File name:

na.exe

Full analysis: https://app.any.run/tasks/03630374-5fd6-47ec-8d58-7d745fa3fb4b
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 15, 2019, 14:20:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

ED74E277414E5E269959089350B40FF9

SHA1:

A720C5DAACF4BA3AFA8B9AFF094DCDC8114DA39B

SHA256:

1D7EB8F243F62E68BF8FBBA4F2DE38FE598DAB72658A350581879EE8C54C97C9

SSDEEP:

98304:5hERX3fXdv071FCgeg0nJpR6CfiSy/jPI82ShalO9BG0nOtMhA+vZf2Vn9p:5hc+fehs/jPI82S0OFnOtV4Zf2Vn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • na.exe (PID: 2068)
    • Application was dropped or rewritten from another process

      • aa7b8d2c20e2dc20e54c.MSID67F.tmp (PID: 2836)
      • desktop_media_service.exe (PID: 1704)
      • desktop_media_service.exe (PID: 2380)
      • desktop_media_service.exe (PID: 2132)
      • watchdog.exe (PID: 3632)
    • Connects to CnC server

      • MsiExec.exe (PID: 2168)
      • desktop_media_service.exe (PID: 1704)
    • Loads the Task Scheduler COM API

      • MsiExec.exe (PID: 3544)
    • Loads the Task Scheduler DLL interface

      • na.exe (PID: 2068)
  • SUSPICIOUS

    • Creates files in the user directory

      • na.exe (PID: 2068)
    • Executable content was dropped or overwritten

      • na.exe (PID: 2068)
      • MSID67F.tmp (PID: 1936)
      • msiexec.exe (PID: 868)
    • Reads Environment values

      • MsiExec.exe (PID: 324)
      • MsiExec.exe (PID: 2168)
      • MsiExec.exe (PID: 3544)
    • Starts Microsoft Installer

      • na.exe (PID: 2068)
    • Low-level read access rights to disk partition

      • msconfig.exe (PID: 3364)
    • Checks for external IP

      • desktop_media_service.exe (PID: 1704)
    • Creates a software uninstall entry

      • desktop_media_service.exe (PID: 1704)
    • Reads internet explorer settings

      • mmc.exe (PID: 1656)
  • INFO

    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 324)
      • MsiExec.exe (PID: 2168)
      • MsiExec.exe (PID: 3544)
    • Searches for installed software

      • msiexec.exe (PID: 868)
    • Changes settings of System certificates

      • DrvInst.exe (PID: 3668)
    • Adds / modifies Windows certificates

      • DrvInst.exe (PID: 3668)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3352)
    • Application launched itself

      • msiexec.exe (PID: 868)
    • Application was dropped or rewritten from another process

      • MSID67F.tmp (PID: 1936)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 868)
    • Creates a software uninstall entry

      • MsiExec.exe (PID: 2168)
      • msiexec.exe (PID: 868)
    • Creates files in the program directory

      • msiexec.exe (PID: 868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:03:20 20:48:06+01:00
PEType: PE32
LinkerVersion: 14.16
CodeSize: 1505792
InitializedDataSize: 598528
UninitializedDataSize: -
EntryPoint: 0x121965
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Installer
FileVersion: 1
InternalName: setup_3.6.0
LegalCopyright: Copyright (C)
ProductName: setup

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 20-Mar-2019 19:48:06
Detected languages:
  • English - United States
Debug artifacts:
  • C:\JobRelease\win\Release\stubs\x86\ExternalUi.pdb
FileDescription: Installer
FileVersion: 1.0
InternalName: setup_3.6.0
LegalCopyright: Copyright (C)
ProductName: setup

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 20-Mar-2019 19:48:06
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0016F82F
0x0016FA00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.44146
.rdata
0x00171000
0x0005ED8E
0x0005EE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.5644
.data
0x001D0000
0x00007114
0x00005400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.10655
.rsrc
0x001D8000
0x000151C4
0x00015200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.34268
.reloc
0x001EE000
0x00018DC0
0x00018E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.56636

