File name:

LDPlayer_kr_2000_200.exe

Full analysis: https://app.any.run/tasks/94ed11ff-3c6d-4ed7-8377-901d3f5563c6
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 21, 2019, 06:01:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A8ADFDC56786FE1F7E2004990BC4D86A

SHA1:

B4ECE627390196821FC06AC4B5FFFA176886C2C0

SHA256:

E4689A6318753DCB44E4FBA73FC69D6BAD2903A9555BEB278B0400C1C8352A57

SSDEEP:

49152:/S53m/IMFI8gjAbDiYmpIkQR9sXafgkDFMVR9C1UhPJXMK701hOHZbebbVjEyQVZ:/22gRR8mpNrBiCV2Hlg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • dnrepairer.exe (PID: 1776)
    • Loads dropped or rewritten executable

      • dnrepairer.exe (PID: 1776)
      • LdBoxSVC.exe (PID: 3832)
      • regsvr32.exe (PID: 3928)
      • regsvr32.exe (PID: 2440)
      • dnplayer.exe (PID: 2768)
      • driverconfig.exe (PID: 2600)
      • LdBoxSVC.exe (PID: 1636)
      • WerFault.exe (PID: 1912)
      • LdBoxHeadless.exe (PID: 2124)
    • Starts NET.EXE for service management

      • dnrepairer.exe (PID: 1776)
    • Application was dropped or rewritten from another process

      • driverconfig.exe (PID: 2600)
      • dnplayer.exe (PID: 2768)
      • LdBoxSVC.exe (PID: 3832)
      • LdBoxHeadless.exe (PID: 2124)
      • vbox-img.exe (PID: 1820)
      • LdBoxSVC.exe (PID: 1636)
      • vbox-img.exe (PID: 2860)
      • vbox-img.exe (PID: 3196)
    • Downloads executable files from the Internet

      • LDPlayer_kr_2000_200.exe (PID: 1904)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • LDPlayer_kr_2000_200.exe (PID: 1904)
      • LDPlayer.exe (PID: 3440)
      • dnrepairer.exe (PID: 1776)
    • Reads Internet Cache Settings

      • LDPlayer_kr_2000_200.exe (PID: 1904)
      • LDPlayer.exe (PID: 3440)
      • dnplayer.exe (PID: 2768)
    • Creates files in the user directory

      • dnrepairer.exe (PID: 1776)
      • LDPlayer_kr_2000_200.exe (PID: 1904)
      • LDPlayer.exe (PID: 3440)
      • dnplayer.exe (PID: 2768)
    • Uses ICACLS.EXE to modify access control list

      • dnrepairer.exe (PID: 1776)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 2440)
    • Modifies the open verb of a shell class

      • LDPlayer.exe (PID: 3440)
    • Executable content was dropped or overwritten

      • LDPlayer.exe (PID: 3440)
      • dnplayer.exe (PID: 2768)
      • dnrepairer.exe (PID: 1776)
    • Creates a software uninstall entry

      • LDPlayer.exe (PID: 3440)
    • Changes IE settings (feature browser emulation)

      • dnplayer.exe (PID: 2768)
    • Executed via COM

      • LdBoxSVC.exe (PID: 1636)
    • Creates files in the program directory

      • dnrepairer.exe (PID: 1776)
      • WerFault.exe (PID: 1912)
    • Starts SC.EXE for service management

      • dnrepairer.exe (PID: 1776)
    • Reads Environment values

      • driverconfig.exe (PID: 2600)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • LDPlayer.exe (PID: 3440)
      • dnrepairer.exe (PID: 1776)
    • Application was crashed

