URL:

http://www.mediafire.com/file/4zx7qsvp9c87xkx/MEE6_Controller.rar/file

Full analysis: https://app.any.run/tasks/a3879491-717c-4284-bef2-15a487646974
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 10, 2020, 06:41:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
evasion
Indicators:
MD5:

E056E0D6BEFFBF4DB18A03E9449FD3AB

SHA1:

1E98833158F96BB0DC36DF0C6DE6DA10F5566584

SHA256:

02D44F6A26236B7461430DB99CCFCFFCA6EA9B473955BD656522FC86BF698A92

SSDEEP:

3:N1KJS4w3eGUoR5U2CX69lagzKA:Cc4w3eG15dZ9lXKA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MEE6 Controller - Setup.exe (PID: 2956)
      • MEE6 Controller - Setup.exe (PID: 3948)
      • MEE6 Controller.exe (PID: 2128)
      • MEE6 Controller.exe (PID: 2548)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2896)
      • MEE6 Controller - Setup.tmp (PID: 3212)
      • MEE6 Controller - Setup.exe (PID: 2956)
      • MEE6 Controller - Setup.exe (PID: 3948)
    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1948)
    • Reads Windows owner or organization settings

      • MEE6 Controller - Setup.tmp (PID: 3212)
    • Reads the Windows organization settings

      • MEE6 Controller - Setup.tmp (PID: 3212)
  • INFO

    • Creates files in the user directory

      • iexplore.exe (PID: 2360)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1948)
      • iexplore.exe (PID: 1028)
      • iexplore.exe (PID: 2296)
    • Changes internet zones settings

      • iexplore.exe (PID: 2296)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2360)
      • iexplore.exe (PID: 1028)
      • iexplore.exe (PID: 2296)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1028)
      • iexplore.exe (PID: 2360)
    • Dropped object may contain TOR URL's

      • iexplore.exe (PID: 1028)
    • Application launched itself

      • iexplore.exe (PID: 2296)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2296)
    • Application was dropped or rewritten from another process

      • MEE6 Controller - Setup.tmp (PID: 2308)
      • MEE6 Controller - Setup.tmp (PID: 3212)
    • Creates files in the program directory

      • MEE6 Controller - Setup.tmp (PID: 3212)
    • Manual execution by user

      • MEE6 Controller - Setup.exe (PID: 2956)
      • MEE6 Controller.exe (PID: 2548)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1028)
      • iexplore.exe (PID: 2360)
      • iexplore.exe (PID: 2296)
    • Creates a software uninstall entry

      • MEE6 Controller - Setup.tmp (PID: 3212)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2296)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2296)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
11
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs winrar.exe mee6 controller - setup.exe mee6 controller - setup.tmp no specs mee6 controller - setup.exe mee6 controller - setup.tmp mee6 controller.exe mee6 controller.exe

Process information

PID
CMD
Path
Indicators
Parent process
1028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2296 CREDAT:3937553 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1948C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2128"C:\Program Files\MEE6 Controller\MEE6 Controller.exe"C:\Program Files\MEE6 Controller\MEE6 Controller.exe
MEE6 Controller - Setup.tmp
User:
admin
Integrity Level:
MEDIUM
Description:
MEE6 Controller
Exit code:
3762504530
Version:
1.5
Modules
Images
c:\program files\mee6 controller\mee6 controller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2296"C:\Program Files\Internet Explorer\iexplore.exe" "http://www.mediafire.com/file/4zx7qsvp9c87xkx/MEE6_Controller.rar/file"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2308"C:\Users\admin\AppData\Local\Temp\is-F3P37.tmp\MEE6 Controller - Setup.tmp" /SL5="$8029C,10886353,724992,C:\Users\admin\Desktop\MEE6 Controller - Setup.exe" C:\Users\admin\AppData\Local\Temp\is-F3P37.tmp\MEE6 Controller - Setup.tmpMEE6 Controller - Setup.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-f3p37.tmp\mee6 controller - setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2360"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2296 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2548"C:\Program Files\MEE6 Controller\MEE6 Controller.exe" C:\Program Files\MEE6 Controller\MEE6 Controller.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
MEE6 Controller
Exit code:
3762504530
Version:
1.5
Modules
Images
c:\program files\mee6 controller\mee6 controller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2896"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\MEE6 Controller.rar"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2956"C:\Users\admin\Desktop\MEE6 Controller - Setup.exe" C:\Users\admin\Desktop\MEE6 Controller - Setup.exe
explorer.exe
User:
admin
Company:
Anonyme
Integrity Level:
MEDIUM
Description:
MEE6 Controller Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\desktop\mee6 controller - setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3212"C:\Users\admin\AppData\Local\Temp\is-GSKKA.tmp\MEE6 Controller - Setup.tmp" /SL5="$E0266,10886353,724992,C:\Users\admin\Desktop\MEE6 Controller - Setup.exe" /SPAWNWND=$801F4 /NOTIFYWND=$8029C C:\Users\admin\AppData\Local\Temp\is-GSKKA.tmp\MEE6 Controller - Setup.tmp
MEE6 Controller - Setup.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-gskka.tmp\mee6 controller - setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mpr.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
10 242
Read events
3 275
Write events
4 717
Delete events
2 250

