File name:

GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe

Full analysis: https://app.any.run/tasks/a9b1e56c-63cf-458c-afc4-318fc294020c
Verdict: Malicious activity
Analysis date: June 09, 2018, 00:35:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

101820CCB448B9554049A3E465FBA225

SHA1:

471D247DE62099CC21BF9D9BF32602136E16A597

SHA256:

E53BE9DD3581996B4F6E4E34F421386E0AE2AB91D3DEA385B66782A82259AFFA

SSDEEP:

196608:TvwtqlUgN7AktVweDOaG5eWWi/zio/iXoR:42ONwWrX/WoR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • TenioDL.exe (PID: 2956)
      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • QMEmulatorService.exe (PID: 2312)
      • AppMarket.exe (PID: 2456)
      • GameDownload.exe (PID: 2156)
      • QQExternal.exe (PID: 2020)
    • Application was dropped or rewritten from another process

      • TenioDL.exe (PID: 2956)
      • Tinst.exe (PID: 3480)
      • QMEmulatorService.exe (PID: 2312)
      • AppMarket.exe (PID: 2456)
      • QQExternal.exe (PID: 2020)
      • GameDownload.exe (PID: 2156)
      • TenioDL.exe (PID: 3496)
    • Changes settings of System certificates

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • AppMarket.exe (PID: 2456)
    • Adds new firewall rule via NETSH.EXE

      • Tinst.exe (PID: 3480)
  • SUSPICIOUS

    • Creates files in the user directory

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • TenioDL.exe (PID: 2956)
      • Tinst.exe (PID: 3480)
      • AppMarket.exe (PID: 2456)
    • Executable content was dropped or overwritten

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • Market.exe (PID: 3976)
      • Tinst.exe (PID: 3480)
      • GameDownload.exe (PID: 2156)
    • Connects to unusual port

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • TenioDL.exe (PID: 2956)
      • GameDownload.exe (PID: 2156)
    • Uses ICACLS.EXE to modify access control list

      • TenioDL.exe (PID: 2956)
    • Low-level read access rights to disk partition

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • AppMarket.exe (PID: 2456)
      • GameDownload.exe (PID: 2156)
    • Adds / modifies Windows certificates

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • AppMarket.exe (PID: 2456)
    • Uses NETSH.EXE for network configuration

      • Tinst.exe (PID: 3480)
      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
    • Creates files in the program directory

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • AppMarket.exe (PID: 2456)
      • Tinst.exe (PID: 3480)
    • Creates a software uninstall entry

      • Tinst.exe (PID: 3480)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • Market.exe (PID: 3976)
      • Tinst.exe (PID: 3480)
      • AppMarket.exe (PID: 2456)
    • Reads settings of System Certificates

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • AppMarket.exe (PID: 2456)
      • GameDownload.exe (PID: 2156)
    • Dropped object may contain URL's

      • GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe (PID: 4072)
      • Tinst.exe (PID: 3480)
      • GameDownload.exe (PID: 2156)
      • Market.exe (PID: 3976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ocx | Windows ActiveX control (59.5)
.exe | InstallShield setup (21.9)
.exe | Win64 Executable (generic) (14.1)
.exe | Win32 Executable (generic) (2.3)
.exe | Generic Win/DOS Executable (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:05:08 09:41:26+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 733184
InitializedDataSize: 8089600
UninitializedDataSize: -
EntryPoint: 0x92b7e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.5226.123
ProductVersionNumber: 1.0.5226.123
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Tencent
FileDescription: Tencent Gaming Buddy - Install
FileVersion: 1.0.5226.123
InternalName: GameDownload
LegalCopyright: Copyright © 2017 Tencent. All Rights Reserved.
OriginalFileName: GameDownload.exe
ProductName: Tencent Gaming Buddy
ProductVersion: 1,0,5226,123

