URL:

https://www.youtube.com/watch?v=LFYhqDnVmGU

Full analysis: https://app.any.run/tasks/1d1ffd2e-c885-42c3-bc8e-5f44635933f8
Verdict: Malicious activity
Analysis date: August 23, 2021, 03:00:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

D508CC6557B94B5B73ACBE24D8EC0368

SHA1:

6991682EA436FD456752B84A9E377CE51C812EE9

SHA256:

6436A96D7147B7641D740FEAD349AC1DB0BA182A53CF77D1678F466AACCF6B03

SSDEEP:

3:N8DSLUxGTKSEIYskn:2OLUxGF5YH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • firefox.exe (PID: 908)
      • bdcam.exe (PID: 4016)
    • Drops executable file immediately after starts

      • Bandicam 5.0.1.1799.exe (PID: 2680)
      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Application was dropped or rewritten from another process

      • Bandicam 5.0.1.1799.exe (PID: 2680)
      • Bandicam 5.0.1.1799.exe (PID: 380)
      • bdcam.exe (PID: 3064)
      • bdcam.exe (PID: 4016)
    • Registers / Runs the DLL via REGSVR32.EXE

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Loads dropped or rewritten executable

      • bdcam.exe (PID: 3064)
      • bdcam.exe (PID: 4016)
      • rundll32.exe (PID: 3092)
  • SUSPICIOUS

    • Drops a file with too old compile date

      • WinRAR.exe (PID: 3928)
      • Bandicam 5.0.1.1799.exe (PID: 2680)
      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3928)
      • Bandicam 5.0.1.1799.exe (PID: 2680)
      • Bandicam 5.0.1.1799.tmp (PID: 2756)
      • firefox.exe (PID: 908)
    • Checks supported languages

      • Bandicam 5.0.1.1799.exe (PID: 2680)
      • WinRAR.exe (PID: 3928)
      • Bandicam 5.0.1.1799.tmp (PID: 2756)
      • cmd.exe (PID: 996)
      • bdcam.exe (PID: 3064)
      • cmd.exe (PID: 1760)
      • bcact.exe (PID: 2968)
      • cmd.exe (PID: 2600)
      • bdcam.exe (PID: 4016)
    • Reads the computer name

      • WinRAR.exe (PID: 3928)
      • Bandicam 5.0.1.1799.tmp (PID: 2756)
      • bdcam.exe (PID: 3064)
      • bdcam.exe (PID: 4016)
    • Reads Windows owner or organization settings

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Reads the Windows organization settings

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Drops a file that was compiled in debug mode

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
      • firefox.exe (PID: 908)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 1636)
    • Creates files in the Windows directory

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Creates a directory in Program Files

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Starts CMD.EXE for commands execution

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
      • cmd.exe (PID: 996)
    • Application launched itself

      • cmd.exe (PID: 996)
    • Uses RUNDLL32.EXE to load library

      • bdcam.exe (PID: 3064)
    • Changes default file association

      • bdcam.exe (PID: 3064)
    • Uses NETSH.EXE for network configuration

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Starts Internet Explorer

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Reads Environment values

      • netsh.exe (PID: 3260)
      • netsh.exe (PID: 3072)
      • netsh.exe (PID: 3780)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1868)
    • Drops a file with a compile date too recent

      • firefox.exe (PID: 908)
  • INFO

    • Checks supported languages

      • firefox.exe (PID: 3820)
      • firefox.exe (PID: 3700)
      • firefox.exe (PID: 908)
      • firefox.exe (PID: 3840)
      • firefox.exe (PID: 2628)
      • firefox.exe (PID: 3408)
      • firefox.exe (PID: 2432)
      • firefox.exe (PID: 2484)
      • firefox.exe (PID: 1120)
      • firefox.exe (PID: 2904)
      • regsvr32.exe (PID: 1636)
      • regedit.exe (PID: 1272)
      • rundll32.exe (PID: 3092)
      • netsh.exe (PID: 3260)
      • iexplore.exe (PID: 1760)
      • netsh.exe (PID: 3780)
      • netsh.exe (PID: 3072)
      • iexplore.exe (PID: 1868)
      • firefox.exe (PID: 2320)
    • Application launched itself

      • firefox.exe (PID: 3820)
      • firefox.exe (PID: 908)
      • iexplore.exe (PID: 1760)
    • Reads the computer name