Modification events

(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
369840542
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30811798
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2296) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
7
Suspicious files
184
Text files
140
Unknown types
113

Dropped files

PID
Process
Filename
Type
2360iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\K9MWBJ1S.txt
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\file[1].htmhtml
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab9161.tmp
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\T11KJZXP.txttext
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\prebid2.44.1[1].jstext
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar9162.tmp
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bbinary
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\f[1].txttext
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4344B8AF97AF3A423D9EE52899963CDE_33C46E8C1DD7F664A280A5BE389BC478binary
MD5:
SHA256:
2360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288Bder
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
134
TCP/UDP connections
221
DNS requests
94
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2360
iexplore.exe
GET
200
172.217.16.174:80
http://translate.google.com/translate_a/element.js?cb=googFooterTranslate
US
text
796 b
whitelisted
2360
iexplore.exe
GET
200
104.16.203.237:80
http://www.mediafire.com/images/icons/svg_light/icons_sprite.svg
US
image
8.51 Kb
shared
2360
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2360
iexplore.exe
GET
200
93.184.220.29:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR3enuod9bxDxzpICGW%2B2sabjf17QQUkFj%2FsJx1qFFUd7Ht8qNDFjiebMUCEAqGuQR2WDHiQMxiERAfVzY%3D
US
der
471 b
whitelisted
2360
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2360
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQCWA2Iyxuy1ewIAAAAAY5hv
US
der
472 b
whitelisted
2360
iexplore.exe
GET
200
93.184.220.29:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR3enuod9bxDxzpICGW%2B2sabjf17QQUkFj%2FsJx1qFFUd7Ht8qNDFjiebMUCEAqGuQR2WDHiQMxiERAfVzY%3D
US
der
471 b
whitelisted
2360
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
2360
iexplore.exe
GET
200
172.217.21.195:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDckjq%2BTdztKggAAAAAOpUj
US
der
472 b
whitelisted
2360
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gts1o1/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDckjq%2BTdztKggAAAAAOpUj
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2360
iexplore.exe
104.16.203.237:80
www.mediafire.com
Cloudflare Inc
US
unknown
2360
iexplore.exe
216.58.210.2:443
securepubads.g.doubleclick.net
Google Inc.
US
whitelisted
2360
iexplore.exe
216.58.210.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2360
iexplore.exe
23.45.111.242:443
c.aaxads.com
Akamai International B.V.
NL
unknown
2360
iexplore.exe
172.217.16.174:80
translate.google.com
Google Inc.
US
whitelisted
2360
iexplore.exe
104.19.214.37:443
cdn.otnolatrnup.com
Cloudflare Inc
US
shared
2360
iexplore.exe
216.58.206.10:443
translate.googleapis.com
Google Inc.
US
whitelisted
2360
iexplore.exe
37.252.173.22:80
ib.adnxs.com
AppNexus, Inc
unknown
2360
iexplore.exe
104.16.202.237:80
www.mediafire.com
Cloudflare Inc
US
unknown
2360
iexplore.exe
34.95.120.147:443
mediafire-d.openx.net
US
unknown

DNS requests

Domain
IP
Reputation
www.mediafire.com
  • 104.16.203.237
  • 104.16.202.237
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.googletagmanager.com
  • 216.58.210.8
whitelisted
translate.google.com
  • 172.217.16.174
whitelisted
securepubads.g.doubleclick.net
  • 216.58.210.2
whitelisted
c.aaxads.com
  • 23.45.111.242
whitelisted
cdn.otnolatrnup.com
  • 104.19.214.37
  • 104.19.215.37
whitelisted
translate.googleapis.com
  • 216.58.206.10
whitelisted
static.mediafire.com
  • 104.16.202.237
  • 104.16.203.237
shared

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO TLS Handshake Failure
Potentially Bad Traffic
ET INFO TLS Handshake Failure
Misc activity
ADWARE [PTsecurity] Redirecting.Zemot (RBN ZeroPark 0-Click)
Potentially Bad Traffic
ET INFO TLS Handshake Failure
Potentially Bad Traffic
ET INFO TLS Handshake Failure
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
5 ETPRO signatures available at the full report
No debug info