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 08-May-2018 07:41:26
Detected languages:
  • Chinese - PRC
  • English - United States
Debug artifacts:
  • D:\jenkins_Trunk\workspace\RO\qqpcmgr_proj\AndroidEmulator\Output\Binfinal\GameDownload\GameDownload.pdb
CompanyName: Tencent
FileDescription: Tencent Gaming Buddy - Install
FileVersion: 1.0.5226.123
InternalName: GameDownload
LegalCopyright: Copyright © 2017 Tencent. All Rights Reserved.
OriginalFilename: GameDownload.exe
ProductName: Tencent Gaming Buddy
ProductVersion: 1,0,5226,123

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 08-May-2018 07:41:26
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000B29F7
0x000B3000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.5666
.rdata
0x000B4000
0x0002A3A0
0x0002B000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.85436
.data
0x000DF000
0x0000723C
0x00005000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.5414
.rsrc
0x000E7000
0x00786738
0x00787000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.42523

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.77304
333
Latin 1 / Western European
English - United States
RT_MANIFEST
2
2.89005
744
Latin 1 / Western European
Chinese - PRC
RT_ICON
3
2.54353
296
Latin 1 / Western European
Chinese - PRC
RT_ICON
4
4.35478
3752
Latin 1 / Western European
Chinese - PRC
RT_ICON
5
5.17501
2216
Latin 1 / Western European
Chinese - PRC
RT_ICON
6
3.47748
1384
Latin 1 / Western European
Chinese - PRC
RT_ICON
7
3.0167
150
Latin 1 / Western European
Chinese - PRC
RT_STRING
8
2.12138
68
Latin 1 / Western European
Chinese - PRC
RT_STRING
9
4.05874
1128
Latin 1 / Western European
Chinese - PRC
RT_ICON
107
1.98048
20
Latin 1 / Western European
Chinese - PRC
RT_GROUP_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
IMM32.dll
KERNEL32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
SHLWAPI.dll
USER32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
19
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start gamedownload_pubg_mobile_100103_1.0.5226.123.exe teniodl.exe icacls.exe no specs market.exe tinst.exe qmemulatorservice.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs appmarket.exe netsh.exe no specs qqexternal.exe no specs gamedownload.exe teniodl.exe no specs netsh.exe no specs gamedownload_pubg_mobile_100103_1.0.5226.123.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
308"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="AppMarket" dir=in program="C:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\gdi32.dll
1476"C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器"C:\Windows\system32\Netsh.exeGameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1628"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TUpdate" dir=in program="C:\Program Files\TxGameAssistant\AppMarket\GF186\TUpdate.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1812"C:\Windows\system32\Netsh.exe" advfirewall firewall delete rule name="腾讯手游助手下载器组件"C:\Windows\system32\Netsh.exeGameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2020"C:\Program Files\TxGameAssistant\AppMarket\QQExternal.exe" /load=CefSubProcess.dll --high-dpi-support=1 --type=renderer --disable-accelerated-video-decode --disable-gpu-compositing --no-sandbox --disable-webrtc-hw-encoding --disable-direct-write --client-id=gfwebctrl --enable-deferred-image-decoding --lang=en-US --lang=zh-CN --log-severity=disable --product-version="Tencent AppMarket/4.5 MyGame" --device-scale-factor=1.00 --client-id=gfwebctrl --frame-rate=15 --device-scale-factor=1 --font-cache-shared-mem-suffix=2456 --enable-pinch-virtual-viewport --enable-delegated-renderer --num-raster-threads=2 --use-image-texture-target=3553 --disable-gpu-compositing --channel="2456.0.1591264074\2023881085" /prefetch:673131151C:\Program Files\TxGameAssistant\AppMarket\QQExternal.exeAppMarket.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\txgameassistant\appmarket\qqexternal.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\txgameassistant\appmarket\common.dll
c:\program files\txgameassistant\appmarket\zlib.dll
c:\program files\txgameassistant\appmarket\vcruntime140.dll
c:\program files\txgameassistant\appmarket\api-ms-win-crt-runtime-l1-1-0.dll
c:\program files\txgameassistant\appmarket\ucrtbase.dll
c:\program files\txgameassistant\appmarket\api-ms-win-core-timezone-l1-1-0.dll
2156"C:\Program Files\TxGameAssistant\AppMarket\GameDownload.exe" -from appmark -component -notiywnd 721436 -noupdate -no_install_vdi -no_install_vbox -install_aow_rootfs -pkg com.tencent.ig -downspeedlimit 564 -aeparam -engine aow -aeparamendC:\Program Files\TxGameAssistant\AppMarket\GameDownload.exe
AppMarket.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Tencent Gaming Buddy - Install
Exit code:
0
Version:
2.0.5453.123
Modules
Images
c:\program files\txgameassistant\appmarket\gamedownload.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\psapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
2168"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="QQExternal" dir=in program="C:\Program Files\TxGameAssistant\AppMarket\QQExternal.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2312"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exeservices.exe
User:
SYSTEM
Company:
Tencent
Integrity Level:
SYSTEM
Description:
腾讯手游助手
Exit code:
0
Version:
2.0.5453.123
Modules
Images
c:\program files\txgameassistant\appmarket\qmemulatorservice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
c:\windows\system32\advapi32.dll
2440"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="GameDownload" dir=in program="C:\Program Files\TxGameAssistant\AppMarket\GameDownload.exe" action=allowC:\Windows\system32\Netsh.exeTinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2456"C:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe" -pkg "com.tencent.ig" -displayname "PUBG MOBILE" -createdesktopicon -from DownloaderC:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
User:
admin
Company:
Tencent
Integrity Level:
HIGH
Description:
Tencent Gaming Buddy
Exit code:
0
Version:
2.0.5453.123
Modules
Images
c:\program files\txgameassistant\appmarket\appmarket.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 357
Read events
436
Write events
919
Delete events
2