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.18998
1909
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.1591
9640
Latin 1 / Western European
English - United States
RT_ICON
3
3.46873
4264
Latin 1 / Western European
English - United States
RT_ICON
4
3.54157
2440
Latin 1 / Western European
English - United States
RT_ICON
5
4.01317
1128
Latin 1 / Western European
English - United States
RT_ICON
9
3.37783
1116
Latin 1 / Western European
English - United States
RT_STRING
10
3.35254
1888
Latin 1 / Western European
English - United States
RT_STRING
11
3.31743
760
Latin 1 / Western European
English - United States
RT_STRING
12
3.23118
1432
Latin 1 / Western European
English - United States
RT_STRING
13
3.35766
820
Latin 1 / Western European
English - United States
RT_STRING

Imports

KERNEL32.dll
msi.dll (delay-loaded)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
21
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start na.exe msiexec.exe msiexec.exe no specs msiexec.exe no specs vssvc.exe no specs drvinst.exe no specs msiexec.exe msid67f.tmp aa7b8d2c20e2dc20e54c.msid67f.tmp no specs msiexec.exe no specs HNetCfg.FwPolicy2 no specs desktop_media_service.exe msconfig.exe no specs msconfig.exe desktop_media_service.exe no specs watchdog.exe no specs desktop_media_service.exe no specs taskmgr.exe no specs mmc.exe no specs mmc.exe na.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
324C:\Windows\system32\MsiExec.exe -Embedding 49B2DCA73881A45FB1FCC48934DDD043 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
868C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1300C:\Windows\system32\DllHost.exe /Processid:{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}C:\Windows\system32\DllHost.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1656"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" C:\Windows\system32\mmc.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Management Console
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mmc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mfc42u.dll
1704"C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe" --serviceC:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\program files\jetmedia\nativedesktopmediaservice\desktop_media_service.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1936"C:\Windows\Installer\MSID67F.tmp" /p="C:\Users\admin\AppData\Local\Temp\na.exe" /p="C:\Users\admin\AppData\Roaming\Jetmedia\NativeDesktopMediaService 3.6.0\install\2CF5F20\NetworkDesktopMedia.msi" /p="C:\Program Files\Jetmedia\NativeDesktopMediaService" /p="" /p=""C:\Windows\Installer\MSID67F.tmp
msiexec.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\installer\msid67f.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2060"C:\Users\admin\AppData\Local\Temp\na.exe" C:\Users\admin\AppData\Local\Temp\na.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Installer
Exit code:
3221226540
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\na.exe
2068"C:\Users\admin\AppData\Local\Temp\na.exe" C:\Users\admin\AppData\Local\Temp\na.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Installer
Exit code:
0
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\na.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2132"C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe" C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\jetmedia\nativedesktopmediaservice\desktop_media_service.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2168C:\Windows\system32\MsiExec.exe -Embedding 741C57D0CF1B51D76317854E85C1BA03C:\Windows\system32\MsiExec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 145
Read events
802
Write events
327
Delete events
16

Modification events

(PID) Process:(868) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000D0586777290BD50164030000E40B0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(868) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000D0586777290BD50164030000E40B0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(868) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
20
(PID) Process:(868) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4000000000000000A4338D7A290BD50164030000E40B0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(868) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000FE958F7A290BD50164030000380A0000E80300000100000000000000000000000073688AA495A3438172DF1D533883C10000000000000000
(PID) Process:(3352) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000826DA77A290BD501180D000018080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3352) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000826DA77A290BD501180D0000600A0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3352) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000826DA77A290BD501180D0000D0030000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3352) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000826DA77A290BD501180D0000A00F0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3352) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
40000000000000009094AE7A290BD501180D0000600A0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
Executable files
16
Suspicious files
9
Text files
126
Unknown types
1

Dropped files

PID
Process
Filename
Type
2068na.exeC:\Users\admin\AppData\Roaming\Jetmedia\NativeDesktopMediaService 3.6.0\install\2CF5F20\NetworkDesktopMedia.msi
MD5:
SHA256:
2068na.exeC:\Users\admin\AppData\Local\Temp\MSI8550.tmp
MD5:
SHA256:
868msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
868msiexec.exeC:\Windows\Installer\13d257.msi
MD5:
SHA256:
868msiexec.exeC:\Windows\Installer\MSID640.tmp
MD5:
SHA256:
3352vssvc.exeC:
MD5:
SHA256:
868msiexec.exeC:\Windows\Installer\MSIE3DE.tmp
MD5:
SHA256:
868msiexec.exeC:\Windows\Installer\MSIE4D9.tmp
MD5:
SHA256:
868msiexec.exeC:\Windows\Installer\MSIE509.tmp
MD5:
SHA256:
868msiexec.exeC:\Windows\Installer\MSIC2C.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
22
DNS requests
14
Threats
26

