URL:

https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbkwyeGZuYnh1cGcySGM2X25BbzZTWDVXdU9ud3xBQ3Jtc0tuVnZNRmZjelNRaDNnb09DaWtyS3hIU3VWaVItUE12QWxZN2xjOUtuUFNnQVFGOXdFZlA1OG0zZ1FhWDhMM29zc0p2MmtCTWpUbmx5amNITFVzUXBBMHp4d0I1UkVMZXZnVVd2UEY3NGMzNDIzbnBVYw&q=https%3A%2F%2Foxy.cloud%2Fd%2FFVBe

Full analysis: https://app.any.run/tasks/2510798a-6192-4df1-ac24-baec931d2202
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: November 22, 2021, 17:15:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redline
Indicators:
MD5:

5097896DEE9EBC7221CE62D33C7CDBC8

SHA1:

29BC7DFBAA0CF24AEEAB4C3DD0030C64ABEA27B6

SHA256:

3F8A3EF100F1D2C6EDF1AB97D56B4563EE86C2F3ECD844EBF8D263422108812C

SSDEEP:

6:2OLUxGKmKLqZuNuyhLMcB6xNwvSkyXTRjd3Mn9ol573zOENBn:2jGRfuNuRhLwvsXRJMnallzB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • REDLINE was detected

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Actions looks like stealing of personal data

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Application was dropped or rewritten from another process

      • ezinjector_reborn.exe (PID: 3392)
      • ezinjector_reborn.exe (PID: 2816)
    • Steals credentials from Web Browsers

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 1468)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 1920)
      • ezinjector_reborn.exe (PID: 3392)
      • AppLaunch.exe (PID: 3372)
      • ezinjector_reborn.exe (PID: 2816)
      • AppLaunch.exe (PID: 3420)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1920)
      • firefox.exe (PID: 3476)
    • Reads Environment values

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Reads the cookies of Google Chrome

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Reads the computer name

      • WinRAR.exe (PID: 1920)
      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 1920)
    • Reads the cookies of Mozilla Firefox

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Searches for installed software

      • AppLaunch.exe (PID: 3372)
      • AppLaunch.exe (PID: 3420)
    • Drops a file that was compiled in debug mode

      • firefox.exe (PID: 3476)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3476)
      • firefox.exe (PID: 3988)
    • Reads the computer name

      • firefox.exe (PID: 3476)
      • firefox.exe (PID: 2484)
      • firefox.exe (PID: 3180)
      • firefox.exe (PID: 2528)
      • firefox.exe (PID: 4036)
      • firefox.exe (PID: 3576)
      • firefox.exe (PID: 3888)
    • Checks supported languages

      • firefox.exe (PID: 3988)
      • firefox.exe (PID: 3476)
      • firefox.exe (PID: 2484)
      • firefox.exe (PID: 3180)
      • firefox.exe (PID: 2528)
      • firefox.exe (PID: 4036)
      • firefox.exe (PID: 3576)
      • firefox.exe (PID: 3888)
    • Creates files in the program directory

      • firefox.exe (PID: 3476)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 3476)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 3476)
    • Manual execution by user

      • WinRAR.exe (PID: 1920)
      • ezinjector_reborn.exe (PID: 2816)
    • Creates files in the user directory

      • firefox.exe (PID: 3476)
    • Reads CPU info

      • firefox.exe (PID: 3476)
    • Reads the date of Windows installation

      • firefox.exe (PID: 3476)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
14
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe ezinjector_reborn.exe #REDLINE applaunch.exe searchprotocolhost.exe no specs ezinjector_reborn.exe #REDLINE applaunch.exe

Process information

PID
CMD
Path
Indicators
Parent process
1468"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1920"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\otc3fix.rar"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2484"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3476.0.206386730\1207670917" -parentBuildID 20201112153044 -prefsHandle 1116 -prefMapHandle 1108 -prefsLen 1 -prefMapSize 238726 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3476 "\\.\pipe\gecko-crash-server-pipe.3476" 1200 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\rpcrt4.dll
2528"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3476.13.977324357\1777928894" -childID 2 -isForBrowser -prefsHandle 1980 -prefMapHandle 1780 -prefsLen 6644 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3476 "\\.\pipe\gecko-crash-server-pipe.3476" 1856 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
2816"C:\Users\admin\Desktop\ezinjector_reborn.exe" C:\Users\admin\Desktop\ezinjector_reborn.exe
Explorer.EXE
User:
admin
Company:
GitHub, Inc.
Integrity Level:
MEDIUM
Description:
Atom
Exit code:
3221225477
Version:
1.58.0
Modules
Images
c:\users\admin\desktop\ezinjector_reborn.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wtsapi32.dll
3180"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3476.6.1579199003\1532972627" -childID 1 -isForBrowser -prefsHandle 4280 -prefMapHandle 4276 -prefsLen 245 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3476 "\\.\pipe\gecko-crash-server-pipe.3476" 4292 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
3372"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
ezinjector_reborn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\rpcrt4.dll
3392"C:\Users\admin\AppData\Local\Temp\Rar$EXa1920.6453\ezinjector_reborn.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1920.6453\ezinjector_reborn.exe
WinRAR.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
MEDIUM
Description:
Atom
Exit code:
3221225477
Version:
1.58.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1920.6453\ezinjector_reborn.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3420"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
ezinjector_reborn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3476"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbkwyeGZuYnh1cGcySGM2X25BbzZTWDVXdU9ud3xBQ3Jtc0tuVnZNRmZjelNRaDNnb09DaWtyS3hIU3VWaVItUE12QWxZN2xjOUtuUFNnQVFGOXdFZlA1OG0zZ1FhWDhMM29zc0p2MmtCTWpUbmx5amNITFVzUXBBMHp4d0I1UkVMZXZnVVd2UEY3NGMzNDIzbnBVYw&q=https%3A%2F%2Foxy.cloud%2Fd%2FFVBeC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
Total events
15 930
Read events
15 871
Write events
59
Delete events
0

