File name:

MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe

Full analysis: https://app.any.run/tasks/cd11d199-fed6-46d2-92dc-ca6cdb5701c2
Verdict: Malicious activity
Analysis date: August 22, 2024, 00:42:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

FBD9AD001BB2719F574C0705C5DE05FB

SHA1:

D07E77A490AD677935AC8213B88237E94440E791

SHA256:

F0031F9D7F25D4D29581879F62565A5A565995899ADC60213F9E218147C78593

SSDEEP:

98304:KfUDapf95UyB+DqQ5a0Ckwu8qdi5HOxLQVRpxIipPJ+txDOKqoRLLbr3qXGFc8H5:jSy53PLUFa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • ColaBoxChecker.exe (PID: 6856)
    • The process drops C-runtime libraries

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
    • Drops the executable file immediately after the start

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • ColaBoxChecker.exe (PID: 6856)
    • Process drops legitimate windows executable

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
    • Executable content was dropped or overwritten

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • ColaBoxChecker.exe (PID: 6856)
    • Drops 7-zip archiver for unpacking

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
    • Reads security settings of Internet Explorer

      • nemu-downloader.exe (PID: 6792)
    • Reads the date of Windows installation

      • nemu-downloader.exe (PID: 6792)
    • Potential Corporate Privacy Violation

      • MuMuDownloader.exe (PID: 6680)
    • Process requests binary or script from the Internet

      • MuMuDownloader.exe (PID: 6680)
  • INFO

    • Create files in a temporary directory

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • nemu-downloader.exe (PID: 6792)
      • ColaBoxChecker.exe (PID: 6856)
      • MuMuDownloader.exe (PID: 6680)
    • Checks supported languages

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • nemu-downloader.exe (PID: 6792)
      • ColaBoxChecker.exe (PID: 6856)
      • HyperVChecker.exe (PID: 7148)
      • MuMuDownloader.exe (PID: 6680)
      • HyperVChecker.exe (PID: 7064)
      • HyperVChecker.exe (PID: 6992)
    • Reads the computer name

      • nemu-downloader.exe (PID: 6792)
      • ColaBoxChecker.exe (PID: 6856)
      • MuMuDownloader.exe (PID: 6680)
    • Process checks computer location settings

      • nemu-downloader.exe (PID: 6792)
    • Reads the software policy settings

      • nemu-downloader.exe (PID: 6792)
    • Creates files in the program directory

      • nemu-downloader.exe (PID: 6792)
    • Reads the machine GUID from the registry

      • MuMuDownloader.exe (PID: 6680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:06:15 13:00:00+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 28672
InitializedDataSize: 126464
UninitializedDataSize: -
EntryPoint: 0x7c84
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 22.0.0.0
ProductVersionNumber: 22.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: NetEase, Inc.
FileDescription: MuMu Player 12
FileVersion: 2022
InternalName: 7zS2.sfx
LegalCopyright: Copyright (C) 2022
OriginalFileName: NemuDownloader.exe
ProductName: MuMu Player 12
ProductVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
13
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe nemu-downloader.exe colaboxchecker.exe conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs mumudownloader.exe conhost.exe no specs mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6660"C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe" C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeexplorer.exe
User:
admin
Company:
NetEase, Inc.
Integrity Level:
MEDIUM
Description:
MuMu Player 12
Exit code:
3221226540
Version:
2022
Modules
Images
c:\users\admin\downloads\mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6680"C:\Users\admin\AppData\Local\Temp\7z185DAA34\MuMuDownloader.exe" --log="C:\Users\admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49726 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=6792C:\Users\admin\AppData\Local\Temp\7z185DAA34\MuMuDownloader.exe
nemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\mumudownloader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6696\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeMuMuDownloader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6708"C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe" C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
explorer.exe
User:
admin
Company:
NetEase, Inc.
Integrity Level:
HIGH
Description:
MuMu Player 12
Version:
2022
Modules
Images
c:\users\admin\downloads\mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6792C:\Users\admin\AppData\Local\Temp\7z185DAA34\nemu-downloader.exe C:\Users\admin\AppData\Local\Temp\7z185DAA34\nemu-downloader.exe
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
User:
admin
Company:
NetEase, Inc.
Integrity Level:
HIGH
Description:
MuMu Player Installer
Version:
1.3.0.1
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\nemu-downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6856"C:\Users\admin\AppData\Local\Temp\7z185DAA34\ColaBoxChecker.exe" checker /baseboardC:\Users\admin\AppData\Local\Temp\7z185DAA34\ColaBoxChecker.exe
nemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\colaboxchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeColaBoxChecker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6992"C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exe" C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exenemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\hypervchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\winhvplatform.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\vid.dll
c:\windows\system32\kernel.appcore.dll
7000\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeHyperVChecker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7064"C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exe" C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exenemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\hypervchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\winhvplatform.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\vid.dll
c:\windows\system32\kernel.appcore.dll
Total events
13 115
Read events
13 104
Write events
11
Delete events
0

