URL:

https://massgrave.dev/#method-1---powershell

Full analysis: https://app.any.run/tasks/07422a83-ffe2-4552-8658-50f0e80780a1
Verdict: Malicious activity
Analysis date: May 07, 2024, 18:47:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

21405AA47403190658342834AF40AFC6

SHA1:

6C4B9539184D12A75AC0807A223C34EB9D11F359

SHA256:

5DAD82375F383CB3106B57AF1D75BC902EB673B54BAFF7FCE8E492939B3574B8

SSDEEP:

3:N8a0Kf0apJJJn:2a0oHJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • cmd.exe (PID: 1568)
      • net.exe (PID: 3784)
      • net.exe (PID: 2844)
  • SUSPICIOUS

    • Reads the Internet Settings

      • powershell.exe (PID: 3256)
      • powershell.exe (PID: 3916)
      • WMIC.exe (PID: 3524)
      • WMIC.exe (PID: 3816)
      • WMIC.exe (PID: 3012)
      • WMIC.exe (PID: 2868)
      • WMIC.exe (PID: 3056)
      • WMIC.exe (PID: 1856)
      • WMIC.exe (PID: 3848)
      • WMIC.exe (PID: 3100)
      • WMIC.exe (PID: 3756)
      • WMIC.exe (PID: 664)
      • WMIC.exe (PID: 1396)
    • Executing commands from ".cmd" file

      • powershell.exe (PID: 3256)
      • cmd.exe (PID: 3632)
      • powershell.exe (PID: 3916)
      • cmd.exe (PID: 1568)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 1568)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 3256)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 3256)
      • cmd.exe (PID: 3632)
      • powershell.exe (PID: 3916)
      • cmd.exe (PID: 1568)
    • Application launched itself

      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 1568)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 1568)
      • cmd.exe (PID: 3080)
      • cmd.exe (PID: 2124)
      • cmd.exe (PID: 2780)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 3256)
    • Unusual connection from system programs

      • powershell.exe (PID: 3256)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1568)
      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 3296)
      • cmd.exe (PID: 3476)
      • cmd.exe (PID: 2780)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 3076)
      • cmd.exe (PID: 1568)
      • cmd.exe (PID: 3752)
      • cmd.exe (PID: 2124)
      • cmd.exe (PID: 3080)
      • cmd.exe (PID: 1932)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 1568)
    • Hides command output

      • cmd.exe (PID: 1932)
      • cmd.exe (PID: 328)
      • cmd.exe (PID: 2872)
      • cmd.exe (PID: 3304)
      • cmd.exe (PID: 2788)
      • cmd.exe (PID: 3124)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 2788)
    • Process drops legitimate windows executable

      • Dism.exe (PID: 2016)
      • Dism.exe (PID: 3320)
      • Dism.exe (PID: 2800)
    • Executable content was dropped or overwritten

      • Dism.exe (PID: 2016)
      • Dism.exe (PID: 3320)
      • Dism.exe (PID: 2800)
    • The process creates files with name similar to system file names

      • Dism.exe (PID: 2016)
      • Dism.exe (PID: 3320)
      • Dism.exe (PID: 2800)
    • Starts a Microsoft application from unusual location

      • DismHost.exe (PID: 3372)
      • DismHost.exe (PID: 3608)
      • DismHost.exe (PID: 3700)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 2780)
      • cmd.exe (PID: 1568)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 552)
      • powershell.exe (PID: 3612)
    • Gets content of a file (POWERSHELL)

      • powershell.exe (PID: 552)
      • powershell.exe (PID: 3612)
    • Executes as Windows Service

      • VSSVC.exe (PID: 328)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3996)
      • firefox.exe (PID: 3980)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2800)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 3256)
      • powershell.exe (PID: 2800)
    • Manual execution by a user

      • powershell.exe (PID: 3256)
      • wmpnscfg.exe (PID: 2856)
      • powershell.exe (PID: 2800)
    • Checks operating system version

      • cmd.exe (PID: 3632)
      • cmd.exe (PID: 1568)
    • Checks supported languages

