File name:

MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe

Full analysis: https://app.any.run/tasks/cd11d199-fed6-46d2-92dc-ca6cdb5701c2
Verdict: Malicious activity
Analysis date: August 22, 2024, 00:42:58
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

FBD9AD001BB2719F574C0705C5DE05FB

SHA1:

D07E77A490AD677935AC8213B88237E94440E791

SHA256:

F0031F9D7F25D4D29581879F62565A5A565995899ADC60213F9E218147C78593

SSDEEP:

98304:KfUDapf95UyB+DqQ5a0Ckwu8qdi5HOxLQVRpxIipPJ+txDOKqoRLLbr3qXGFc8H5:jSy53PLUFa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • ColaBoxChecker.exe (PID: 6856)
    • Executable content was dropped or overwritten

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • ColaBoxChecker.exe (PID: 6856)
    • Drops the executable file immediately after the start

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • ColaBoxChecker.exe (PID: 6856)
    • Process drops legitimate windows executable

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
    • The process drops C-runtime libraries

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
    • Drops 7-zip archiver for unpacking

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
    • Reads security settings of Internet Explorer

      • nemu-downloader.exe (PID: 6792)
    • Reads the date of Windows installation

      • nemu-downloader.exe (PID: 6792)
    • Potential Corporate Privacy Violation

      • MuMuDownloader.exe (PID: 6680)
    • Process requests binary or script from the Internet

      • MuMuDownloader.exe (PID: 6680)
  • INFO

    • Checks supported languages

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • nemu-downloader.exe (PID: 6792)
      • ColaBoxChecker.exe (PID: 6856)
      • HyperVChecker.exe (PID: 7064)
      • HyperVChecker.exe (PID: 6992)
      • HyperVChecker.exe (PID: 7148)
      • MuMuDownloader.exe (PID: 6680)
    • Create files in a temporary directory

      • MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe (PID: 6708)
      • nemu-downloader.exe (PID: 6792)
      • ColaBoxChecker.exe (PID: 6856)
      • MuMuDownloader.exe (PID: 6680)
    • Reads the computer name

      • nemu-downloader.exe (PID: 6792)
      • ColaBoxChecker.exe (PID: 6856)
      • MuMuDownloader.exe (PID: 6680)
    • Reads the software policy settings

      • nemu-downloader.exe (PID: 6792)
    • Process checks computer location settings

      • nemu-downloader.exe (PID: 6792)
    • Reads the machine GUID from the registry

      • MuMuDownloader.exe (PID: 6680)
    • Creates files in the program directory

      • nemu-downloader.exe (PID: 6792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:06:15 13:00:00+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 28672
InitializedDataSize: 126464
UninitializedDataSize: -
EntryPoint: 0x7c84
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 22.0.0.0
ProductVersionNumber: 22.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: NetEase, Inc.
FileDescription: MuMu Player 12
FileVersion: 2022
InternalName: 7zS2.sfx
LegalCopyright: Copyright (C) 2022
OriginalFileName: NemuDownloader.exe
ProductName: MuMu Player 12
ProductVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
13
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe nemu-downloader.exe colaboxchecker.exe conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs hypervchecker.exe no specs conhost.exe no specs mumudownloader.exe conhost.exe no specs mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6660"C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe" C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeexplorer.exe
User:
admin
Company:
NetEase, Inc.
Integrity Level:
MEDIUM
Description:
MuMu Player 12
Exit code:
3221226540
Version:
2022
Modules
Images
c:\users\admin\downloads\mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6680"C:\Users\admin\AppData\Local\Temp\7z185DAA34\MuMuDownloader.exe" --log="C:\Users\admin\AppData\Local\Temp\nemu-downloader-aria.log" --log-level=notice --check-certificate=false --enable-rpc=true --rpc-listen-port=49726 --continue --max-concurrent-downloads=10 --max-connection-per-server=5 --async-dns=false --file-allocation=prealloc --enable-mmap=true --connect-timeout=5 --rpc-max-request-size=1024M --stop-with-process=6792C:\Users\admin\AppData\Local\Temp\7z185DAA34\MuMuDownloader.exe
nemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\mumudownloader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6696\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeMuMuDownloader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6708"C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe" C:\Users\admin\Downloads\MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
explorer.exe
User:
admin
Company:
NetEase, Inc.
Integrity Level:
HIGH
Description:
MuMu Player 12
Version:
2022
Modules
Images
c:\users\admin\downloads\mumuinstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6792C:\Users\admin\AppData\Local\Temp\7z185DAA34\nemu-downloader.exe C:\Users\admin\AppData\Local\Temp\7z185DAA34\nemu-downloader.exe
MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exe
User:
admin
Company:
NetEase, Inc.
Integrity Level:
HIGH
Description:
MuMu Player Installer
Version:
1.3.0.1
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\nemu-downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6856"C:\Users\admin\AppData\Local\Temp\7z185DAA34\ColaBoxChecker.exe" checker /baseboardC:\Users\admin\AppData\Local\Temp\7z185DAA34\ColaBoxChecker.exe
nemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\colaboxchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeColaBoxChecker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6992"C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exe" C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exenemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\hypervchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\winhvplatform.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\vid.dll
c:\windows\system32\kernel.appcore.dll
7000\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeHyperVChecker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7064"C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exe" C:\Users\admin\AppData\Local\Temp\7z185DAA34\HyperVChecker.exenemu-downloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7z185daa34\hypervchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\winhvplatform.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\vid.dll
c:\windows\system32\kernel.appcore.dll
Total events
13 115
Read events
13 104
Write events
11
Delete events
0

