 352)
      • BirdHelper.exe (PID: 3384)
      • PDFRunningHelper.exe (PID: 1880)
    • Reads Internet Cache Settings

      • LDSGameMasterInstRoad_213701.exe (PID: 2004)
      • ldsgamemaster.exe (PID: 3952)
      • explorer.exe (PID: 352)
      • LDSGameHall.exe (PID: 2432)
    • Executable content was dropped or overwritten

      • LDSGameMasterInstRoad_213701.exe (PID: 2004)
      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
      • ldsgamemaster.exe (PID: 3952)
      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • LDSGameHall.exe (PID: 2432)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • DownloadSDKServer.exe (PID: 2728)
      • XLWFPSetup.exe (PID: 2424)
      • XLServicePlatform.exe (PID: 2596)
      • regsvr32.exe (PID: 2256)
      • ThunderBHOPlatform.exe (PID: 2156)
      • xl_ext_chrome_setup.exe (PID: 3324)
      • regsvr32.exe (PID: 2744)
      • APlayerCodecs3Embed.exe (PID: 892)
      • svchost.exe (PID: 2112)
      • regsvr32.exe (PID: 3248)
    • Adds / modifies Windows certificates

      • ldsgamemaster.exe (PID: 3952)
    • Application launched itself

      • 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe (PID: 1756)
    • Searches for installed software

      • ldsgamemaster.exe (PID: 3952)
    • Creates COM task schedule object

      • RegSvr32.exe (PID: 516)
      • RegSvr32.exe (PID: 2384)
      • regsvr32.exe (PID: 3248)
      • regsvr32.exe (PID: 2256)
      • regsvr32.exe (PID: 2744)
      • regsvr32.exe (PID: 4000)
      • APlayerCodecs3Embed.exe (PID: 892)
      • regsvr32.exe (PID: 2416)
    • Creates or modifies windows services

      • ldsgamemaster.exe (PID: 3952)
    • Uses NETSH.EXE for network configuration

      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
    • Changes IE settings (feature browser emulation)

      • LDSGameHall.exe (PID: 2432)
    • Connects to unusual port

      • XunLeiWebSetup_jshz3.exe (PID: 2144)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
      • DownloadSDKServer.exe (PID: 2728)
      • XLServicePlatform.exe (PID: 2556)
      • InstallXLWFP.exe (PID: 4072)
      • InstallXLWFP.exe (PID: 3492)
      • InstallXLGuard.exe (PID: 3376)
      • InstallXLGuard.exe (PID: 3336)
      • XLServicePlatform.exe (PID: 2596)
      • svchost.exe (PID: 2112)
    • Creates a software uninstall entry

      • LDSGameHall.exe (PID: 2432)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
    • Reads CPU info

      • DownloadSDKServer.exe (PID: 3652)
      • DownloadSDKServer.exe (PID: 2728)
    • Modifies the open verb of a shell class

      • LDSGameHall.exe (PID: 2432)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
    • Reads internet explorer settings

      • LDSGameHall.exe (PID: 2432)
    • Creates files in the driver directory

      • XLWFPSetup.exe (PID: 2424)
    • Creates files in the Windows directory

      • XLWFPSetup.exe (PID: 2424)
      • svchost.exe (PID: 2112)
      • ldsgamemaster.exe (PID: 3952)
    • Removes files from Windows directory

      • svchost.exe (PID: 2112)
    • Executed as Windows Service

      • pdfServer.exe (PID: 2248)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • ldsgamemaster.exe (PID: 3952)
      • XunLeiSetup10.1.28.676.exe (PID: 4056)
    • Manual execution by user

      • explorer.exe (PID: 1904)
    • Reads settings of System Certificates

      • explorer.exe (PID: 352)
      • svchost.exe (PID: 2112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (43.5)
.exe | Win32 EXE Yoda's Crypter (42.7)
.exe | Win32 Executable (generic) (7.2)
.exe | Generic Win/DOS Executable (3.2)
.exe | DOS Executable Generic (3.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:11:26 05:52:49+01:00
PEType: PE32
LinkerVersion: 14
CodeSize: 1654784
InitializedDataSize: 118784
UninitializedDataSize: 6914048
EntryPoint: 0x82ca10
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 26-Nov-2019 04:52:49
Detected languages:
  • Chinese - PRC
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000140

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 26-Nov-2019 04:52:49
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x00698000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x00699000
0x00194000
0x00194000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.94442
.rsrc
0x0082D000
0x0001D000
0x0001D000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.82874

