URL:

https://www.filehorse.com/download-logitech-setpoint-64/download

Full analysis: https://app.any.run/tasks/deb0deed-49d2-4d01-a010-e4d4fa1d478f
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: January 07, 2020, 20:03:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
adware
Indicators:
MD5:

EBFD86C90F84571D32FB3BB6D82879C7

SHA1:

021149D29D0C8891294FF996CC090F203F503AE9

SHA256:

7566BF478A69BED3C4E01F1C72C3D5BE18928F9D3726E964C0953CBDC531D371

SSDEEP:

3:N8DSLQiKbGGBKJJKCsNXKeazp:2OLQpbGN+Keat

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • chrome.exe (PID: 2188)
    • Changes settings of System certificates

      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
    • Application was dropped or rewritten from another process

      • SetPoint6.69.126_64_2666899822.exe (PID: 2300)
      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
      • Setup.exe (PID: 2888)
      • MSetup.exe (PID: 2640)
      • Setup.exe (PID: 2848)
    • Loads dropped or rewritten executable

      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
      • SetPoint6.69.126_64.exe (PID: 1188)
      • Setup.exe (PID: 2848)
      • Setup.exe (PID: 2888)
      • MSetup.exe (PID: 2640)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 532)
      • chrome.exe (PID: 2188)
      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
      • Setup.exe (PID: 2848)
      • SetPoint6.69.126_64.exe (PID: 1188)
    • Cleans NTFS data-stream (Zone Identifier)

      • SetPoint6.69.126_64_2666899822.exe (PID: 2300)
    • Application launched itself

      • SetPoint6.69.126_64_2666899822.exe (PID: 2300)
    • Reads Environment values

      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
    • Adds / modifies Windows certificates

      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
    • Reads internet explorer settings

      • SetPoint6.69.126_64_2666899822.exe (PID: 3300)
    • Creates files in the user directory

      • SetPoint6.69.126_64.exe (PID: 1188)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 532)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 532)
    • Reads the hosts file

      • chrome.exe (PID: 532)
      • chrome.exe (PID: 2188)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 532)
    • Changes settings of System certificates

      • chrome.exe (PID: 532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
40
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs setpoint6.69.126_64_2666899822.exe no specs setpoint6.69.126_64_2666899822.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs setpoint6.69.126_64.exe setup.exe msetup.exe setup.exe

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5463230737136130092 --mojo-platform-channel-handle=5124 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
324"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14271623940658376091 --mojo-platform-channel-handle=488 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
492"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=13820487046094794492 --mojo-platform-channel-handle=4148 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
496"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4126453796852922967 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
532"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.filehorse.com/download-logitech-setpoint-64/download"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
3221225547
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\user32.dll
748"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14848191153130441604 --mojo-platform-channel-handle=4596 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7606463125271942866 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2456 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
820"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=9185001359953030169 --mojo-platform-channel-handle=3820 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
920"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8053996962959732542 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
928"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,14556729556878469094,10528058291061157603,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10219438279490164730 --mojo-platform-channel-handle=4524 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
3 252
Read events
3 079
Write events
167
Delete events
6

Modification events

(PID) Process:(1044) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:532-13222901043912500
Value:
259
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:1512-13197841398593750
Value:
0
(PID) Process:(532) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
38
Suspicious files
172
Text files
628
Unknown types
28