      • mode.com (PID: 3252)
      • mode.com (PID: 3072)
      • mode.com (PID: 3668)
      • mode.com (PID: 3356)
      • mode.com (PID: 3696)
      • DismHost.exe (PID: 3372)
      • mode.com (PID: 3044)
      • mode.com (PID: 3696)
      • DismHost.exe (PID: 3608)
      • DismHost.exe (PID: 3700)
      • wmpnscfg.exe (PID: 2856)
    • Drops the executable file immediately after the start

      • firefox.exe (PID: 3996)
      • Dism.exe (PID: 2016)
      • Dism.exe (PID: 3320)
      • Dism.exe (PID: 2800)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 3996)
    • Create files in a temporary directory

      • Dism.exe (PID: 2016)
      • Dism.exe (PID: 3320)
      • Dism.exe (PID: 2800)
    • Reads the machine GUID from the registry

      • DismHost.exe (PID: 3372)
      • DismHost.exe (PID: 3608)
      • DismHost.exe (PID: 3700)
    • Reads Environment values

      • DismHost.exe (PID: 3372)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 552)
      • powershell.exe (PID: 3612)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 552)
      • powershell.exe (PID: 3612)
    • Reads the computer name

      • DismHost.exe (PID: 3372)
      • DismHost.exe (PID: 3608)
      • DismHost.exe (PID: 3700)
      • wmpnscfg.exe (PID: 2856)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
233
Monitored processes
149
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs wmpnscfg.exe no specs powershell.exe no specs powershell.exe cmd.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs fltmc.exe no specs powershell.exe no specs cmd.exe sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs fltmc.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs reg.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs wmic.exe no specs find.exe no specs sc.exe no specs net.exe no specs net1.exe no specs wmic.exe no specs findstr.exe no specs net.exe no specs net1.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs find.exe no specs wmic.exe no specs find.exe no specs sc.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs dism.exe find.exe no specs dismhost.exe cmd.exe no specs reg.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs powershell.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs mode.com no specs powershell.exe no specs powershell.exe no specs mode.com no specs powershell.exe no specs powershell.exe no specs choice.exe no specs powershell.exe no specs dism.exe dismhost.exe vssvc.exe no specs dism.exe dismhost.exe powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
112"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3996.1.954624971\609688035" -parentBuildID 20230710165010 -prefsHandle 1432 -prefMapHandle 1428 -prefsLen 28600 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b78ba75f-5a9f-491c-a361-27cc59bb2d02} 3996 "\\.\pipe\gecko-crash-server-pipe.3996" 1444 1651d390 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
316findstr /i /c:"Target Edition : "C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
328findstr /a:0A /f:`.txt "."C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
328C:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions" /v OSProductPfn 2>nulC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
328C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
524C:\Windows\system32\cmd.exe /c ping -4 -n 1 updatecheck.massgrave.devC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
552powershell.exe "$f=[io.file]::ReadAllText('C:\Users\admin\AppData\Local\Temp\MAS_26169452.cmd') -split ':cbsxml\:.*';& ([ScriptBlock]::Create($f[1])) -GetTargetEditions;" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
588"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3996.2.1308676865\972166805" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 24491 -prefMapSize 244195 -jsInitHandle 888 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a82456ff-cac6-4f7e-b1aa-d9fca06343a4} 3996 "\\.\pipe\gecko-crash-server-pipe.3996" 2084 1b695e00 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
664wmic path SoftwareLicensingProduct where (ApplicationID='55c92734-d682-4d71-983e-d6ec3f16059f') get ID /VALUE C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
916findstr /i ID C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
Total events
50 497
Read events
50 171
Write events
321
Delete events
5

Modification events

(PID) Process:(3980) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
7E66E4E200000000
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
4928E6E200000000
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Installer\308046B0AF4A39CB
Operation:delete valueName:installer.taskbarpin.win10.enabled
Value:
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(3996) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
Executable files
97
Suspicious files
202
Text files
42
Unknown types
6