      • LdBoxHeadless.exe (PID: 2124)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:09:27 14:43:04+02:00
PEType: PE32
LinkerVersion: 12
CodeSize: 832000
InitializedDataSize: 2061824
UninitializedDataSize: -
EntryPoint: 0x95d27
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Traditional)
CharacterSet: Unicode
CompanyName: XUANZHI INTERNATIONAL CO., LIMITED
FileDescription: LDPlayer
FileVersion: 1.0.0
InternalName: ldplayerinst.exe
LegalCopyright: Copyright (C) 2016
OriginalFileName: ldplayerinst.exe
ProductName: LDPlayer
ProductVersion: 1.0.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 27-Sep-2019 12:43:04
Detected languages:
  • Chinese - PRC
  • Chinese - Taiwan
  • English - United States
Debug artifacts:
  • D:\work\trunk\downloader\bin\ldplayerinst.pdb
CompanyName: XUANZHI INTERNATIONAL CO., LIMITED
FileDescription: LDPlayer
FileVersion: 1.0.0
InternalName: ldplayerinst.exe
LegalCopyright: Copyright (C) 2016
OriginalFilename: ldplayerinst.exe
ProductName: LDPlayer
ProductVersion: 1.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000130

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 27-Sep-2019 12:43:04
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000CB0DC
0x000CB200
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.55505
.rdata
0x000CD000
0x00032DC0
0x00032E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.13592
.data
0x00100000
0x0000EDE8
0x00005600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.96572
.rsrc
0x0010F000
0x001A9E48
0x001AA000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.21718
.reloc
0x002B9000
0x0000B8B4
0x0000BA00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.56635

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.06216
651
UNKNOWN
English - United States
RT_MANIFEST
2
0.773327
304
UNKNOWN
Chinese - PRC
RT_ICON
3
0.746345
176
UNKNOWN
Chinese - PRC
RT_ICON
4
3.831
1640
UNKNOWN
Chinese - PRC
RT_ICON
5
3.97057
744
UNKNOWN
Chinese - PRC
RT_ICON
6
3.46461
296
UNKNOWN
Chinese - PRC
RT_ICON
7
2.11169
72
UNKNOWN
Chinese - PRC
RT_STRING
8
3.2232
2216
UNKNOWN
Chinese - PRC
RT_ICON
9
3.24731
1384
UNKNOWN
Chinese - PRC
RT_ICON
10
2.8258
270376
UNKNOWN
Chinese - PRC
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
IMM32.dll
IPHLPAPI.DLL
KERNEL32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
SHLWAPI.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
55
Malicious processes
10
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start ldplayer_kr_2000_200.exe taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs ldplayer.exe taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs dnrepairer.exe net.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs takeown.exe no specs icacls.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs ldboxsvc.exe no specs regsvr32.exe no specs regsvr32.exe no specs sc.exe no specs sc.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs driverconfig.exe no specs dnplayer.exe ldboxsvc.exe no specs vbox-img.exe no specs vbox-img.exe no specs vbox-img.exe no specs ldboxheadless.exe werfault.exe no specs ldplayer_kr_2000_200.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
592"taskkill" /F /IM LdBoxSVC.exe /TC:\Windows\system32\taskkill.exednrepairer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
776"takeown" /f "C:\ChangZhi\LDPlayer\vms" /r /d yC:\Windows\system32\takeown.exednrepairer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Takes ownership of a file
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\takeown.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1032"regsvr32" Wintrust.dll /sC:\Windows\system32\regsvr32.exednrepairer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1484"taskkill" /F /IM LdBoxHeadless.exeC:\Windows\system32\taskkill.exeLDPlayer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\gdi32.dll
1576"taskkill" /F /IM driverconfig.exeC:\Windows\system32\taskkill.exeLDPlayer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1600"taskkill" /F /IM dnupdate.exe /TC:\Windows\system32\taskkill.exeLDPlayer_kr_2000_200.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1636"C:\Program Files\dnplayerext2\LdBoxSVC.exe" -EmbeddingC:\Program Files\dnplayerext2\LdBoxSVC.exesvchost.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
VirtualBox Interface
Exit code:
0
Version:
5.2.30.130462
Modules
Images
c:\program files\dnplayerext2\ldboxsvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
1776"C:\ChangZhi\LDPlayer\dnrepairer.exe" listener=459060C:\ChangZhi\LDPlayer\dnrepairer.exe
LDPlayer.exe
User:
admin
Company:
XUANZHI INTERNATIONAL CO., LIMITED
Integrity Level:
HIGH
Description:
LDRepairer
Exit code:
0
Version:
3.73.0
Modules
Images
c:\changzhi\ldplayer\dnrepairer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1796"C:\Windows\system32\sc" start LdBoxDrvC:\Windows\system32\sc.exednrepairer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1820"C:\Program Files\dnplayerext2\vbox-img.exe" setuuid --filename "C:\ChangZhi\LDPlayer\vms\leidian0\system.vmdk" --uuid {20160302-bbbb-bbbb-44e6-000000000000}C:\Program Files\dnplayerext2\vbox-img.exednplayer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
VirtualBox Virtual Disk Utility
Exit code:
0
Version:
5.2.30.130462
Modules
Images
c:\program files\dnplayerext2\vbox-img.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
2 121
Read events
557
Write events
1 564
Delete events
0