Dropped files

PID
Process
Filename
Type
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\d061a54d-3b82-4c14-bcbc-70075b59e415.tmp
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF39a821.TMPtext
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39a7d3.TMPtext
MD5:
SHA256:
532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
109
DNS requests
66
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3300
SetPoint6.69.126_64_2666899822.exe
HEAD
200
46.166.187.59:80
http://dev.bossgetirr.com/ofr/Solululadul/icut_v2_2
NL
malicious
3300
SetPoint6.69.126_64_2666899822.exe
HEAD
200
46.166.187.59:80
http://dev.bossgetirr.com/ofr/Webinebinec/Webinebinec_Links_13Oct15
NL
malicious
2188
chrome.exe
GET
302
172.217.16.142:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
509 b
whitelisted
2188
chrome.exe
GET
302
172.217.16.142:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
514 b
whitelisted
3300
SetPoint6.69.126_64_2666899822.exe
POST
200
52.210.197.124:80
http://cdn.bossgetirr.com/
IE
malicious
3300
SetPoint6.69.126_64_2666899822.exe
GET
200
209.95.37.242:80
http://ww2.bossgetirr.com/img/Jimomoromoj/Jimomoromoj_logo.png
US
image
2.10 Kb
malicious
532
chrome.exe
GET
200
91.199.212.52:80
http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt
GB
der
1.37 Kb
whitelisted
3300
SetPoint6.69.126_64_2666899822.exe
POST
200
52.210.197.124:80
http://cdn.bossgetirr.com/
IE
malicious
3300
SetPoint6.69.126_64_2666899822.exe
POST
200
52.16.29.135:80
http://support.bossgetirr.com/
IE
text
792 b
malicious
2188
chrome.exe
GET
200
52.222.149.178:80
http://d2vmlyiqlo1vej.cloudfront.net/(lw62n6zx9cxt/SetPoint6.69.126_64.exe
US
executable
2.91 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2188
chrome.exe
172.217.16.163:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2188
chrome.exe
172.217.23.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2188
chrome.exe
172.217.23.141:443
accounts.google.com
Google Inc.
US
whitelisted
2188
chrome.exe
94.31.29.128:443
static.filehorse.com
netDNA
GB
malicious
2188
chrome.exe
104.20.118.116:443
www.filehorse.com
Cloudflare Inc
US
shared
2188
chrome.exe
216.58.208.42:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2188
chrome.exe
172.217.22.98:443
googleads.g.doubleclick.net
Google Inc.
US
whitelisted
2188
chrome.exe
52.222.158.189:443
js.flashtourtower.com
Amazon.com, Inc.
US
unknown
2188
chrome.exe
172.217.22.2:443
pagead2.googlesyndication.com
Google Inc.
US
whitelisted
2188
chrome.exe
216.58.207.46:443
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.23.131
whitelisted
www.filehorse.com
  • 104.20.118.116
  • 104.20.117.116
whitelisted
accounts.google.com
  • 172.217.23.141
shared
fonts.googleapis.com
  • 216.58.208.42
whitelisted
static.filehorse.com
  • 94.31.29.128
whitelisted
js.flashtourtower.com
  • 52.222.158.189
  • 52.222.158.166
  • 52.222.158.33
  • 52.222.158.117
whitelisted
pagead2.googlesyndication.com
  • 172.217.22.2
whitelisted
www.google-analytics.com
  • 216.58.207.46
whitelisted
googleads.g.doubleclick.net
  • 172.217.22.98
whitelisted
stats.g.doubleclick.net
  • 64.233.167.156
  • 64.233.167.157
  • 64.233.167.154
  • 64.233.167.155
whitelisted

Threats

PID
Process
Class
Message
2188
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2188
chrome.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ADWARE [PTsecurity] InstallCore
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ADWARE [PTsecurity] InstallCore
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ADWARE [PTsecurity] InstallCore
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ADWARE [PTsecurity] InstallCore
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ADWARE [PTsecurity] InstallCore
3300
SetPoint6.69.126_64_2666899822.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3300
SetPoint6.69.126_64_2666899822.exe
Misc activity
ADWARE [PTsecurity] InstallCore
Process
Message
Setup.exe
BOOTLOADER: -- Startup did not find file extension [expr=SetVar(level,"1")==SetVar(indent,"2") ]
MSetup.exe
20:05:55:251[2640] C:\Users\admin\AppData\Local\Temp\MSetup_2020-01-07_200555.log