URL:

https://www.reddit.com/r/EXPERTTUTORIALVIDEO/comments/1280zck/tutorial_video/

Full analysis: https://app.any.run/tasks/059487ee-7201-4717-a5a9-29d77b2abffa
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 01, 2023, 12:20:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
raccoon
recordbreaker
trojan
loader
Indicators:
MD5:

0874DD04EF80B6F1A057DAF034749612

SHA1:

7B2ED477F9FC2560048C921FA3C9C6F29F383D46

SHA256:

5AE03C781B5975CF748A395FEBD22602C9C93379A30A22FF4DDAD46617E18854

SSDEEP:

3:N8DSLQuM4gB2xq3o6AL/OF2FqlRn:2OLQuML2sq/bUR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RACCOON was detected

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Connects to the CnC server

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • svcservice.exe (PID: 1272)
    • Application was dropped or rewritten from another process

      • k317iq1a.exe (PID: 2840)
      • k317iq1a.exe (PID: 3560)
      • 551EzJ0a.exe (PID: 908)
      • svcservice.exe (PID: 1272)
      • 47K34vB4.exe (PID: 2384)
    • Actions looks like stealing of personal data

      • PC-Set-UP_SOFT.exe (PID: 1488)
  • SUSPICIOUS

    • Reads the Internet Settings

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • svcservice.exe (PID: 1272)
      • 47K34vB4.exe (PID: 2384)
    • Connects to the server without a host name

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • svcservice.exe (PID: 1272)
    • Process requests binary or script from the Internet

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Executable content was dropped or overwritten

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Checks Windows Trust Settings

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Reads browser cookies

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Reads settings of System Certificates

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Searches for installed software

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Reads security settings of Internet Explorer

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Starts itself from another location

      • 47K34vB4.exe (PID: 2384)
  • INFO

    • Create files in a temporary directory

      • firefox.exe (PID: 976)
    • Application launched itself

      • firefox.exe (PID: 976)
      • firefox.exe (PID: 2656)
    • The process uses the downloaded file

      • firefox.exe (PID: 976)
      • WinRAR.exe (PID: 3904)
    • Manual execution by a user

      • WinRAR.exe (PID: 3904)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 976)
      • WinRAR.exe (PID: 3904)
    • Checks supported languages

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • AppLaunch.exe (PID: 3632)
      • k317iq1a.exe (PID: 3560)
      • 551EzJ0a.exe (PID: 908)
      • 47K34vB4.exe (PID: 2384)
      • svcservice.exe (PID: 1272)
    • Reads the machine GUID from the registry

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • 551EzJ0a.exe (PID: 908)
      • svcservice.exe (PID: 1272)
    • Reads the computer name

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • 551EzJ0a.exe (PID: 908)
      • AppLaunch.exe (PID: 3632)
      • 47K34vB4.exe (PID: 2384)
      • svcservice.exe (PID: 1272)
    • Checks proxy server information

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • svcservice.exe (PID: 1272)
    • The process checks LSA protection

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • 551EzJ0a.exe (PID: 908)
      • 47K34vB4.exe (PID: 2384)
      • svcservice.exe (PID: 1272)
    • Creates files or folders in the user directory

      • PC-Set-UP_SOFT.exe (PID: 1488)
      • 47K34vB4.exe (PID: 2384)
      • svcservice.exe (PID: 1272)
    • Reads product name

      • PC-Set-UP_SOFT.exe (PID: 1488)
    • Reads Environment values

      • PC-Set-UP_SOFT.exe (PID: 1488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
64
Monitored processes
19
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe #RACCOON pc-set-up_soft.exe k317iq1a.exe no specs k317iq1a.exe applaunch.exe 551ezj0a.exe no specs 47k34vb4.exe no specs svcservice.exe