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1704
desktop_media_service.exe
GET
200
185.194.141.58:80
http://ip-api.com:80/json
DE
text
298 b
malicious
1704
desktop_media_service.exe
POST
200
199.217.118.146:40000
http://ylsuest.com:40000/tickets
US
malicious
1704
desktop_media_service.exe
POST
200
199.217.118.146:40000
http://ylsuest.com:40000/tickets
US
malicious
1704
desktop_media_service.exe
POST
200
104.27.140.75:80
http://ss1.eventincoandhar.info/
US
text
128 b
malicious
2168
MsiExec.exe
POST
200
104.27.140.75:80
http://tm1.eventincoandhar.info/
US
text
152 b
malicious
1704
desktop_media_service.exe
POST
200
104.27.140.75:80
http://sc1.eventincoandhar.info/
US
text
128 b
malicious
1704
desktop_media_service.exe
POST
200
104.27.140.75:80
http://sc1.eventincoandhar.info/
US
text
128 b
malicious
1704
desktop_media_service.exe
POST
200
104.27.140.75:80
http://sc1.eventincoandhar.info/
US
text
128 b
malicious
2168
MsiExec.exe
POST
200
104.27.141.75:80
http://inf1.eventincoandhar.info/
US
text
128 b
malicious
1704
desktop_media_service.exe
POST
200
104.27.140.75:80
http://sc1.eventincoandhar.info/
US
text
128 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2168
MsiExec.exe
104.27.140.75:80
tm1.eventincoandhar.info
Cloudflare Inc
US
shared
2168
MsiExec.exe
199.217.118.146:40000
knsemis.com
server4you Inc.
US
malicious
1704
desktop_media_service.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
1704
desktop_media_service.exe
104.27.140.75:80
tm1.eventincoandhar.info
Cloudflare Inc
US
shared
1704
desktop_media_service.exe
93.184.216.34:80
example.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1704
desktop_media_service.exe
207.38.88.89:80
efiwuniq.com
server4you Inc.
US
unknown
2168
MsiExec.exe
104.27.141.75:80
tm1.eventincoandhar.info
Cloudflare Inc
US
shared
1704
desktop_media_service.exe
209.126.111.10:443
geo.geosurf.io
server4you Inc.
US
suspicious
1704
desktop_media_service.exe
199.217.118.146:40000
knsemis.com
server4you Inc.
US
malicious
1704
desktop_media_service.exe
209.126.117.38:443
server4you Inc.
US
unknown

DNS requests

Domain
IP
Reputation
tm1.eventincoandhar.info
  • 104.27.140.75
  • 104.27.141.75
malicious
knsemis.com
  • 199.217.118.146
malicious
ins1.eventincoandhar.info
  • 104.27.140.75
  • 104.27.141.75
malicious
ip-api.com
  • 185.194.141.58
malicious
example.com
  • 93.184.216.34
whitelisted
sc1.eventincoandhar.info
  • 104.27.140.75
  • 104.27.141.75
malicious
ss1.eventincoandhar.info
  • 104.27.140.75
  • 104.27.141.75
malicious
ylsuest.com
  • 199.217.118.146
malicious
efiwuniq.com
  • 207.38.88.89
unknown
krsewiq.com
  • 199.217.118.146
malicious

Threats

PID
Process
Class
Message
2168
MsiExec.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
2168
MsiExec.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Jetmedia.A
2168
MsiExec.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
1704
desktop_media_service.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
1704
desktop_media_service.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
1704
desktop_media_service.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
1704
desktop_media_service.exe
A Network Trojan was detected
MALWARE [PTsecurity] Win32/Jetmedia.A
1704
desktop_media_service.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
1704
desktop_media_service.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
1704
desktop_media_service.exe
Misc activity
ADWARE [PTsecurity] Win32.Risk.Uws.SystemHealer
10 ETPRO signatures available at the full report
No debug info