• Visit Rebornbuddy
  • Visit Panda Profiles
  • Visit LLamamMagic
  • agent.exe something I found

    Discussion in 'General Discussion Forum' started by NSZWoW, Dec 7, 2011.

    1. NSZWoW

      NSZWoW New Member

      Joined:
      Mar 21, 2011
      Messages:
      21
      Likes Received:
      0
      Trophy Points:
      0
      I was downloading d3 beta today while downloading it I decided to turn the bot on, and farm some honor for the start of the new season.

      When I turned HB on my malware bytes blocked an attempt to a potentially malicious site with the process agent.exe

      I decided to google agent.exe nothing off the start then I googled warcraft agent.exe and found that this is a process for d3 that monitors for 3rd party applications. considered it just happened I doubt anything would happen to my account for at least a few hours or days, regardless should we hold off on botting while d3 is installed?
       
    2. NSZWoW

      NSZWoW New Member

      Joined:
      Mar 21, 2011
      Messages:
      21
      Likes Received:
      0
      Trophy Points:
      0
      NetRange: 98.142.240.0 - 98.142.255.255
      CIDR: 98.142.240.0/20
      OriginAS: AS30407
      NetName: VELCOM
      NetHandle: NET-98-142-240-0-1
      Parent: NET-98-0-0-0-0
      NetType: Direct Allocation
      RegDate: 2009-04-28
      Updated: 2009-04-28
      Ref: http://whois.arin.net/rest/net/NET-98-142-240-0-1

      OrgName: Rcp.net
      OrgId: RCPNE
      Address: 50 Delta Park Blvd., Unit 4
      City: Brampton
      StateProv: ON
      PostalCode: L6T-5E8
      Country: CA
      RegDate: 2003-06-02
      Updated: 2011-04-29
      Comment: ====================================================
      Comment: - Contact abuse@velcom.com in case of any Hacks, -
      Comment: - Illegal Activity, Violation, Scans, Probes, Spam -
      Comment: ====================================================
      Ref: http://whois.arin.net/rest/org/RCPNE

      ReferralServer: rwhois://rwhois.velcom.com:4321

      OrgAbuseHandle: ABUSE1200-ARIN
      OrgAbuseName: Abuse
      OrgAbusePhone: +1-416-800-7551
      OrgAbuseEmail: abuse@velcom.com
      OrgAbuseRef: http://whois.arin.net/rest/poc/ABUSE1200-ARIN

      OrgTechHandle: NETWO548-ARIN
      OrgTechName: Network Administrator
      OrgTechPhone: +1-416-800-7551
      OrgTechEmail: netadmin@velcom.com
      OrgTechRef: http://whois.arin.net/rest/poc/NETWO548-ARIN

      RAbuseHandle: ABUSE1200-ARIN
      RAbuseName: Abuse
      RAbusePhone: +1-416-800-7551
      RAbuseEmail: abuse@velcom.com
      RAbuseRef: http://whois.arin.net/rest/poc/ABUSE1200-ARIN

      RTechHandle: NETWO548-ARIN
      RTechName: Network Administrator
      RTechPhone: +1-416-800-7551
      RTechEmail: netadmin@velcom.com
      RTechRef: http://whois.arin.net/rest/poc/NETWO548-ARIN

      #
      # ARIN WHOIS data and services are subject to the Terms of Use
      # available at: https://www.arin.net/whois_tou.html
      #


      %rwhois V-1.5:003eff:00 rwhois.velcom.com (by Network Solutions, Inc. V-1.5.9.5)
      network:Auth-Area:98.142.240.0/20
      network:Class-Name:network
      network:ID:NET-98-142-251-0-24
      network:Network-Name:Velcom DSL (Dynamic Pool)
      network:IP-Network:98.142.251.0/24
      network:Org-Name:VELCOM
      network:Street-Address:50 Delta Park Blvd., Unit 4
      network:City:Brampton
      network:State:ON
      network:postal-Code:L6T-5E8
      network:Country-Code:CA
      network:Tech-Contact;I:support@velcom.ca
      network:Updated:2011-04-26
      network:Updated-By:roman@velcom.com

      network:Auth-Area:98.142.240.0/20
      network:Class-Name:network
      network:ID:NET-98-142-240-0-20
      network:Network-Name:Velcom.com IP Pool
      network:IP-Network:98.142.240.0/20
      network:Org-Name:VELCOM.COM
      network:Street-Address:50 Delta Park Blvd., Unit 4
      network:City:Brampton
      network:State:ON
      network:postal-Code:L6T-5E8
      network:Country-Code:CA
      network:Tech-Contact;I:support@velcom.com
      network:Updated:2011-04-26
      network:Updated-By:netadmin@velcom.com

      %referral rwhois://root.rwhois.net:4321/auth-area=.
      %ok
       
    3. Lovemonkey

      Lovemonkey New Member

      Joined:
      Nov 15, 2011
      Messages:
      477
      Likes Received:
      1
      Trophy Points:
      0
      Well... i guess im not getting D3 ever, its not even coming near my house! :cool:
       
    4. Kink

      Kink Member

      Joined:
      Nov 15, 2011
      Messages:
      336
      Likes Received:
      10
      Trophy Points:
      18
      Call me stupid but what is D3? if you're using an unofficial version of honorbuddy, the application might have been binded with a malicious file, otherwise I don't see there being a 3rd party program monitoring your data as that would be a retarded method by blizzard as botters wouldn't bot when they saw that process and a simple if statement could be made apon opening honorbuddy to protect against that.
       
      Last edited: Dec 7, 2011
    5. Lovemonkey

      Lovemonkey New Member

      Joined:
      Nov 15, 2011
      Messages:
      477
      Likes Received:
      1
      Trophy Points:
      0
      D3 is diablo 3, its one of blizzards other addictive games =p
       
    6. NSZWoW

      NSZWoW New Member

      Joined:
      Mar 21, 2011
      Messages:
      21
      Likes Received:
      0
      Trophy Points:
      0
      I use official HB, d3 is Diablo 3, and yes the process is there now in beta however I'm sure it will be hidden at a later date.
       
    7. NSZWoW

      NSZWoW New Member

      Joined:
      Mar 21, 2011
      Messages:
      21
      Likes Received:
      0
      Trophy Points:
      0
      IP-BLOCK 218.10.254.67 (Type: outgoing, Port: 6881, Process: agent.exe)
      IP-BLOCK 218.10.254.67 (Type: outgoing, Port: 6881, Process: agent.exe)
      IP-BLOCK 218.10.254.67 (Type: outgoing, Port: 63210, Process: agent.exe)
      IP-BLOCK 98.142.251.68 (Type: outgoing, Port: 6881, Process: agent.exe)
      IP-BLOCK 98.142.251.68 (Type: outgoing, Port: 6881, Process: agent.exe)

      just a random posting from the logs.
       
    8. no1knowsy

      no1knowsy Well-Known Member

      Joined:
      Feb 28, 2010
      Messages:
      3,927
      Likes Received:
      57
      Trophy Points:
      48
      Blizzard Fail.
       
    9. NSZWoW

      NSZWoW New Member

      Joined:
      Mar 21, 2011
      Messages:
      21
      Likes Received:
      0
      Trophy Points:
      0
      do you think it would be possible to reverse engineer the agent.exe to possibly get an understanding of warden?
       
    10. no1knowsy

      no1knowsy Well-Known Member

      Joined:
      Feb 28, 2010
      Messages:
      3,927
      Likes Received:
      57
      Trophy Points:
      48
      Warden is not like this agent.exe
      And warden is already taken care of/precautions in place.
       

    Share This Page