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.06216
651
UNKNOWN
English - United States
RT_MANIFEST
2
3.25755
296
UNKNOWN
Chinese - PRC
RT_ICON
3
3.2736
3752
UNKNOWN
Chinese - PRC
RT_ICON
4
3.91716
2216
UNKNOWN
Chinese - PRC
RT_ICON
5
3.48177
1384
UNKNOWN
Chinese - PRC
RT_ICON
6
3.02843
9640
UNKNOWN
Chinese - PRC
RT_ICON
7
2.29446
88
UNKNOWN
Chinese - PRC
RT_STRING
8
2.44525
1128
UNKNOWN
Chinese - PRC
RT_ICON
9
3.90783
744
UNKNOWN
Chinese - PRC
RT_ICON
10
3.25755
296
UNKNOWN
Chinese - PRC
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
IMM32.dll
KERNEL32.DLL
OLEAUT32.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
VERSION.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
65
Malicious processes
21
Suspicious processes
10

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start #ADLOAD 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe ldsgamemasterinstroad_213701.exe ldsgamemaster.exe softmgrinst.exe 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe no specs explorer.exe no specs gamemasterhelper.exe regsvr32.exe no specs regsvr32.exe no specs xunleiwebsetup_jshz3.exe svchost.exe explorer.exe ldsgamehall.exe netsh.exe no specs update.exe downloadsdkserver.exe xunleisetup10.1.28.676.exe netsh.exe no specs netsh.exe no specs downloadsdkserver.exe netsh.exe no specs xlserviceplatform.exe no specs xlserviceplatform.exe xlwfpsetup.exe installxlwfp.exe installxlwfp.exe installxlguard.exe installxlguard.exe xlserviceplatform.exe win7appid.exe no specs win7appid.exe no specs win7appid.exe no specs svchost.exe win7appid.exe no specs win7appid.exe no specs win7appid.exe no specs regsvr32.exe regsvr32.exe no specs regsvr32.exe regsvr32.exe no specs thunderbhoplatform.exe regsvr32.exe no specs bhoinstall.exe xl_ext_chrome_setup.exe regsvr32.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs regsvr32.exe aplayercodecs3embed.exe netsh.exe no specs searchprotocolhost.exe no specs 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe no specs birdhelper.exe regsvr32.exe no specs ldshelper.exe pdfserver.exe no specs pdfserver.exe pdfrunninghelper.exe 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
284"C:\Program Files\Thunder Network\Thunder\Program\Win7AppId.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\迅雷.lnk" "C:\Program Files\Thunder Network\Thunder\Program\Thunder.exe"C:\Program Files\Thunder Network\Thunder\Program\Win7AppId.exeXunLeiSetup10.1.28.676.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\thunder network\thunder\program\win7appid.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
352C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
408C:\Windows\system32\netsh.exe advfirewall firewall delete rule name="XLLiveUD" dir=in action=allow program="C:\Users\admin\AppData\Local\Temp\XLLiveUD\Thunder8_10.1.28.676\XLLiveUD.exe" C:\Windows\system32\netsh.exeXunLeiSetup10.1.28.676.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
516"C:\Windows\System32\RegSvr32.exe" /s /i "C:\LDSGameMaster\GameMemoryOpt.dll"C:\Windows\System32\RegSvr32.exeldsgamemaster.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
4
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
516"C:\Program Files\LuDaShi\Utils\LdsHelper.exe" C:\Program Files\LuDaShi\Utils\LdsHelper.exe
ldsgamemaster.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
6.0.0.1001
Modules
Images
c:\windows\system32\wintrust.dll
c:\windows\system32\nsi.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\ldsgamemaster\gamememoryopt.dll
c:\windows\system32\msctf.dll
c:\windows\system32\regsvr32.exe
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\cfgmgr32.dll
864C:\Windows\system32\svchost.exe -k netsvcsC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
892C:\Users\admin\AppData\Local\Temp\Thunder\APlayerCodecs3Embed.exeC:\Users\admin\AppData\Local\Temp\Thunder\APlayerCodecs3Embed.exe
XunLeiSetup10.1.28.676.exe
User:
admin
Company:
深圳市迅雷网络技术有限公司
Integrity Level:
HIGH
Description:
迅雷影音 解码器安装程序
Exit code:
0
Version:
3.9.10.815
Modules
Images
c:\users\admin\appdata\local\temp\thunder\aplayercodecs3embed.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
992regsvr32 /s "C:\Program Files\Thunder Network\Thunder\BHO\ThunderAgent64.dll"C:\Windows\system32\regsvr32.exeXunLeiSetup10.1.28.676.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1188"C:\LDSGameMaster\update.exe" checkupdateC:\LDSGameMaster\update.exe
LDSGameHall.exe
User:
admin
Company:
鲁大师
Integrity Level:
HIGH
Description:
手机模拟大师更新模块
Exit code:
0
Version:
3.2.0.1135
Modules
Images
c:\ldsgamemaster\update.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1216C:\Windows\system32\netsh.exe advfirewall firewall delete rule name="Thunder" dir=in action=allow program="C:\Program Files\Thunder Network\Thunder\Program\Thunder.exe" C:\Windows\system32\netsh.exeXunLeiSetup10.1.28.676.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
Total events
12 319
Read events
9 000
Write events
3 238
Delete events
81

