URL:

http://download.adlice.com/RogueKiller/Beta/14/setup.exe

Full analysis: https://app.any.run/tasks/ef910c9b-7c85-47de-a1b2-731a2fdb8071
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: October 31, 2019, 14:21:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
installcore
pup
trojan
pony
fareit
opendir
Indicators:
MD5:

A3F67C52999C95BAEB01DA0167CDBC3A

SHA1:

D5AA827D0BAB32CF39926FA6342E1C8B944C9E1E

SHA256:

E16863B4AA2151D23F96782C4E066BFB8004C3389EA5BAA3ECF186C934B2D375

SSDEEP:

3:N1KaKElVGdv5XKomph4A:Ca5uv5M4A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 3584)
      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 532)
      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 2388)
      • setup.exe (PID: 2372)
      • setup.exe (PID: 2952)
      • RogueKillerSvc.exe (PID: 4036)
      • RogueKillerSvc.exe (PID: 3612)
      • RogueKiller.exe (PID: 1328)
      • RogueKiller.exe (PID: 3568)
      • nmoniboy[1].exe (PID: 2744)
      • blessme.exe (PID: 3464)
      • blessme.exe (PID: 2060)
    • INSTALLCORE was detected

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 3584)
    • Connects to CnC server

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 3584)
      • blessme.exe (PID: 3464)
    • Loads the Task Scheduler COM API

      • RogueKiller.exe (PID: 3568)
    • Loads the Task Scheduler DLL interface

      • RogueKiller.exe (PID: 3568)
    • Registers / Runs the DLL via REGSVR32.EXE

      • RogueKiller.exe (PID: 3568)
    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 1936)
    • Detected Pony/Fareit Trojan

      • blessme.exe (PID: 3464)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 3972)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 1884)
      • iexplore.exe (PID: 1740)
    • Actions looks like stealing of personal data

      • blessme.exe (PID: 3464)
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 2304)
      • RogueKillerSvc.exe (PID: 3612)
      • RogueKillerSvc.exe (PID: 4036)
      • RogueKiller.exe (PID: 3568)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 2304)
      • iexplore.exe (PID: 1884)
      • iexplore.exe (PID: 1400)
      • setup.exe (PID: 2372)
      • setup.exe (PID: 2952)
      • setup.tmp (PID: 3332)
      • iexplore.exe (PID: 1740)
      • RogueKillerSvc.exe (PID: 3612)
      • nmoniboy[1].exe (PID: 2744)
      • RogueKiller.exe (PID: 3568)
    • Application launched itself

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 532)
      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 3584)
      • blessme.exe (PID: 2060)
    • Cleans NTFS data-stream (Zone Identifier)

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 532)
      • firefox.exe (PID: 2304)
    • Reads Environment values

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 3584)
    • Reads internet explorer settings

      • IObitUninstallerPro9.1.0.11()2019[1].exe (PID: 3584)
    • Low-level read access rights to disk partition

      • setup.tmp (PID: 3332)
      • RogueKillerSvc.exe (PID: 4036)
      • RogueKiller.exe (PID: 3568)
      • RogueKillerSvc.exe (PID: 3612)
    • Executed as Windows Service

      • RogueKillerSvc.exe (PID: 3612)
    • Creates files in the Windows directory

      • RogueKillerSvc.exe (PID: 3612)
      • RogueKiller.exe (PID: 3568)
    • Removes files from Windows directory

      • RogueKillerSvc.exe (PID: 3612)
      • RogueKiller.exe (PID: 3568)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 1936)
    • Starts Internet Explorer

      • RogueKiller.exe (PID: 3568)
    • Creates files in the driver directory

      • RogueKillerSvc.exe (PID: 3612)
      • RogueKiller.exe (PID: 3568)
    • Creates or modifies windows services

      • RogueKillerSvc.exe (PID: 3612)
      • RogueKiller.exe (PID: 3568)
    • Executes scripts

      • nmoniboy[1].exe (PID: 2744)
    • Starts itself from another location

      • nmoniboy[1].exe (PID: 2744)
    • Starts CMD.EXE for commands execution

      • blessme.exe (PID: 3464)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 2304)
      • iexplore.exe (PID: 1740)
    • Reads CPU info

