{"id":319,"date":"2015-05-15T14:36:20","date_gmt":"2015-05-15T14:36:20","guid":{"rendered":"http:\/\/www.adlice.com\/?p=319"},"modified":"2022-12-21T10:38:59","modified_gmt":"2022-12-21T10:38:59","slug":"of-pups-and-other-demons","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/de\/of-pups-and-other-demons\/","title":{"rendered":"BreakingNews PUP, Study of an aggressive rootkit"},"content":{"rendered":"\n<h4 class=\"has-accent-color has-text-color wp-block-heading\">Introduction<\/h4>\n\n\n\n<p><strong>What is a PUP? PUP means &#8220;Potentially Unwanted Program&#8221;<\/strong>. They are designated that way (or sometimes &#8220;Not-A-Malware&#8221;) because they are in theory <strong>not harmful for you, just annoying<\/strong>.<\/p>\n\n\n\n<p>A few examples: <strong>Zeus is a real malware<\/strong>, because it steals your bank account number, your passwords etc&#8230; Lot of PUPs are more involved into <strong>Ads display, bitcoin mining<\/strong>, etc. This is border line because most of the time people <strong>don&#8217;t know they have them, but it doesn&#8217;t harm them directly<\/strong>. They are usually installed with <strong>bundled software<\/strong>, when people <strong>don&#8217;t uncheck optional options<\/strong>.<\/p>\n\n\n\n<p>But sometimes, PUPs are using <strong>badware technics to gain access to the web browser<\/strong>, and to remain undetected. This is what we will study here with the <strong>BreakingNews<\/strong> &#8220;firefox extension&#8221;.<\/p>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Case study: BreakingNews PUP<\/h4>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Update 05\/18\/2015<\/p>\n<cite>It looks like the technology used is from <strong>Injekt (hxxp:\/\/www.injekt.com\/)<\/strong>. They are providing software to <strong>inject HTML code in any web browser<\/strong>. This can be seen in the screenshot below with string &#8220;Injekt, Injekted, \u2026&#8221;. Thanks to <a href=\"https:\/\/twitter.com\/mesa_matt\">@mesa_matt<\/a> for the info.<\/cite><\/blockquote>\n\n\n\n<p>First, the dropper is <a href=\"https:\/\/www.virustotal.com\/fr\/file\/ad9d005094de6e2dd4e1931386c2e70e11f024f7eef0206d9b598db54f4ce0ac\/analysis\/1426625201\/\">detected 18\/57 on virus total<\/a>. We can see many <strong>Adware labels, or PUP<\/strong>.<\/p>\n\n\n\n<p>That program is intended to <strong>display Breaking News on top of Web browser<\/strong>, I didn&#8217;t test the feature in details as it&#8217;s not really the subject here.<\/p>\n\n\n\n<p>I&#8217;m using Firefox, so I was surprised <strong>not to see any extension installed in Firefox<\/strong> and having that program just working (that Breaking News banner with blue border)! That makes it <strong>very hard to detect and remove<\/strong> from the web browser. Besides, <strong>there is no uninstall entry to remove it<\/strong> from the programs manager.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture31.png\"><img decoding=\"async\" width=\"1170\" height=\"521\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture31.png\" alt=\"PUP breakingnews\" class=\"wp-image-322\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture31.png 1170w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture31-300x134.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture31-1024x456.png 1024w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/figure>\n\n\n\n<p>By <a href=\"https:\/\/www.adlice.com\/roguekiller\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">running RogueKiller<\/a>, we<strong> can see hooks appearing in Firefox<\/strong> (just as a reminder, hooks are code modifications made by a program to filter a function, or an API), <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms741688%28v=vs.85%29.aspx\">on WSARcv API<\/a>.<\/p>\n\n\n\n<p>This API is called when <strong>we receive data from a socket<\/strong> (internet connexion). We can safely assume that whatever program is hooking that API <strong>will filter the internet flow<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture7.png\"><img decoding=\"async\" width=\"797\" height=\"45\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture7.png\" alt=\"Capture7\" class=\"wp-image-326\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture7.png 797w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture7-300x17.png 300w\" sizes=\"(max-width: 797px) 100vw, 797px\" \/><\/a><\/figure>\n\n\n\n<p>Also, RogueKiller shows that the hook <strong>ends in an unknown module<\/strong> (or shellcode?).<br>With a debugger attached to Firefox process, we can indeed <strong>see the hook in the assembly code<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture1-2.png\"><img decoding=\"async\" width=\"711\" height=\"130\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture1-2.png\" alt=\"hook\" class=\"wp-image-320\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture1-2.png 711w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture1-2-300x55.png 300w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><\/a><\/figure>\n\n\n\n<p>By looking at the sections map, <strong>we see that address (0x45024850) is located in a dynamically created section<\/strong>. If we look sections above and below, we can see a PE header, and according to section permissions<strong> we can conclude it&#8217;s a DLL that has been loaded in a stealth way and hidden in the process<\/strong>. That technique is <strong>used by many malware to inject code<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture21.png\"><img decoding=\"async\" width=\"482\" height=\"273\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture21.png\" alt=\"injected DLL\" class=\"wp-image-321\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture21.png 482w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture21-300x170.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/a><\/figure>\n\n\n\n<p>I decided to <strong>dump all these sections<\/strong> to look into them for interesting strings. And indeed, <strong>we retrieve some interesting things related to BreakingNews PUP<\/strong>.<\/p>\n\n\n\n<p>We see strings <strong>related to hooking, BreakingNewsAlert, and tracker data<\/strong>. We also found the main website to <strong>trackbreakingnews.com<\/strong> as an evidence.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture41.png\"><img decoding=\"async\" width=\"1811\" height=\"389\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture41.png\" alt=\"PUP breakingnews\" class=\"wp-image-323\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture41.png 1811w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture41-300x64.