Modification events

(PID) Process:(3988) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
9478701E01000000
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
2724721E01000000
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3476) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
8
Suspicious files
178
Text files
57
Unknown types
37

Dropped files

PID
Process
Filename
Type
3476firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_SmNAAu3OOBepSJIbinary
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\protections.sqlite-journalbinary
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\favicons.sqlite-walsqlite-wal
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-walsqlite-wal
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftltext
MD5:
SHA256:
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3476firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
131
DNS requests
230
Threats
93

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3476
firefox.exe
POST
200
142.250.184.227:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
3476
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3476
firefox.exe
POST
200
5.45.205.244:80
http://yandex.ocsp-responder.com/
RU
der
1.48 Kb
whitelisted
3476
firefox.exe
POST
200
104.18.31.182:80
http://ocsp.usertrust.com/
US
der
471 b
whitelisted
3476
firefox.exe
POST
200
2.16.186.11:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
3476
firefox.exe
POST
200
2.16.186.11:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
3476
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3476
firefox.exe
POST
200
2.16.186.11:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
3476
firefox.exe
POST
200
2.16.186.11:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
3476
firefox.exe
POST
200
142.250.184.227:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
142.250.186.99:443
www.gstatic.com
Google Inc.
US
whitelisted
3476
firefox.exe
142.250.186.99:443
www.gstatic.com
Google Inc.
US
whitelisted
3476
firefox.exe
142.250.186.74:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
142.250.184.227:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3476
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
3476
firefox.exe
142.250.184.238:443
www.youtube.com
Google Inc.
US
whitelisted
34.212.188.196:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown
3476
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3476
firefox.exe
13.225.78.36:443
firefox-settings-attachments.cdn.mozilla.net
US
whitelisted
3476
firefox.exe
13.224.195.32:443
snippets.cdn.mozilla.net
US
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
www.youtube.com
  • 142.250.184.238
  • 216.58.212.174
  • 142.250.74.206
  • 142.250.186.46
  • 142.250.186.78
  • 142.250.186.110
  • 142.250.186.142
  • 172.217.18.110
  • 142.250.186.174
  • 142.250.184.206
  • 216.58.212.142
  • 142.250.185.78
  • 142.250.185.110
  • 142.250.185.142
  • 142.250.185.174
  • 142.250.185.206
whitelisted
youtube-ui.l.google.com
  • 142.250.185.206
  • 142.250.185.174
  • 142.250.185.142
  • 142.250.185.110
  • 142.250.185.78
  • 216.58.212.142
  • 142.250.184.206
  • 142.250.186.174
  • 172.217.18.110
  • 142.250.186.142
  • 142.250.186.110
  • 142.250.186.78
  • 142.250.186.46
  • 142.250.74.206
  • 216.58.212.174
  • 142.250.184.238
  • 2a00:1450:4001:831::200e
  • 2a00:1450:4001:802::200e
  • 2a00:1450:4001:803::200e
  • 2a00:1450:4001:827::200e
whitelisted
firefox.settings.services.mozilla.com
  • 13.224.195.41
  • 13.224.195.52
  • 13.224.195.103
  • 13.224.195.57
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
ocsp.pki.goog
  • 142.250.184.227
whitelisted
pki-goog.l.google.com
  • 142.250.184.227
  • 2a00:1450:4001:812::2003
whitelisted
content-signature-2.cdn.mozilla.net
  • 13.225.78.104
  • 13.225.78.106
  • 13.225.78.8
  • 13.225.78.78
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .to TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
3476
firefox.exe
Generic Protocol Command Decode
SURICATA STREAM ESTABLISHED invalid ack
11 ETPRO signatures available at the full report
No debug info