Modification events

(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Tencent\MobileGamePC
Operation:writeName:SupplyId
Value:
100103
(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_CURRENT_USER\Software\Tencent\MobileGamePC
Operation:writeName:sf
Value:
C:\Temp\TxGameDownload\MobileGamePCShared
(PID) Process:(2956) TenioDL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2956) TenioDL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2956) TenioDL.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\metnsd\clsid
Operation:writeName:SequenceID
Value:
53845BAD6504E647897657D96FCDE663
(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_CURRENT_USER\Software\Tencent\MobileGamePC
Operation:writeName:UserLanguage
Value:
en
(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_100103_1_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_100103_1_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_100103_1_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(4072) GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GameDownload_PUBG_MOBILE_100103_1_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
213
Suspicious files
101
Text files
558
Unknown types
24

Dropped files

PID
Process
Filename
Type
4072GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeC:\test.tmp
MD5:
SHA256:
2956TenioDL.exeC:\Users\admin\AppData\Local\Temp\etilqs_R1g9xM6feMOxH6e
MD5:
SHA256:
2956TenioDL.exeC:\Users\admin\AppData\Local\Temp\etilqs_e5r3bbIPqVibJNt
MD5:
SHA256:
2956TenioDL.exeC:\Temp\TxGameDownload\Component\AppMarket\Market.exe.ttd
MD5:
SHA256:
2956TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\TenioDL\1502\cache\download.db-journal
MD5:
SHA256:
2956TenioDL.exeC:\Temp\TxGameDownload\Component\AppMarket\Market.exe
MD5:
SHA256:
4072GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LKO8ICX\compoment[1].xmlxml
MD5:
SHA256:
4072GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exeC:\Temp\TxGameDownload\Component\4B9F.tmpxml
MD5:
SHA256:
3976Market.exeC:\Temp\TxGameDownload\Component\AppMarket\Setup\AowGame.xmltext
MD5:
SHA256:
2956TenioDL.exeC:\Users\admin\AppData\Roaming\Tencent\TenioDL\1502\cache\download.dbsqlite
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
75
DNS requests
20
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2956
TenioDL.exe
GET
2.22.146.138:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/other/UI_2.0.5503.123.dat
GB
whitelisted
4072
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
GET
200
203.205.218.69:80
http://syzs.qq.com/downloads/xml/compoment.xml
CN
xml
2.44 Kb
whitelisted
2956
TenioDL.exe
GET
206
2.22.146.138:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/other/Market_2.0.5453.123.dat
GB
binary
6.00 Mb
whitelisted
2956
TenioDL.exe
GET
2.22.146.138:80
http://dlied6.qq.com/invc/xfspeed/qqpcmgr/other/Market_2.0.5453.123.dat
GB
whitelisted
2456
AppMarket.exe
GET
200
23.52.54.47:80
