URL:

https://download.apowersoft.com/down.php?softid=apowermirror

Full analysis: https://app.any.run/tasks/240a48b2-6bd8-4342-8979-28095eab55d5
Verdict: Malicious activity
Analysis date: July 20, 2020, 15:59:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E4BECAC0C362645C99FA79FE8E6C5292

SHA1:

A58DD344F17753C17F9F795E2503D1A9666B4F35

SHA256:

E6C46946DE4C8D28B5202D74A3EEEEB2395751F482BDBC5DBD690EED72AA26C3

SSDEEP:

3:N8SEl22RLR8CNVd8iJyxXXM:2SK2sR8CNVuiJyW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • apowermirror-setup.exe (PID: 1936)
      • apowermirror-setup.exe (PID: 2372)
      • mDNSResponder.exe (PID: 3248)
      • ApowerMirror.exe (PID: 3308)
      • ApowersoftAndroidDaemon.exe (PID: 2128)
      • 7z.exe (PID: 3636)
    • Changes settings of System certificates

      • msiexec.exe (PID: 2236)
    • Loads dropped or rewritten executable

      • apowermirror-setup.exe (PID: 2372)
      • iexplore.exe (PID: 1772)
      • MsiExec.exe (PID: 864)
      • iexplore.exe (PID: 2904)
      • ApowerMirror.exe (PID: 3308)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2020)
      • iexplore.exe (PID: 2408)
      • installer.exe (PID: 2832)
      • installer.tmp (PID: 2144)
      • msiexec.exe (PID: 2236)
      • ApowerMirror.exe (PID: 3308)
    • Reads Windows owner or organization settings

      • installer.tmp (PID: 2144)
    • Reads the Windows organization settings

      • installer.tmp (PID: 2144)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 1556)
      • cmd.exe (PID: 3668)
    • Uses TASKKILL.EXE to kill process

      • installer.tmp (PID: 2144)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 2640)
      • installer.tmp (PID: 2144)
      • cmd.exe (PID: 3820)
    • Starts Microsoft Installer

      • installer.tmp (PID: 2144)
    • Adds / modifies Windows certificates

      • msiexec.exe (PID: 2236)
    • Creates files in the user directory

      • installer.tmp (PID: 2144)
      • ApowerMirror.exe (PID: 3308)
      • 7z.exe (PID: 3636)
    • Creates files in the Windows directory

      • msiexec.exe (PID: 2236)
    • Executed as Windows Service

      • mDNSResponder.exe (PID: 3248)
    • Uses NETSH.EXE for network configuration

      • installer.tmp (PID: 2144)
    • Changes IE settings (feature browser emulation)

      • installer.tmp (PID: 2144)
    • Creates COM task schedule object

      • msiexec.exe (PID: 2236)
    • Executed via COM

      • DllHost.exe (PID: 2080)
    • Reads Internet Cache Settings

      • DllHost.exe (PID: 2080)
    • Starts Internet Explorer

      • apowermirror-setup.exe (PID: 2372)
    • Uses NETSTAT.EXE to discover network connections

      • ApowerMirror.exe (PID: 3308)
    • Reads internet explorer settings

      • ApowerMirror.exe (PID: 3308)
    • Searches for installed software

      • installer.tmp (PID: 2144)
    • Reads Environment values

      • ApowerMirror.exe (PID: 3308)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 2904)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2408)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 2020)
      • iexplore.exe (PID: 2904)
      • iexplore.exe (PID: 1772)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1772)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1772)
      • ApowerMirror.exe (PID: 3308)
      • iexplore.exe (PID: 2904)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1772)
    • Loads dropped or rewritten executable

      • installer.tmp (PID: 2144)
    • Application was dropped or rewritten from another process

      • installer.tmp (PID: 2144)
    • Application launched itself

      • msiexec.exe (PID: 2236)
      • iexplore.exe (PID: 2904)
    • Creates files in the program directory

      • msiexec.exe (PID: 2236)
      • installer.tmp (PID: 2144)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2236)
      • installer.tmp (PID: 2144)
    • Creates files in the user directory

      • iexplore.exe (PID: 1772)
      • iexplore.exe (PID: 2904)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1772)
    • Reads the hosts file

      • ApowerMirror.exe (PID: 3308)
    • Manual execution by user

      • ApowerMirror.exe (PID: 3308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
86
Monitored processes
32
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start iexplore.exe iexplore.exe apowermirror-setup.exe no specs apowermirror-setup.exe installer.exe installer.tmp cmd.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs taskkill.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs taskkill.exe no specs msiexec.exe no specs msiexec.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs mdnsresponder.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs iexplore.exe WinInetBrokerServer no specs iexplore.exe apowermirror.exe 7z.exe no specs netstat.exe no specs apowersoftandroiddaemon.exe

Process information

PID
CMD
Path
Indicators
Parent process
548"msiexec.exe" /i "C:\Program Files\Apowersoft\ApowerMirror\Bonjour.msi" /quietC:\Windows\system32\msiexec.exeinstaller.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
792netstat.exe -aonC:\Windows\system32\netstat.exeApowerMirror.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Netstat Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netstat.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\iphlpapi.dll
864"C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1556C:\Windows\system32\cmd.exe /c tasklist | find "ApowerMirror.exe" C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1752C:\Windows\system32\MsiExec.exe -Embedding D9DB7103AA524E0538E9A7A4030FDD54C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1772"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2904 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1936"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\apowermirror-setup.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\apowermirror-setup.exeiexplore.exe
User:
admin
Company:
Apowersoft
Integrity Level:
MEDIUM
Description:
Apowersoft Installer
Exit code:
3221226540
Version:
1.1.0.2
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\6z2bcoul\apowermirror-setup.exe
c:\systemroot\system32\ntdll.dll
2020"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2408 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2080find "ApowerMirror.exe" C:\Windows\system32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2080C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\imm32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ulib.dll
c:\windows\system32\kernelbase.dll
c:\systemroot\system32\ntdll.dll
c:\windows\system32\dllhost.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
Total events
3 841
Read events
3 087
Write events
723
Delete events
31