      • firefox.exe (PID: 2304)
    • Application launched itself

      • firefox.exe (PID: 2304)
      • firefox.exe (PID: 1752)
      • iexplore.exe (PID: 1400)
      • iexplore.exe (PID: 932)
    • Changes internet zones settings

      • iexplore.exe (PID: 1400)
      • iexplore.exe (PID: 932)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1884)
      • iexplore.exe (PID: 1740)
    • Manual execution by user

      • iexplore.exe (PID: 1400)
      • RogueKiller.exe (PID: 3568)
      • RogueKiller.exe (PID: 1328)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1884)
      • iexplore.exe (PID: 1400)
      • iexplore.exe (PID: 1740)
    • Creates files in the user directory

      • firefox.exe (PID: 2304)
      • iexplore.exe (PID: 1400)
      • iexplore.exe (PID: 1740)
      • iexplore.exe (PID: 932)
    • Reads settings of System Certificates

      • firefox.exe (PID: 2304)
      • pingsender.exe (PID: 2532)
    • Application was dropped or rewritten from another process

      • setup.tmp (PID: 1940)
      • setup.tmp (PID: 3332)
    • Loads dropped or rewritten executable

      • setup.tmp (PID: 3332)
    • Creates files in the program directory

      • setup.tmp (PID: 3332)
    • Creates a software uninstall entry

      • setup.tmp (PID: 3332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
83
Monitored processes
29
Malicious processes
8
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe iexplore.exe iexplore.exe iobituninstallerpro9.1.0.11()2019[1].exe no specs #INSTALLCORE iobituninstallerpro9.1.0.11()2019[1].exe iobituninstallerpro9.1.0.11()2019[1].exe no specs setup.exe setup.tmp no specs setup.exe pingsender.exe setup.tmp roguekillersvc.exe roguekillersvc.exe roguekiller.exe no specs roguekiller.exe regsvr32.exe no specs iexplore.exe no specs iexplore.exe regsvr32.exe no specs nmoniboy[1].exe wscript.exe blessme.exe no specs #PONY blessme.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
532"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\IObitUninstallerPro9.1.0.11()2019[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\IObitUninstallerPro9.1.0.11()2019[1].exeiexplore.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Seso Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\lh043oam\iobituninstallerpro9.1.0.11()2019[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
932"C:\Program Files\Internet Explorer\iexplore.exe" "https://adlice.com/thanks-downloading-roguekiller/?utm_campaign=roguekiller&utm_source=soft&utm_medium=btn"C:\Program Files\Internet Explorer\iexplore.exeRogueKiller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1328"C:\Program Files\RogueKiller\RogueKiller.exe" C:\Program Files\RogueKiller\RogueKiller.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\program files\roguekiller\roguekiller.exe
c:\systemroot\system32\ntdll.dll
1400"C:\Program Files\Internet Explorer\iexplore.exe" C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1740"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:932 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1752"C:\Program Files\Mozilla Firefox\firefox.exe" "http://download.adlice.com/RogueKiller/Beta/14/setup.exe"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
1884"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1400 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1936"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\RogueKiller\roguekillershell.dll"C:\Windows\system32\regsvr32.exeRogueKiller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1940"C:\Users\admin\AppData\Local\Temp\is-R7853.tmp\setup.tmp" /SL5="$60260,45010640,136192,C:\Users\admin\Downloads\setup.exe" C:\Users\admin\AppData\Local\Temp\is-R7853.tmp\setup.tmpsetup.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-r7853.tmp\setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2060"C:\Users\admin\subfolder\blessme.exe" C:\Users\admin\subfolder\blessme.exenmoniboy[1].exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.02.0004
Modules
Images
c:\users\admin\subfolder\blessme.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
5 008
Read events
4 620
Write events
372
Delete events
16

Modification events

(PID) Process:(2304) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
DAA8191803000000
(PID) Process:(1752) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
18BE161803000000
(PID) Process:(2304) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(2304) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2304) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000092000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(1400) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1400) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1400) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1400) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(1400) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
17
Suspicious files
119
Text files
699
Unknown types
71