Dropped files

PID
Process
Filename
Type
3996firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3996firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\activity-stream.discovery_stream.json
MD5:
SHA256:
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-walbinary
MD5:98D1DE955A87620F2DAA2815EA0E05C2
SHA256:FBDB20A02BDFC7A9E669348B0BE89F37C53D89D5A32A892841D370B1D13088B9
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cert9.db-journalbinary
MD5:FDE7D8E7B8A0EAA19928A5765739BA36
SHA256:E806B484954C4469A401F7D872475D43F0640BDF13D7949F7AAA99E4AFCDB94C
3996firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:04BADC0A17F546BBD91CC2404D2776D9
SHA256:54CD83D3031D15EA1F5B1C5D73416C0B2F9151F93E130DD525DDA488A8EB9110
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cert9.dbbinary
MD5:B7209527D48D2488410375E7FCF01139
SHA256:9EE6419EDF65DB9EC5E70200BECA8E059FB37E15748A014EA005AABFE4FF390E
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3996firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\protections.sqlite-journalbinary
MD5:ED7EAF4285B525223E803E8A26330053
SHA256:3E46202793BD54DCCAA1A2B86A8F60B285118AF31BCBC8094213C7F69E24D97D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
62
DNS requests
124
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3996
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
unknown
3996
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
unknown
3996
firefox.exe
POST
200
95.100.146.66:80
http://r3.o.lencr.org/
unknown
unknown
3996
firefox.exe
POST
200
95.100.146.66:80
http://r3.o.lencr.org/
unknown
unknown
3996
firefox.exe
POST
200
95.100.146.66:80
http://r3.o.lencr.org/
unknown
unknown
3996
firefox.exe
POST
200
95.100.146.66:80
http://r3.o.lencr.org/
unknown
unknown
3996
firefox.exe
POST
200
95.100.146.66:80
http://r3.o.lencr.org/
unknown
unknown
3996
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
3996
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
3996
firefox.exe
POST
200
95.100.146.66:80
http://r3.o.lencr.org/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
3996
firefox.exe
104.21.22.3:443
massgrave.dev
CLOUDFLARENET
unknown
3996
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
3996
firefox.exe
34.117.188.166:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3996
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
unknown
3996
firefox.exe
95.100.146.66:80
r3.o.lencr.org
Akamai International B.V.
CZ
unknown
3996
firefox.exe
142.250.185.234:443
safebrowsing.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
massgrave.dev
  • 104.21.22.3
  • 172.67.201.171
  • 2606:4700:3033::6815:1603
  • 2606:4700:3035::ac43:c9ab
unknown
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
example.org
  • 93.184.215.14
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
spocs.getpocket.com
  • 34.117.188.166
shared
prod.ads.prod.webservices.mozgcp.net
  • 34.117.188.166
unknown
r3.o.lencr.org
  • 95.100.146.66
  • 95.100.146.57
  • 95.100.146.41
shared
firefox.settings.services.mozilla.com
  • 34.149.100.209
whitelisted

Threats

No threats detected
Process
Message
Dism.exe
PID=2016 Attempting to initialize the logger from the Image Session. - CDISMProviderStore::Final_OnConnect
Dism.exe
PID=2016 Initializing a provider store for the LOCAL session type. - CDISMProviderStore::Final_OnConnect
Dism.exe
PID=2016 Provider has not previously been encountered. Attempting to initialize the provider. - CDISMProviderStore::Internal_GetProvider
Dism.exe
PID=2016 Instantiating the Provider Store. - CDISMImageSession::get_ProviderStore
Dism.exe
PID=2016 Loading Provider from location C:\Windows\System32\Dism\LogProvider.dll - CDISMProviderStore::Internal_GetProvider
Dism.exe
PID=2016 Failed to get an OSServices provider. Must be running in local store. Falling back to checking alongside the log provider for wdscore.dll. - CDISMLogger::FindWdsCore(hr:0x80004005)
Dism.exe
PID=2016 Getting Provider OSServices - CDISMProviderStore::GetProvider
Dism.exe
PID=2016 The requested provider was not found in the Provider Store. - CDISMProviderStore::Internal_GetProvider(hr:0x80004005)
Dism.exe
PID=2016 Connecting to the provider located at C:\Windows\System32\Dism\LogProvider.dll. - CDISMProviderStore::Internal_LoadProvider
DismHost.exe
PID=3372 Encountered a loaded provider DISMLogger. - CDISMProviderStore::Internal_DisconnectProvider