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture41-1024x220.png 1024w\" sizes=\"(max-width: 1811px) 100vw, 1811px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture61.png\"><img decoding=\"async\" width=\"1792\" height=\"207\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture61.png\" alt=\"Capture61\" class=\"wp-image-325\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture61.png 1792w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture61-300x35.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture61-1024x118.png 1024w\" sizes=\"(max-width: 1792px) 100vw, 1792px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\"><img decoding=\"async\" width=\"1308\" height=\"625\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\" alt=\"PUP breakingnews\" class=\"wp-image-324\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png 1308w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51-300x143.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51-1024x489.png 1024w\" sizes=\"(max-width: 1308px) 100vw, 1308px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"has-accent-color has-text-color wp-block-heading\"><br>Conclusion<\/h4>\n\n\n\n<p>During our test, <strong>we were unable to find any persistence item, nor uninstall key<\/strong>, for BreakingNews PUP.<\/p>\n\n\n\n<p>The fact of <strong>hiding code that way in the browser<\/strong>, splice-hooking sensitive APIs (instead of just using Firefox API), and <strong>not registering any extension nor uninstall entry<\/strong> is intentional. They just want to be sure <strong>their application remains as long as possible on user P<\/strong>C, by hardening the detection and removal process.<\/p>\n\n\n\n<p><strong>Should we call that PUP still? <em>They have clearly crossed the red line.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PUPs (for potentially unwanted programs) are harmless by design, most of the time. Here we will study a case where such program behaves like a rootkit.<\/p>\n","protected":false},"author":1,"featured_media":324,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[50,7,302,194,8,188,43],"class_list":["post-319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","tag-adware","tag-analysis","tag-firefox","tag-hook","tag-malware","tag-pup","tag-rootkit","category-36","description-off"],"views":2402,"yoast_score":73,"yoast_readable":90,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BreakingNews PUP, Study of an Aggressive Rootkit \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Study of the BreakingNews PUP (Potentially Unwanted Program), behaving like a rootkit. Learn what it does and how to remove.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BreakingNews PUP, Study of an Aggressive Rootkit \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Study of the BreakingNews PUP (Potentially Unwanted Program), behaving like a rootkit. Learn what it does and how to remove.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-15T14:36:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:38:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1308\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"BreakingNews PUP, Study of an aggressive rootkit\",\"datePublished\":\"2015-05-15T14:36:20+00:00\",\"dateModified\":\"2022-12-21T10:38:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\"},\"wordCount\":569,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\",\"keywords\":[\"adware\",\"analysis\",\"firefox\",\"hook\",\"malware\",\"pup\",\"rootkit\"],\"articleSection\":[\"Analysis\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\",\"url\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\",\"name\":\"BreakingNews PUP, Study of an Aggressive Rootkit \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\",\"datePublished\":\"2015-05-15T14:36:20+00:00\",\"dateModified\":\"2022-12-21T10:38:59+00:00\",\"description\":\"Study of the BreakingNews PUP (Potentially Unwanted Program), behaving like a rootkit. Learn what it does and how to remove.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png\",\"width\":1308,\"height\":625},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BreakingNews PUP, Study of an aggressive rootkit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/de\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BreakingNews PUP, Study of an Aggressive Rootkit \u2022 Adlice Software","description":"Study of the BreakingNews PUP (Potentially Unwanted Program), behaving like a rootkit. Learn what it does and how to remove.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/","og_locale":"de_DE","og_type":"article","og_title":"BreakingNews PUP, Study of an Aggressive Rootkit \u2022 Adlice Software","og_description":"Study of the BreakingNews PUP (Potentially Unwanted Program), behaving like a rootkit. Learn what it does and how to remove.","og_url":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2015-05-15T14:36:20+00:00","article_modified_time":"2022-12-21T10:38:59+00:00","og_image":[{"width":1308,"height":625,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png","type":"image\/png"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Verfasst von":"tigzy","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"BreakingNews PUP, Study of an aggressive rootkit","datePublished":"2015-05-15T14:36:20+00:00","dateModified":"2022-12-21T10:38:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/"},"wordCount":569,"commentCount":0,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png","keywords":["adware","analysis","firefox","hook","malware","pup","rootkit"],"articleSection":["Analysis"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/","url":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/","name":"BreakingNews PUP, Study of an Aggressive Rootkit \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png","datePublished":"2015-05-15T14:36:20+00:00","dateModified":"2022-12-21T10:38:59+00:00","description":"Study of the BreakingNews PUP (Potentially Unwanted Program), behaving like a rootkit. Learn what it does and how to remove.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/of-pups-and-other-demons\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2016\/06\/Capture51.png","width":1308,"height":625},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/of-pups-and-other-demons\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/de\/"},{"@type":"ListItem","position":2,"name":"BreakingNews PUP, Study of an aggressive rootkit"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/de\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/posts\/319\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media\/324"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/media?parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/categories?post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/de\/wp-json\/wp\/v2\/tags?post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}