Process information

PID
CMD
Path
Indicators
Parent process
580"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="976.41.1772509852\710245796" -childID 6 -isForBrowser -prefsHandle 4124 -prefMapHandle 4128 -prefsLen 9214 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 976 "\\.\pipe\gecko-crash-server-pipe.976" 4140 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
908"C:\Users\admin\AppData\Roaming\551EzJ0a.exe" C:\Users\admin\AppData\Roaming\551EzJ0a.exePC-Set-UP_SOFT.exe
User:
admin
Integrity Level:
MEDIUM
Description:
GUI_MODERNISTA
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\551ezj0a.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
976"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.reddit.com/r/EXPERTTUTORIALVIDEO/comments/1280zck/tutorial_video/C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1272"C:\Users\admin\AppData\Roaming\telemetry\svcservice.exe" C:\Users\admin\AppData\Roaming\telemetry\svcservice.exe
47K34vB4.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
Capture
Exit code:
0
Version:
3.3.0.39
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\roaming\telemetry\svcservice.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1488"C:\Users\admin\AppData\Local\Temp\Rar$EXb3904.18625\PC-Files_Expert-2O23\PC-Set-UP_SOFT.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3904.18625\PC-Files_Expert-2O23\PC-Set-UP_SOFT.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3904.18625\pc-files_expert-2o23\pc-set-up_soft.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
1620"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="976.20.2067000243\312749220" -childID 3 -isForBrowser -prefsHandle 2500 -prefMapHandle 2552 -prefsLen 7307 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 976 "\\.\pipe\gecko-crash-server-pipe.976" 2484 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
2384"C:\Users\admin\AppData\Roaming\47K34vB4.exe" C:\Users\admin\AppData\Roaming\47K34vB4.exePC-Set-UP_SOFT.exe
User:
admin
Company:
iTop Inc.
Integrity Level:
MEDIUM
Description:
Capture
Exit code:
0
Version:
3.3.0.39
Modules
Images
c:\users\admin\appdata\roaming\47k34vb4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
2436"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="976.55.1413864798\450815490" -childID 8 -isForBrowser -prefsHandle 8152 -prefMapHandle 7856 -prefsLen 9682 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 976 "\\.\pipe\gecko-crash-server-pipe.976" 7820 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\firefox.exe
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
2444"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="976.6.1928243316\1726087761" -childID 1 -isForBrowser -prefsHandle 3544 -prefMapHandle 3540 -prefsLen 181 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 976 "\\.\pipe\gecko-crash-server-pipe.976" 3556 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
2464"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="976.13.1321745540\1772930871" -childID 2 -isForBrowser -prefsHandle 2220 -prefMapHandle 2288 -prefsLen 6644 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 976 "\\.\pipe\gecko-crash-server-pipe.976" 2160 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
Total events
52 194
Read events
51 950
Write events
244
Delete events
0

Modification events

(PID) Process:(2656) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
09611C1E1E000000
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
AD681C1E1E000000
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(976) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(976) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
154
Suspicious files
460
Text files
3 348
Unknown types
174

Dropped files

PID
Process
Filename
Type
976firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-walsqlite-wal
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_XMg61VOTqrQgtghbinary
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\QLDYZ5~1.DEF\cert9.db-journalbinary
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\QLDYZ5~1.DEF\cert9.dbsqlite
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\protections.sqlite-journalbinary
MD5:
SHA256:
976firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
66
TCP/UDP connections
143
DNS requests
314
Threats
36

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
976
firefox.exe
POST
200
2.16.186.80:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
976
firefox.exe
POST
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
976
firefox.exe
POST
200
104.18.32.68:80
http://ocsp.usertrust.com/
US
der
471 b
whitelisted
976
firefox.exe
POST
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
976
firefox.exe
POST
200
2.16.186.80:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
976
firefox.exe
POST
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
976
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
US
text
8 b
whitelisted
976
firefox.exe
POST
200
2.16.186.80:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
976
firefox.exe
POST
200
172.64.155.188:80
http://ocsp.sectigo.com/
US
der
472 b
whitelisted
976
firefox.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
976
firefox.exe
151.101.1.140:443
www.reddit.com
FASTLY
US
suspicious
976
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
976
firefox.exe
35.241.9.150:443
firefox.settings.services.mozilla.com
GOOGLE
US
suspicious
976
firefox.exe
2.16.186.80:80
r3.o.lencr.org
Akamai International B.V.
DE
whitelisted
976
firefox.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
976
firefox.exe
142.250.186.138:443
safebrowsing.googleapis.com
GOOGLE
US
whitelisted
976
firefox.exe
142.250.186.131:80
ocsp.pki.goog
GOOGLE
US
whitelisted
976
firefox.exe
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
suspicious
976
firefox.exe
54.163.121.204:443
gql-realtime.reddit.com
AMAZON-AES
US
unknown
976
firefox.exe
142.250.185.138:443
fonts.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
www.reddit.com
  • 151.101.1.140
  • 151.101.65.140
  • 151.101.129.140
  • 151.101.193.140
whitelisted
location.services.mozilla.com
  • 52.40.44.47
  • 35.83.159.54
  • 54.187.233.68
  • 35.165.145.80
  • 52.33.22.51
  • 52.38.245.94
whitelisted
firefox.settings.services.mozilla.com
  • 35.241.9.150
whitelisted
reddit.map.fastly.net
  • 151.101.193.140
  • 151.101.129.140
  • 151.101.65.140
  • 151.101.1.140
whitelisted
locprod2-elb-us-west-2.prod.mozaws.net
  • 52.38.245.94
  • 52.33.22.51
  • 35.165.145.80
  • 54.187.233.68
  • 35.83.159.54
  • 52.40.44.47
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
r3.o.lencr.org
  • 2.16.186.80
  • 2.16.186.65
  • 2.16.186.10
  • 2.16.186.27
shared

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
Potentially Bad Traffic
ET INFO Commonly Abused Content Delivery Network Domain in DNS Lookup (btloader .com)
Potentially Bad Traffic
ET INFO Commonly Abused Content Delivery Network Domain in DNS Lookup (btloader .com)
Potentially Bad Traffic
ET INFO Commonly Abused Content Delivery Network Domain in DNS Lookup (btloader .com)
976
firefox.exe
Potentially Bad Traffic
ET INFO Observed Abused Content Delivery Network Domain (btloader .com in TLS SNI)
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
Potentially Bad Traffic
ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup
Potentially Bad Traffic
ET INFO Commonly Abused Content Delivery Network Domain in DNS Lookup (btloader .com)
No debug info