Modification events

(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1904) LDPlayer_kr_2000_200.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LDPlayer_kr_2000_200_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
325
Suspicious files
6
Text files
82
Unknown types
10

Dropped files

PID
Process
Filename
Type
1904LDPlayer_kr_2000_200.exeC:\ChangZhi\LDPlayer\LDPlayer.exe.tmp
MD5:
SHA256:
1904LDPlayer_kr_2000_200.exeC:\ChangZhi\LDPlayer\LDPlayer.exe
MD5:
SHA256:
3440LDPlayer.exeC:\ChangZhi\LDPlayer\data-3G.vmdk
MD5:
SHA256:
3440LDPlayer.exeC:\ChangZhi\LDPlayer\data.vmdk
MD5:
SHA256:
3440LDPlayer.exeC:\ChangZhi\LDPlayer\system.vmdk
MD5:
SHA256:
3440LDPlayer.exeC:\ChangZhi\LDPlayer\dnresource.rcccompressed
MD5:
SHA256:
3440LDPlayer.exeC:\ChangZhi\LDPlayer\bugreport.exeexecutable
MD5:
SHA256:
3440LDPlayer.exeC:\ChangZhi\LDPlayer\rightbar.configtext
MD5:F65477B8105D4D2276F9FB4106FEF009
SHA256:5DD5228040F738E150551F255B9069E2FD900AE3ADBCA37B036A834005356F61
3440LDPlayer.exeC:\ChangZhi\LDPlayer\ldrecord\register_audio.battext
MD5:7FD10DC9CE17FE8E315ACAB424648DFF
SHA256:6D09A0FE56318ECB521652DD0554113EBC2960F54B48FD61BBA3FAD191C3308B
3440LDPlayer.exeC:\ChangZhi\LDPlayer\data.initext
MD5:D0563E8347062977691F069BAAB8F057
SHA256:6E0B2C2FDA7B3894EA955A3DBC4CC0806CC41F83F86127ED999A3D8C00EB8696
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
9
DNS requests
5
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1904
LDPlayer_kr_2000_200.exe
GET
200
125.74.19.231:80
http://res.en.ldmnq.com/download/kr/LDPlayer_3.73.exe
CN
executable
291 Mb
malicious
2768
dnplayer.exe
GET
200
47.246.43.223:80
http://encdn.ldmnq.com/player_files/kr/apps_must_config.data
US
text
745 b
shared
2768
dnplayer.exe
GET
200
47.246.43.223:80
http://encdn.ldmnq.com/player_files/kr/package_configs_1005?z=1571637923
US
text
31 b
shared
2768
dnplayer.exe
GET
200
47.246.43.223:80
http://encdn.ldmnq.com/player_files/kr/leidian?t=4007515
US
text
747 b
shared
2768
dnplayer.exe
GET
200
47.246.43.223:80
http://encdn.ldmnq.com/player_files/kr/ad_fullscreen.data
US
text
423 b
shared
1904
LDPlayer_kr_2000_200.exe
GET
200
172.217.18.110:80
http://www.google-analytics.com/collect?v=1&t=event&tid=UA-134765723-6&cid=b8c47e36061a092184ea8cb9b1a64aa2&ec=app&ea=download_installComplete&el=errExitCode_60&ev=100&z=26500