Modification events

(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
3733548732
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30826158
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000A3000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
86
Suspicious files
42
Text files
588
Unknown types
24

Dropped files

PID
Process
Filename
Type
2020iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE74.tmp
MD5:
SHA256:
2020iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE75.tmp
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFF9880E8E73BC9D6D.TMP
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\apowermirror-setup.exe.hfsxpeh.partial:Zone.Identifier
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF9CCFCC7B51DE1A25.TMP
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0A486BD5-CAA2-11EA-A84D-12A9866C77DE}.dat
MD5:
SHA256:
2372apowermirror-setup.exeC:\Users\admin\AppData\Local\Temp\installer.exe
MD5:
SHA256:
2144installer.tmpC:\Program Files\Apowersoft\ApowerMirror\is-VN132.tmp
MD5:
SHA256:
2144installer.tmpC:\Program Files\Apowersoft\ApowerMirror\is-5I3JP.tmp
MD5:
SHA256:
2144installer.tmpC:\Program Files\Apowersoft\ApowerMirror\is-A9T1I.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
64
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&app_install_path=C%3A%5CProgram%20Files%5CApowersoft%5CApowerMirror&app_lang=English&apptype=saas&last_stepduration=6&step=2
US
suspicious
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&apptype=saas&installer_version=1.1.0.2&is_old_user=-1&last_stepduration=1&os_available_memory=3059828000&os_culture=0409&os_dpi=100&os_fullname=Microsoft%20Windows%207%20Professional%20&os_lang=en-US&os_resolution=1280x720&os_total_memory=3669616000&os_version=6.1.7601&step=1
US
suspicious
2372
apowermirror-setup.exe
GET
302
47.91.201.11:80
http://download.apowersoft.com/down.php?softid=apowermirrorinstall
HK
suspicious
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&ga_error=&ga_ok=0&ga_response=&gaid=&step=2
US
suspicious
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&installed=1&installed_ts=1595260915&step=2
US
suspicious
2020
iexplore.exe
GET
200
93.184.220.29:80
http://status.rapidssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRhhZrQET0hvbSHUJmNfBKqR%2FiT7wQUU8oXWfxrwAMhLxqu5KqoHIJW2nUCEASHty8Ox3OveE46EN8G65Y%3D
US
der
471 b
shared
2020
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAyO4MkNaokViAQGHuJB%2Ba8%3D
US
der
471 b
whitelisted
2020
iexplore.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
1772
iexplore.exe
GET
302
47.91.201.11:80
http://r.aoscdn.com/jumper?type=install&product_id=113&language=en&unique_id=e615529a4cd3aafaed2134f189cbbfa2&apptype=saas&appver=1.4.9.17&first_install_ts=1595260915&ts=1595260915&hash=50d0fc1ccea6602299a3b696ccedf521
HK
html
788 b
suspicious
1772
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDKxK7UiptfCgIAAAAAcVw7
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2020
iexplore.exe
13.225.84.56:443
d31gfrlvpyxnbz.cloudfront.net
US
malicious
2372
apowermirror-setup.exe
47.244.67.197:80
wx-user-behavior.cn-hongkong.log.aliyuncs.com
US
suspicious
2020
iexplore.exe
23.37.43.27:80
s.symcd.com
Akamai Technologies, Inc.
NL
whitelisted
2372
apowermirror-setup.exe
47.91.201.11:80
download.apowersoft.com
Alibaba (China) Technology Co., Ltd.
HK
suspicious
2372
apowermirror-setup.exe
13.225.84.56:443
d31gfrlvpyxnbz.cloudfront.net
US
malicious
2372
apowermirror-setup.exe
13.225.84.100:443
d31gfrlvpyxnbz.cloudfront.net
US
suspicious
1772
iexplore.exe
47.91.201.11:80
download.apowersoft.com
Alibaba (China) Technology Co., Ltd.
HK
suspicious
1772
iexplore.exe
47.252.13.107:443
www.apowersoft.com
Alibaba (China) Technology Co., Ltd.
US
suspicious
1772
iexplore.exe
13.225.84.208:443
d2c5tcoxk3fh48.cloudfront.net
US
unknown
1772
iexplore.exe
13.224.186.226:443
d1crw3amil6zbr.cloudfront.net
US
unknown

DNS requests

Domain
IP
Reputation
download.apowersoft.com
  • 47.91.201.11
suspicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
status.rapidssl.com
  • 93.184.220.29
shared
d31gfrlvpyxnbz.cloudfront.net
  • 13.225.84.56
  • 13.225.84.100
  • 13.225.84.29
  • 13.225.84.109
whitelisted
s.symcd.com
  • 23.37.43.27
shared
wx-user-behavior.cn-hongkong.log.aliyuncs.com
  • 47.244.67.197
  • 47.244.67.196
  • 47.244.67.195
  • 47.244.67.194
  • 47.244.67.193
  • 47.244.67.192
  • 47.244.67.191
  • 47.90.119.19
  • 47.89.5.161
  • 47.52.212.53
suspicious
download.aoscdn.com
  • 47.91.201.11
suspicious
dns.msftncsi.com
  • 131.107.255.255
shared
r.aoscdn.com
  • 47.91.201.11
suspicious
www.apowersoft.com
  • 47.252.13.107
suspicious

Threats

No threats detected
No debug info