      • firefox.exe (PID: 908)
      • firefox.exe (PID: 3700)
      • firefox.exe (PID: 3840)
      • firefox.exe (PID: 2628)
      • firefox.exe (PID: 2432)
      • firefox.exe (PID: 3408)
      • firefox.exe (PID: 2904)
      • firefox.exe (PID: 2484)
      • firefox.exe (PID: 1120)
      • iexplore.exe (PID: 1760)
      • netsh.exe (PID: 3260)
      • netsh.exe (PID: 3780)
      • netsh.exe (PID: 3072)
      • iexplore.exe (PID: 1868)
      • firefox.exe (PID: 2320)
    • Creates files in the program directory

      • firefox.exe (PID: 908)
      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Reads CPU info

      • firefox.exe (PID: 908)
    • Creates files in the user directory

      • firefox.exe (PID: 908)
      • iexplore.exe (PID: 1868)
      • iexplore.exe (PID: 1760)
    • Manual execution by user

      • WinRAR.exe (PID: 3928)
    • Reads the date of Windows installation

      • firefox.exe (PID: 908)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 908)
      • iexplore.exe (PID: 1868)
      • iexplore.exe (PID: 1760)
    • Loads dropped or rewritten executable

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Application was dropped or rewritten from another process

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
      • bcact.exe (PID: 2968)
    • Creates a software uninstall entry

      • Bandicam 5.0.1.1799.tmp (PID: 2756)
    • Changes internet zones settings

      • iexplore.exe (PID: 1760)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1868)
      • iexplore.exe (PID: 1760)
      • firefox.exe (PID: 908)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1868)
      • iexplore.exe (PID: 1760)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1868)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1868)
      • iexplore.exe (PID: 1760)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 1868)
    • Reads the hosts file

      • bdcam.exe (PID: 4016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
29
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe bandicam 5.0.1.1799.exe no specs bandicam 5.0.1.1799.exe bandicam 5.0.1.1799.tmp regsvr32.exe no specs cmd.exe no specs cmd.exe no specs bcact.exe no specs bdcam.exe no specs rundll32.exe no specs cmd.exe no specs regedit.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs bdcam.exe no specs iexplore.exe iexplore.exe firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
380"C:\Users\admin\AppData\Local\Temp\Rar$EXa3928.47327\Bandicam 5.0.1.1799 (Repack & Portable) (Activated)\Bandicam 5.0.1.1799.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3928.47327\Bandicam 5.0.1.1799 (Repack & Portable) (Activated)\Bandicam 5.0.1.1799.exeWinRAR.exe
User:
admin
Company:
lrepacks.ru
Integrity Level:
MEDIUM
Description:
Bandicam Setup
Exit code:
3221226540
Version:
5.0.1.1799.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3928.47327\bandicam 5.0.1.1799 (repack & portable) (activated)\bandicam 5.0.1.1799.exe
c:\windows\system32\ntdll.dll
908"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/watch?v=LFYhqDnVmGUC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
91.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\advapi32.dll
996"C:\Windows\system32\cmd.exe" /C "C:\Users\admin\AppData\Local\Temp\is-3IPDB.tmp\bcact.bat"C:\Windows\system32\cmd.exeBandicam 5.0.1.1799.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
1120"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="908.11.659895420\1153386713" -parentBuildID 20210804193234 -prefsHandle 3740 -prefMapHandle 3736 -prefsLen 5920 -prefMapSize 246031 -appdir "C:\Program Files\Mozilla Firefox\browser" - 908 "\\.\pipe\gecko-crash-server-pipe.908" 3980 d4969b8 rddC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
91.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1272"C:\Windows\regedit.exe" /S "C:\Users\admin\AppData\Local\Temp\Rar$EXa3928.47327\Bandicam 5.0.1.1799 (Repack & Portable) (Activated)\settings.reg"C:\Windows\regedit.exe
Bandicam 5.0.1.1799.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1636"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Bandicam\BandiMPEG1\bdfilters.dll"C:\Windows\system32\regsvr32.exeBandicam 5.0.1.1799.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
1760C:\Windows\system32\cmd.exe /S /D /c" echo bandicam@bandisoft.com // lrepacks.ru"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1760"C:\Program Files\Internet Explorer\iexplore.exe" http://lrepacks.ru/C:\Program Files\Internet Explorer\iexplore.exe
Bandicam 5.0.1.1799.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1868"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1760 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2320"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="908.18.1746149222\176019369" -childID 7 -isForBrowser -prefsHandle 7908 -prefMapHandle 1552 -prefsLen 8735 -prefMapSize 246031 -jsInit 928 285716 -parentBuildID 20210804193234 -appdir "C:\Program Files\Mozilla Firefox\browser" - 908 "\\.\pipe\gecko-crash-server-pipe.908" 3372 1543ae28 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
91.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
Total events
58 347
Read events
56 674
Write events
1 660
Delete events
13

