URL:

https://wearedevs.net/d/jjsploit

Full analysis: https://app.any.run/tasks/7e6c870a-42e1-41a9-a474-b7d85ec78be9
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 14, 2024, 14:38:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

C3ED6403FEA9F2F9DC8E86C412CB3334

SHA1:

A3CB61C057D39E1CC76B888C3CADAB5E275C065C

SHA256:

59C4ED340EE1B0F9A7136E9680FF6DD4512E5EE4324112DB9BC744ADAF24A069

SSDEEP:

3:N8R/BApK8K:25BuBK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 292)
    • Drops the executable file immediately after the start

      • powershell.exe (PID: 292)
      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 2728)
    • The DLL Hijacking

      • msedgewebview2.exe (PID: 3444)
      • msedgewebview2.exe (PID: 2148)
    • Scans artifacts that could help determine the target

      • msedgewebview2.exe (PID: 2616)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • powershell.exe (PID: 292)
      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeUpdate.exe (PID: 2728)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3152)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 292)
    • Reads the Internet Settings

      • powershell.exe (PID: 292)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • cmd.exe (PID: 3600)
      • cmd.exe (PID: 3596)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
      • cmd.exe (PID: 3788)
      • cmd.exe (PID: 2828)
      • cmd.exe (PID: 1848)
      • cmd.exe (PID: 1288)
    • Executable content was dropped or overwritten

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 2728)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdate.exe (PID: 124)
    • Reads settings of System Certificates

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
    • Checks Windows Trust Settings

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 292)
    • Starts CMD.EXE for commands execution

      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 3068)
    • Unusual connection from system programs

      • powershell.exe (PID: 292)
    • Application launched itself

      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • msedgewebview2.exe (PID: 2616)
    • Creates a software uninstall entry

      • setup.exe (PID: 1348)
    • Searches for installed software

      • setup.exe (PID: 1348)
      • msedgewebview2.exe (PID: 2616)
    • Adds/modifies Windows certificates

      • JJSploit.exe (PID: 3068)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 1692)
      • firefox.exe (PID: 1836)
      • msedge.exe (PID: 2980)
      • msedge.exe (PID: 4016)
      • msedge.exe (PID: 3872)
      • msedge.exe (PID: 2020)
      • msedge.exe (PID: 2920)
      • msedge.exe (PID: 3148)
    • The process uses the downloaded file

      • firefox.exe (PID: 1692)
    • Manual execution by a user

      • msiexec.exe (PID: 3812)
      • JJSploit.exe (PID: 2884)
      • JJSploit.exe (PID: 3608)
      • JJSploit.exe (PID: 3416)
      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 2972)
      • JJSploit.exe (PID: 3740)
      • JJSploit.exe (PID: 2064)
      • JJSploit.exe (PID: 2316)
      • JJSploit.exe (PID: 3876)
      • JJSploit.exe (PID: 996)
      • JJSploit.exe (PID: 3480)
      • JJSploit.exe (PID: 3068)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3812)
    • Create files in a temporary directory

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3812)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 880)
      • msedgewebview2.exe (PID: 2360)
    • Checks supported languages

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 124)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 1556)
      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 3608)
      • JJSploit.exe (PID: 2884)
      • JJSploit.exe (PID: 3740)
      • JJSploit.exe (PID: 2316)
      • JJSploit.exe (PID: 2064)
      • JJSploit.exe (PID: 3416)
      • JJSploit.exe (PID: 996)
      • JJSploit.exe (PID: 2972)
      • JJSploit.exe (PID: 3480)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • JJSploit.exe (PID: 3876)
      • setup.exe (PID: 1348)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 880)
      • JJSploit.exe (PID: 3068)
      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 3616)
      • msedgewebview2.exe (PID: 2148)
      • msedgewebview2.exe (PID: 3444)
      • msedgewebview2.exe (PID: 2360)
      • msedgewebview2.exe (PID: 548)
    • Reads the computer name

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 124)
      • MicrosoftEdgeUpdate.exe (PID: 1556)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 3608)
      • JJSploit.exe (PID: 2884)
      • JJSploit.exe (PID: 2972)
      • JJSploit.exe (PID: 3740)
      • JJSploit.exe (PID: 2316)
      • JJSploit.exe (PID: 2064)
      • JJSploit.exe (PID: 3416)
      • JJSploit.exe (PID: 996)
      • JJSploit.exe (PID: 3480)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • JJSploit.exe (PID: 3876)
      • setup.exe (PID: 1348)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • JJSploit.exe (PID: 3068)
      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 3444)
      • msedgewebview2.exe (PID: 2360)
      • msedgewebview2.exe (PID: 2148)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 1556)
      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
    • Reads the software policy settings

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
    • Checks proxy server information

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • JJSploit.exe (PID: 3068)
    • Process checks computer location settings

      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 3616)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
175
Monitored processes
125
Malicious processes
11
Suspicious processes
1

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs msiexec.exe vssvc.exe no specs powershell.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe jjsploit.exe cmd.exe no specs cmd.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe microsoftedge_x86_109.0.1518.140.exe setup.exe microsoftedgeupdate.exe jjsploit.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1556 --field-trial-handle=1180,i,6433191679639864184,16340997149056799153,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
124"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserverC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.29
292powershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -WaitC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
296"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2880 --field-trial-handle=1444,i,6909561473689785412,2970562265441856545,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
324"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xdc,0x6861f598,0x6861f5a8,0x6861f5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
324"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5184 --field-trial-handle=1304,i,2375966597474364023,4006469782731593580,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
548"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1536 --field-trial-handle=1204,i,159669723322593920,3439710655358089208,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
109.0.1518.140
552"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1692.6.668826339\2016781818" -childID 5 -isForBrowser -prefsHandle 3600 -prefMapHandle 3948 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 916 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e437b3c-edfb-4a69-9ef3-1823ed7fabc5} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" 3964 217b3e00 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
696"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1692.1.1171771633\1506723503" -parentBuildID 20230710165010 -prefsHandle 1408 -prefMapHandle 1404 -prefsLen 28600 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97df33df-5c35-4e54-a024-69cf635f8d8a} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" 1420 15e27900 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
848"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1460 --field-trial-handle=1308,i,13343829578652645794,12877555056413543586,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
107
Suspicious files
440
Text files
332
Unknown types
120

Dropped files

PID
Process
Filename
Type
1692firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.jsonbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shmbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
239
DNS requests
329
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
unknown
1692
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
unknown
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
POST
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1692
firefox.exe
104.26.6.147:443
wearedevs.net
CLOUDFLARENET
US
unknown
1692
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
1692
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1692
firefox.exe
34.117.188.166:443
spocs.getpocket.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1692
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
unknown
1692
firefox.exe
92.123.106.51:80
r3.o.lencr.org
TELECOM ITALIA SPARKLE S.p.A.
IT
unknown
1692
firefox.exe
172.217.16.202:443
safebrowsing.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
wearedevs.net
  • 104.26.6.147
  • 172.67.71.2
  • 104.26.7.147
  • 2606:4700:20::ac43:4702
  • 2606:4700:20::681a:793
  • 2606:4700:20::681a:693
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 34.117.188.166
shared
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
prod.ads.prod.webservices.mozgcp.net
  • 34.117.188.166
unknown
firefox.settings.services.mozilla.com
  • 34.149.100.209
whitelisted
prod.remote-settings.prod.webservices.mozgcp.net
  • 34.149.100.209
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.