URL:

televzr.com

Full analysis: https://app.any.run/tasks/04566dcb-7824-4277-8496-f36f5d2d5485
Verdict: Malicious activity
Analysis date: March 04, 2024, 19:32:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

4B555C149121D097D9CD6CE3FA28583A

SHA1:

7C7F07D6D5EBED71099ADDE15D5524B519D159FE

SHA256:

876ACE9CC61E0F399FE2E58FE7FE6ABDD8215547B68EBFFEEEF9AE8819669709

SSDEEP:

3:/vGT:/i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • vcredist_x86.exe (PID: 1028)
    • Actions looks like stealing of personal data

      • Televzr.exe (PID: 3548)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
    • The process creates files with name similar to system file names

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
    • Starts application with an unusual extension

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • cmd.exe (PID: 3840)
    • Get information on the list of running processes

      • nsD2A0.tmp (PID: 3748)
      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • cmd.exe (PID: 3604)
    • Starts CMD.EXE for commands execution

      • nsD2A0.tmp (PID: 3748)
      • nsC5BE.tmp (PID: 2524)
    • Executable content was dropped or overwritten

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • vcredist_x86.exe (PID: 1028)
    • Reads security settings of Internet Explorer

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Setup.exe (PID: 4040)
    • Drops 7-zip archiver for unpacking

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
    • Process drops legitimate windows executable

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • vcredist_x86.exe (PID: 1028)
    • Creates a software uninstall entry

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
    • Starts a Microsoft application from unusual location

      • vcredist_x86.exe (PID: 3024)
      • vcredist_x86.exe (PID: 1028)
    • Reads the Internet Settings

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Televzr.exe (PID: 3824)
    • Checks Windows Trust Settings

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Setup.exe (PID: 4040)
    • Reads settings of System Certificates

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Setup.exe (PID: 4040)
      • Televzr.exe (PID: 3824)
    • Application launched itself

      • Televzr.exe (PID: 3824)
    • Uses REG/REGEDIT.EXE to modify registry

      • Televzr.exe (PID: 3824)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3864)
      • firefox.exe (PID: 4052)
    • Reads the computer name

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • wmpnscfg.exe (PID: 2168)
      • vcredist_x86.exe (PID: 1028)
      • Setup.exe (PID: 4040)
      • Televzr.exe (PID: 3824)
      • Televzr.exe (PID: 2436)
      • Televzr.exe (PID: 2320)
      • Televzr.exe (PID: 764)
    • The process uses the downloaded file

      • firefox.exe (PID: 4052)
      • cmd.exe (PID: 3840)
    • Checks supported languages

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • nsC5BE.tmp (PID: 2524)
      • more.com (PID: 3572)
      • nsD2A0.tmp (PID: 3748)
      • vcredist_x86.exe (PID: 1028)
      • wmpnscfg.exe (PID: 2168)
      • Setup.exe (PID: 4040)
      • Televzr.exe (PID: 3824)
      • Televzr.exe (PID: 2436)
      • Televzr.exe (PID: 2320)
      • Televzr.exe (PID: 3852)
      • Televzr.exe (PID: 764)
      • Televzr.exe (PID: 3548)
    • Manual execution by a user

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • wmpnscfg.exe (PID: 2168)
      • Televzr.exe (PID: 3824)
    • Checks proxy server information

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
    • Create files in a temporary directory

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Setup.exe (PID: 4040)
      • Televzr.exe (PID: 3824)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 4052)
    • Drops the executable file immediately after the start

      • firefox.exe (PID: 4052)
    • Creates files or folders in the user directory

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Televzr.exe (PID: 3824)
      • Televzr.exe (PID: 3548)
      • Televzr.exe (PID: 2320)
    • Reads Environment values

      • vcredist_x86.exe (PID: 1028)
      • Televzr.exe (PID: 3824)
    • Reads the machine GUID from the registry

      • vcredist_x86.exe (PID: 1028)
      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Setup.exe (PID: 4040)
      • Televzr.exe (PID: 3824)
    • Reads the software policy settings

      • VideoDownloader-[344852064.1709580779,,,,].exe (PID: 2512)
      • Setup.exe (PID: 4040)
      • Televzr.exe (PID: 3824)
    • Reads CPU info