Dropped files

PID
Process
Filename
Type
2304firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.binbinary
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\base-track-digest256.sbstorebinary
MD5:
SHA256:
2304firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
86
DNS requests
91
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1740
iexplore.exe
GET
85.187.154.106:80
http://amabai.org/admin/_outputA82D10F.exe
US
suspicious
2304
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2304
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
1884
iexplore.exe
GET
200
34.247.226.78:80
http://www.petedefertoss.com/j0ziwm8a%5Ek9v7/IObitUninstallerPro9.1.0.11()2019.exe
IE
executable
2.25 Mb
malicious
3584
IObitUninstallerPro9.1.0.11()2019[1].exe
POST
200
52.214.73.247:80
http://cdn.velalnepidd.com/
IE
malicious
2304
firefox.exe
POST
200
151.139.128.14:80
http://ocsp.sectigo.com/
US
der
472 b
whitelisted
3464
blessme.exe
POST
137.59.54.74:80
http://tourscentralasian.com/ncho/gate.php
IN
malicious
3584
IObitUninstallerPro9.1.0.11()2019[1].exe
POST
200
52.214.73.247:80
http://cdn.velalnepidd.com/
IE
malicious
1740
iexplore.exe
GET
200
162.251.80.24:80
http://theenterpriseholdings.com/nmoniboy.exe
US
executable
608 Kb
malicious
2304
firefox.exe
GET
301
178.33.106.117:80
http://download.adlice.com/RogueKiller/Beta/14/setup.exe
FR
html
162 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2304
firefox.exe
178.33.106.117:80
download.adlice.com
OVH SAS
FR
suspicious
2304
firefox.exe
2.16.186.50:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
2304
firefox.exe
52.89.218.39:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
2304
firefox.exe
34.210.150.241:443
push.services.mozilla.com
Amazon.com, Inc.
US
malicious
2304
firefox.exe
52.37.95.220:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
2304
firefox.exe
178.33.106.117:443
download.adlice.com
OVH SAS
FR
suspicious
2304
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2304
firefox.exe
13.35.253.28:443
snippets.cdn.mozilla.net
US
malicious
2304
firefox.exe
172.217.18.10:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2304
firefox.exe
13.32.158.249:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 2.16.186.50
  • 2.16.186.112
whitelisted
download.adlice.com
  • 178.33.106.117
whitelisted
prod2.adlice.com
  • 178.33.106.117
malicious
a1089.dscd.akamai.net
  • 2.16.186.112
  • 2.16.186.50
whitelisted
search.services.mozilla.com
  • 52.89.218.39
  • 52.35.182.58
  • 35.164.109.147
whitelisted
search.r53-2.services.mozilla.com
  • 35.164.109.147
  • 52.35.182.58
  • 52.89.218.39
whitelisted
push.services.mozilla.com
  • 34.210.150.241
whitelisted
autopush.prod.mozaws.net
  • 34.210.150.241
whitelisted
tiles.services.mozilla.com
  • 52.37.95.220
  • 52.39.125.254
  • 35.162.117.80
  • 35.166.89.106
  • 52.33.184.165
  • 52.24.113.72
  • 35.155.128.5
  • 35.161.239.106
whitelisted
tiles.r53-2.services.mozilla.com
  • 35.161.239.106
  • 35.155.128.5
  • 52.24.113.72
  • 52.33.184.165
  • 35.166.89.106
  • 35.162.117.80
  • 52.39.125.254
  • 52.37.95.220
whitelisted

Threats

PID
Process
Class
Message
1884
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1884
iexplore.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3584
IObitUninstallerPro9.1.0.11()2019[1].exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
3584
IObitUninstallerPro9.1.0.11()2019[1].exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
1740
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3464
blessme.exe
A Network Trojan was detected
ET TROJAN Fareit/Pony Downloader Checkin 2
3464
blessme.exe
Potential Corporate Privacy Violation
ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System
3464
blessme.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.
3464
blessme.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
3464
blessme.exe
A Network Trojan was detected
MALWARE [PTsecurity] Pony encrypted POST Data Request
2 ETPRO signatures available at the full report
Process
Message
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile
RogueKiller.exe
libpng warning: iCCP: known incorrect sRGB profile