http://pm.myapp.com/invc/xfspeed/qqpcmgr/module_update/emulator/keymap//f23277ff3d371a42d30cf9c526d9a6b4_AowGame.xml
NL
text
8.72 Kb
whitelisted
2456
AppMarket.exe
POST
200
14.17.37.155:80
http://qbwup.imtt.qq.com/
CN
binary
54 b
suspicious
2456
AppMarket.exe
GET
200
203.205.218.69:80
http://syzs.qq.com/downloads/xml/ConfigFileInfo.xml
CN
xml
2.35 Kb
whitelisted
2156
GameDownload.exe
GET
200
203.205.218.69:80
http://syzs.qq.com/downloads/xml/compoment.xml
CN
xml
2.44 Kb
whitelisted
2456
AppMarket.exe
POST
200
203.205.142.202:80
http://masterconn.qq.com/q.cgi
CN
pi3
218 b
whitelisted
2456
AppMarket.exe
GET
200
203.205.218.69:80
http://syzs.qq.com/downloads/xml/ConfigFileInfo.xml
CN
xml
2.35 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4072
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
125.39.248.35:8000
p2pupgrade.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
4072
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
58.250.137.93:443
master.etl.desktop.qq.com
China Unicom Guangdong IP network
CN
malicious
2956
TenioDL.exe
125.39.248.35:8000
p2pupgrade.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
2956
TenioDL.exe
125.39.248.51:8000
ps2.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
2956
TenioDL.exe
220.249.245.24:8000
stun.qqlive.qq.com
China Unicom Shenzen network
CN
unknown
2956
TenioDL.exe
125.39.247.18:14309
config.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
4072
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
203.205.218.69:80
syzs.qq.com
CN
unknown
4072
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
203.205.218.69:443
syzs.qq.com
CN
unknown
2956
TenioDL.exe
125.39.247.217:443
downloadtpt.gamedl.qq.com
CHINA UNICOM China169 Backbone
CN
unknown
2956
TenioDL.exe
101.226.154.30:8443
ga.gamedl.qq.com
China Telecom (Group)
CN
unknown

DNS requests

Domain
IP
Reputation
p2pupgrade.gamedl.qq.com
  • 125.39.248.35
unknown
master.etl.desktop.qq.com
  • 58.250.137.93
whitelisted
stat.gamedl.qq.com
  • 125.39.248.43
unknown
config.gamedl.qq.com
  • 125.39.247.18
whitelisted
stun.qqlive.qq.com
  • 220.249.245.24
suspicious
p2pupdate.gamedl.qq.com
  • 125.39.248.35
unknown
ps2.gamedl.qq.com
  • 125.39.248.51
unknown
syzs.qq.com
  • 203.205.218.69
unknown
c.gj.qq.com
  • 203.205.218.69
unknown
ga.gamedl.qq.com
  • 101.226.154.30
unknown

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
Generic Protocol Command Decode
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
[Downloader] DriverType C: = 3
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
[Downloader] DriverType C: = 3
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
[Downloader] DriverType C: = 3
GameDownload_PUBG_MOBILE_100103_1.0.5226.123.exe
[Downloader] DriverType C: = 3
GameDownload.exe
[Downloader] GetLogicalDrives 4
GameDownload.exe
[Downloader] DriverType C: = 3
GameDownload.exe
[Downloader] GetLogicalDrives 4
GameDownload.exe
[Downloader] DriverType C: = 3