Modification events

(PID) Process:(3820) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
DA31BCE304000000
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
923DBCE304000000
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(908) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
Executable files
46
Suspicious files
326
Text files
330
Unknown types
602

Dropped files

PID
Process
Filename
Type
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.binbinary
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:
SHA256:
908firefox.exeC:\ProgramData\Mozilla\updates\308046B0AF4A39CB\update-config.jsontext
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\QLDYZ5~1.DEF\cert9.db-journalbinary
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4jsonlz4
MD5:
SHA256:
908firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\QLDYZ5~1.DEF\cert9.dbsqlite
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
95
TCP/UDP connections
362
DNS requests
651
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
908
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
908
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
908
firefox.exe
POST
200
142.250.186.35:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
908
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
908
firefox.exe
143.204.98.76:443
firefox.settings.services.mozilla.com
US
suspicious
908
firefox.exe
142.250.185.238:443
www.youtube.com
Google Inc.
US
whitelisted
908
firefox.exe
142.250.186.35:80
ocsp.pki.goog
Google Inc.
US
whitelisted
908
firefox.exe
143.204.98.36:443
content-signature-2.cdn.mozilla.net
US
suspicious
908
firefox.exe
172.217.23.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
908
firefox.exe
142.250.185.86:443
i.ytimg.com
Google Inc.
US
unknown
908
firefox.exe
142.250.186.42:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
908
firefox.exe
74.125.11.231:443
r2---sn-hgn7yn7z.googlevideo.com
Google Inc.
US
whitelisted
908
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
firefox.settings.services.mozilla.com
  • 143.204.98.76
  • 143.204.98.29
  • 143.204.98.33
  • 143.204.98.23
whitelisted
www.youtube.com
  • 142.250.185.238
  • 142.250.181.238
  • 216.58.212.174
  • 142.250.74.206
  • 142.250.186.46
  • 142.250.186.110
  • 142.250.186.142
  • 142.250.186.174
  • 142.250.184.206
  • 142.250.184.238
  • 172.217.18.110
  • 172.217.23.110
  • 216.58.212.142
  • 142.250.185.78
  • 172.217.16.142
  • 142.250.185.110
  • 142.250.185.142
  • 142.250.185.174
  • 142.250.185.206
  • 142.250.186.78
whitelisted
youtube-ui.l.google.com
  • 142.250.185.110
  • 172.217.16.142
  • 142.250.185.78
  • 216.58.212.142
  • 172.217.23.110
  • 172.217.18.110
  • 142.250.184.238
  • 142.250.184.206
  • 142.250.186.174
  • 142.250.186.142
  • 142.250.186.110
  • 142.250.186.46
  • 142.250.74.206
  • 216.58.212.174
  • 142.250.181.238
  • 142.250.185.238
  • 2a00:1450:4001:802::200e
  • 2a00:1450:4001:827::200e
  • 2a00:1450:4001:828::200e
  • 2a00:1450:4001:829::200e
  • 142.250.186.78
  • 142.250.185.206
  • 142.250.185.174
  • 142.250.185.142
whitelisted
ocsp.pki.goog
  • 142.250.186.35
whitelisted
pki-goog.l.google.com
  • 142.250.186.35
  • 2a00:1450:4001:827::2003
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
content-signature-2.cdn.mozilla.net
  • 143.204.98.36
  • 143.204.98.118
  • 143.204.98.30
  • 143.204.98.120
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Attempted User Privilege Gain
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port)
Attempted User Privilege Gain
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port)
Attempted User Privilege Gain
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port)
Attempted User Privilege Gain
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard High Port)
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
908
firefox.exe
Generic Protocol Command Decode
SURICATA STREAM Last ACK with wrong seq
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
1 ETPRO signatures available at the full report
Process
Message
regedit.exe
REGEDIT: CreateFile failed, GetLastError() = 2