Modification events

(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1756) 《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\«????»????????????v3_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
853
Suspicious files
217
Text files
1 089
Unknown types
47

Dropped files

PID
Process
Filename
Type
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\247bu[1].pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\ProgramData\Icons\cache.infotext
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\239[1].pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Temp\136.pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Temp\248.pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Temp\247bu.pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Temp\240.pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\123bu[1].pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\248[1].pngimage
MD5:
SHA256:
1756《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\236[1].pngimage
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
308
TCP/UDP connections
302
DNS requests
165
Threats
30

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/240.png
CN
image
1.14 Kb
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
123.206.4.86:80
http://time.bskrt.com/api/soft/holiday
CN
text
115 b
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/239.png
CN
image
2.04 Kb
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/136.png
CN
image
1.61 Kb
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/123bu.png
CN
image
1.96 Kb
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/236.png
CN
image
1012 b
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
211.159.170.45:80
http://update1.bskrt.com/gif/xxx3.gif
CN
text
37.5 Kb
unknown
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/197.png
CN
image
2.25 Kb
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/188.png
CN
image
1.51 Kb
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
GET
200
1.31.173.91:80
http://dl.ttp1.cn/tubiao/248.png
CN
image
2.48 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1.192.136.171:3478
No.31,Jin-rong Street
CN
unknown
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
211.159.170.45:80
update1.bskrt.com
Shenzhen Tencent Computer Systems Company Limited
CN
unknown
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
123.206.4.86:80
time.bskrt.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
104.26.10.70:80
myip.ipip.net
Cloudflare Inc
US
suspicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
1.31.173.91:80
dl.ttp1.cn
CHINA UNICOM China169 Backbone
CN
unknown
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
140.143.170.124:80
i.bskrt.com
Shenzhen Tencent Computer Systems Company Limited
CN
malicious
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
104.192.108.21:80
dl.ludashi.com
Beijing Qihu Technology Company Limited
US
malicious
2004
LDSGameMasterInstRoad_213701.exe
104.192.108.21:80
dl.ludashi.com
Beijing Qihu Technology Company Limited
US
malicious
2004
LDSGameMasterInstRoad_213701.exe
114.115.214.33:80
s.ludashi.com
China Unicom Beijing Province Network
CN
suspicious
1316
SoftMgrInst.exe
1.192.136.170:3478
st.p.360.cn
No.31,Jin-rong Street
CN
unknown

DNS requests

Domain
IP
Reputation
update1.bskrt.com
  • 211.159.170.45
unknown
myip.ipip.net
  • 104.26.10.70
  • 104.26.11.70
suspicious
time.bskrt.com
  • 123.206.4.86
malicious
dl.ttp1.cn
  • 1.31.173.91
  • 220.194.87.190
  • 113.59.43.98
  • 221.204.166.60
  • 121.31.30.201
  • 58.251.150.80
  • 121.29.54.65
  • 113.1.0.98
  • 113.1.0.63
malicious
i.bskrt.com
  • 140.143.170.124
malicious
xzqlog.bskrt.com
  • 123.206.4.86
malicious
bd2.pcgamepatch.com.cn
unknown
dl.ludashi.com
  • 104.192.108.21
  • 104.192.108.18
whitelisted
s.ludashi.com
  • 114.115.214.33
suspicious
www.download.windowsupdate.com
  • 92.122.213.217
  • 92.122.213.201
whitelisted

Threats

PID
Process
Class
Message
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
A Network Trojan was detected
AV TROJAN Yantai File Infector CnC Checkin
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
A Network Trojan was detected
AV TROJAN Yantai File Infector CnC Checkin
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
A Network Trojan was detected
AV TROJAN Yantai File Infector CnC Checkin
1756
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2004
LDSGameMasterInstRoad_213701.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1316
SoftMgrInst.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
1316
SoftMgrInst.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
1316
SoftMgrInst.exe
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
6 ETPRO signatures available at the full report
Process
Message
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::GetContainer
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::CanInPlaceActivate
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::OnInPlaceActivate
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::GetContainer
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::OnInPlaceActivateEx
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::ShowObject
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::CanInPlaceActivate
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::GetWindow
《绝地求生》西瓜透视自瞄辅助过检测版v3.1_id14@14_115258.exe
AX: CActiveXCtrl::GetWindowContext
LDSGameHall.exe
==============FindEmulatorToHallBridgeWindow Error:0.