US
image
35 b
whitelisted
2768
dnplayer.exe
GET
200
47.88.242.184:80
http://apikr2.ldmnq.com/statisticsMnqEvent?sv=03730000&openid=2000&m=b8c47e36061a092184ea8cb9b1a64aa2&event_key=memorySize&event_value=3.5%20GB&event_type=sys&z=1571637926
SG
text
2 b
unknown
2768
dnplayer.exe
GET
200
47.88.242.184:80
http://apikr2.ldmnq.com/statisticsMnqEvent?sv=03730000&openid=2000&m=b8c47e36061a092184ea8cb9b1a64aa2&event_key=ko_KR&event_value=1033&event_type=language&z=1571637925
SG
text
2 b
unknown
1904
LDPlayer_kr_2000_200.exe
GET
200
172.217.18.110:80
http://www.google-analytics.com/collect?v=1&t=event&tid=UA-134765723-6&cid=b8c47e36061a092184ea8cb9b1a64aa2&ec=app&ea=download_URL1_Success&el=180&ev=100&z=6334
US
image
35 b
whitelisted
3440
LDPlayer.exe
GET
200
47.88.242.184:80
http://apikr2.ldmnq.com/statisticsMnqEvent?sv=03730000&openid=2000&m=b8c47e36061a092184ea8cb9b1a64aa2&event_key=playerInstallStart&event_value=1&event_type=ui&z=1571637883
SG
text
2 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1904
LDPlayer_kr_2000_200.exe
172.217.18.110:80
www.google-analytics.com
Google Inc.
US
whitelisted
1904
LDPlayer_kr_2000_200.exe
125.74.19.231:80
res.en.ldmnq.com
No.31,Jin-rong Street
CN
suspicious
1904
LDPlayer_kr_2000_200.exe
47.246.43.229:80
encdn.ldmnq.com
US
malicious
3440
LDPlayer.exe
47.88.242.184:80
apikr2.ldmnq.com
Alibaba (China) Technology Co., Ltd.
SG
unknown
2768
dnplayer.exe
47.88.242.184:80
apikr2.ldmnq.com
Alibaba (China) Technology Co., Ltd.
SG
unknown
2768
dnplayer.exe
47.246.43.223:80
encdn.ldmnq.com
US
malicious
47.246.43.223:80
encdn.ldmnq.com
US
malicious
2768
dnplayer.exe
47.246.43.223:443
encdn.ldmnq.com
US
malicious

DNS requests

Domain
IP
Reputation
www.google-analytics.com
  • 172.217.18.110
whitelisted
encdn.ldmnq.com
  • 47.246.43.229
  • 47.246.43.230
  • 47.246.43.223
  • 47.246.43.224
  • 47.246.43.225
  • 47.246.43.226
  • 47.246.43.227
  • 47.246.43.228
shared
res.en.ldmnq.com
  • 125.74.19.231
  • 125.74.19.227
  • 125.74.19.226
  • 125.74.19.229
  • 125.74.19.232
  • 125.74.19.233
  • 125.74.19.228
  • 125.74.19.230
malicious
apikr2.ldmnq.com
  • 47.88.242.184
unknown

Threats

PID
Process
Class
Message
1904
LDPlayer_kr_2000_200.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
dnplayer.exe
audio wait from recv