Modification events

(PID) Process:(6792) nemu-downloader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NemuServer
Operation:writeName:uuid
Value:
0e99bc47-d4cf-4ae0-8b08-c8b82b5d4081
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NemuServer
Operation:writeName:channel
Value:
gw-overseas12
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6792) nemu-downloader.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NemuServer
Operation:writeName:package
Value:
mumu
Executable files
14
Suspicious files
11
Text files
3
Unknown types
3

Dropped files

PID
Process
Filename
Type
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\WinRing0x64.infbinary
MD5:0F6D3047D1B670058D71C411707EF16E
SHA256:3FDED2F4457B0BEB415B841B40F6EDE5ED527DD537E53E2F70F2FB4A6E24EBFD
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\config.initext
MD5:D00FB4C61A255B58FF09886C6C72461B
SHA256:77DEC4D79E1E844A2156F101DEFC0FC81C138A989E8BA1C722C58FEB91B3CD4A
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\winring0x64.catcat
MD5:E7CEE7F541C057F490D486927D659122
SHA256:317D01D9956F052D929FDBAC258F1A2DC5163D3432FC488023A1F4D332AE3D45
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\winring0.catcat
MD5:5691A9B76C5B0BD1DD83687F5F0E87A1
SHA256:784E031565C67F1D29640C62F0CC205D5B56C1F78BE894252CCE06474B64A618
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\nemu-downloader.exeexecutable
MD5:CDF8047CEAE80D9CD9EB798A57BF6084
SHA256:1F01A9ABAC64FAE72E0A253AD9FFE2D62CD2967C1C2BC90FB956AC446FE2B11E
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\MuMuDownloader.exeexecutable
MD5:2F3D77B4F587F956E9987598B0A218EB
SHA256:2F980C56D81F42BA47DC871A04406976DC490DED522131CE9A2E35C40CA8616E
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\WinRing0.infbinary
MD5:F069F20871CB316BFB73C276393D1648
SHA256:07942017E8CAAA1065867AECC561577199E53142545CB6FB41239AE4C607D46B
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\vcruntime140.dllexecutable
MD5:1E6E97D60D411A2DEE8964D3D05ADB15
SHA256:8598940E498271B542F2C04998626AA680F2172D0FF4F8DBD4FFEC1A196540F9
6680MuMuDownloader.exeC:\Users\admin\AppData\Local\Temp\MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
MD5:
SHA256:
6708MuMuInstaller_3.1.7.0_gw-overseas12_all_1712735105.exeC:\Users\admin\AppData\Local\Temp\7z185DAA34\skin.zipcompressed
MD5:ECB43530CAF9566C1B76D5AF8D2097F1
SHA256:A12381F97AEE2D91568F44B23E866CCC99F0AE5E5961F318ED24B72F4F5DA80A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
41
DNS requests
20
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
5372
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6792
nemu-downloader.exe
GET
200
76.223.88.1:80
http://76.223.88.1/v2/?domain=a11.gdl.netease.com
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
6680
MuMuDownloader.exe
GET
23.32.238.25:80
http://23.32.238.25:80/MuMuNG-setup-V3.8.18.2845-overseas-0417125205.exe
unknown
unknown
7124
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1492
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1488
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
2928
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6792
nemu-downloader.exe
34.36.47.246:443
api.mumuglobal.com
GOOGLE-CLOUD-PLATFORM
US
unknown
6792
nemu-downloader.exe
23.67.143.122:443
dns.update.easebar.com
AKAMAI-AS
DE
unknown
1488
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6792
nemu-downloader.exe
76.223.88.1:80
AMAZON-02
US
unknown
6680
MuMuDownloader.exe
23.32.238.25:80
Akamai International B.V.
DE
unknown
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
api.mumuglobal.com
  • 34.36.47.246
unknown
dns.update.easebar.com
  • 23.67.143.122
whitelisted
a11.gdl.netease.com
  • 23.48.23.176
  • 23.48.23.155
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted

Threats

PID
Process
Class
Message
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
6680
MuMuDownloader.exe
A Network Trojan was detected
ET USER_AGENTS Aria2 User-Agent
5 ETPRO signatures available at the full report
No debug info