Modification events

(PID) Process:(6792) nemu-downloader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NemuServer
Operation:writeName:uuid
Value:
0e99bc47-d4cf-4ae0-8b08-c8b82b5d4081
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NemuServer
Operation:writeName:channel
Value:
gw-overseas12
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NemuServer
Operation:writeName:package
Value:
mumu
Executable files
14
Suspicious files
11
Text files
3
Unknown types
3

Dropped files

PID
Process
Filename
Type
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\config.initext
MD5:D00FB4C61A255B58FF09886C6C72461B
SHA256:77DEC4D79E1E844A2156F101DEFC0FC81C138A989E8BA1C722C58FEB91B3CD4A
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\skin.zipcompressed
MD5:ECB43530CAF9566C1B76D5AF8D2097F1
SHA256:A12381F97AEE2D91568F44B23E866CCC99F0AE5E5961F318ED24B72F4F5DA80A
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\msvcp140.dllexecutable
MD5:FF877A5DFFD764197250BD4BA28496B1
SHA256:83F935454AE8E450B6F042509ECF28CCEFF95EDB2495C63A782B9D45C2EAF1C0
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\msvcp_win.dllexecutable
MD5:F9E704B67ECCD77A18965E9CFA128461
SHA256:F7AC4CEB149EAE5184B957D90EBEDD9BC916CD1BA3053548B637B4E32A7F8A07
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\WinRing0.sysexecutable
MD5:A73EE34A7A50BE60E77CC277A96D7BA8
SHA256:4448BEFF8366E42E3393E8C7F8261AEE0B0340356C31AA3B97DE07452AE01888
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\ColaBoxChecker.exeexecutable
MD5:839708E3F96CF055436FA08D6205263C
SHA256:1373C5D006A5DBCD9B86CFFF9A37616F1245D1333C4ADCEFC7CD18926B98D752
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exeexecutable
MD5:DBD84C6083E4BADF4741D95BA3C9B5F8
SHA256:9FF467BC5A1C377102D25DA9FA9C24DCC4375F456510F71584F0714FDFB2AF39
6856ColaBoxChecker.exeC:\Users\admin\AppData\Local\Temp\winring0.catcat
MD5:5691A9B76C5B0BD1DD83687F5F0E87A1
SHA256:784E031565C67F1D29640C62F0CC205D5B56C1F78BE894252CCE06474B64A618
6680MuMuDownloader.exeC:\Users\admin\AppData\Local\Temp\MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
MD5:
SHA256:
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\WinRing0.infbinary
MD5:F069F20871CB316BFB73C276393D1648
SHA256:07942017E8CAAA1065867AECC561577199E53142545CB6FB41239AE4C607D46B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
41
DNS requests
20
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
5372
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6792
nemu-downloader.exe
GET
200
76.223.88.1:80
http://76.223.88.1/v2/?domain=a11.gdl.netease.com
unknown
unknown
1492
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7124
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1488
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
2928
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6792
nemu-downloader.exe
34.36.47.246:443
api.mumuglobal.com
GOOGLE-CLOUD-PLATFORM
US
unknown
6792
nemu-downloader.exe
23.67.143.122:443
dns.update.easebar.com
AKAMAI-AS
DE
unknown
1488
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6792
nemu-downloader.exe
76.223.88.1:80
AMAZON-02
US
unknown
6680
MuMuDownloader.exe
23.32.238.25:80
Akamai International B.V.
DE
unknown
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
api.mumuglobal.com
  • 34.36.47.246
unknown
dns.update.easebar.com
  • 23.67.143.122
whitelisted
a11.gdl.netease.com
  • 23.48.23.176
  • 23.48.23.155
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted

Threats

PID
Process
Class
Message
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
5 ETPRO signatures available at the full report
No debug info