      • Setup.exe (PID: 4040)
    • Reads product name

      • Televzr.exe (PID: 3824)
    • Process checks computer location settings

      • Televzr.exe (PID: 3852)
      • Televzr.exe (PID: 3824)
      • Televzr.exe (PID: 3548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
55
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs videodownloader-[344852064.1709580779,,,,].exe nsc5be.tmp no specs cmd.exe no specs more.com no specs nsd2a0.tmp no specs cmd.exe no specs tasklist.exe no specs find.exe no specs wmpnscfg.exe no specs vcredist_x86.exe no specs vcredist_x86.exe setup.exe televzr.exe reg.exe no specs reg.exe no specs televzr.exe no specs televzr.exe televzr.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs televzr.exe no specs televzr.exe reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
268C:\Windows\system32\reg.exe ADD HKCU\Software\Classes\.mkv\OpenWithProgids /v televzr /t REG_SZ /d "" /fC:\Windows\System32\reg.exeTelevzr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
296"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4052.8.1094295048\283023696" -childID 7 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 34336 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d84d3f87-d9fb-4d58-8073-c984659473f6} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" 4060 18d4ec90 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
584C:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\\UserChoice /v ProgIdC:\Windows\System32\reg.exeTelevzr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
764"C:\Users\admin\AppData\Local\televzr\Televzr.exe" --type=gpu-process --field-trial-handle=1112,18000975110326218887,13871539214139691817,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,HardwareMediaKeyHandling,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --no-sandbox --user-data-dir="C:\Users\admin\AppData\Roaming\Televzr Desktop" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1132 /prefetch:2C:\Users\admin\AppData\Local\televzr\Televzr.exeTelevzr.exe
User:
admin
Company:
ITPRODUCTDEV LTD
Integrity Level:
MEDIUM
Description:
Televzr
Exit code:
0
Version:
1.16.10
Modules
Images
c:\users\admin\appdata\local\televzr\televzr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\televzr\ffmpeg.dll
c:\windows\system32\uiautomationcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
896C:\Windows\system32\reg.exe ADD HKCU\Software\Classes\televzr\shell\open\command /fC:\Windows\System32\reg.exeTelevzr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1028"C:\Users\admin\AppData\Local\Temp\nsnC59E.tmp\vcredist_x86.exe" /install /quiet /norestartC:\Users\admin\AppData\Local\Temp\nsnC59E.tmp\vcredist_x86.exe
VideoDownloader-[344852064.1709580779,,,,].exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2010 x86 Redistributable Setup
Exit code:
0
Version:
10.0.40219.325
Modules
Images
c:\users\admin\appdata\local\temp\nsnc59e.tmp\vcredist_x86.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1432C:\Windows\system32\reg.exe QUERY "HKCU\Software\Classes\(value not set)\shell\open\command" /veC:\Windows\System32\reg.exeTelevzr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1504C:\Windows\system32\reg.exe QUERY HKCU\Software\Classes\ /veC:\Windows\System32\reg.exeTelevzr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1588C:\Windows\system32\reg.exe QUERY "HKCU\Software\Classes\(value not set)\shell\open\command" /veC:\Windows\System32\reg.exeTelevzr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1596"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4052.6.807669405\2055333510" -childID 5 -isForBrowser -prefsHandle 3712 -prefMapHandle 3708 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1dd6459-d1af-4d39-b1f1-6178c8a5975b} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" 3748 19377280 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
38 387
Read events
38 183
Write events
187
Delete events
17

Modification events

(PID) Process:(3864) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
82223A4F01000000
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
090D3C4F01000000
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Installer\308046B0AF4A39CB
Operation:delete valueName:installer.taskbarpin.win10.enabled
Value:
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(4052) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
Executable files
59
Suspicious files
260
Text files
129
Unknown types
114

Dropped files

PID
Process
Filename
Type
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage.sqlite-journalbinary
MD5:CBD3CF01E62BEDC47044E9F6F6168042
SHA256:5C04C8F187C597E3C147284813596A308A623282EAB371EDC85D8AB0318E8307
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\protections.sqlite-journalbinary
MD5:35531F80E14CFC84A70820111DA7F1C0
SHA256:75F47192503907D67A05857588CFAE640CFF71FD10F5D1F70F2DBECD0DD7206B
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\datareporting\glean\db\data.safe.tmpdbf
MD5:B1C8AA9861B461806C9E738511EDD6AE
SHA256:7CEA48E7ADD3340B36F47BA4EA2DED8D6CB0423FFC2A64B44D7E86E0507D6B70
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
4052firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:60E0DE9E05EC76C749D80F0D15A81B21
SHA256:08252FA62CCCCD316474E20CC7317A6B5C932B2C972234318E8CCDA39EC2EF48
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
38
TCP/UDP connections
115
DNS requests
187
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4052
firefox.exe
GET
301
104.21.63.211:80
http://televzr.com/
unknown
unknown
4052
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
text
90 b
unknown
4052
firefox.exe
POST
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
4052
firefox.exe
POST
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
binary
471 b
unknown
4052
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
text
8 b
unknown
4052
firefox.exe
POST
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
4052
firefox.exe
POST
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
4052
firefox.exe
POST
200
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
binary
472 b
unknown
4052
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
4052
firefox.exe
POST
142.250.185.131:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4052
firefox.exe
104.21.63.211:443
televzr.com
unknown
4052
firefox.exe
104.21.63.211:80
televzr.com
CLOUDFLARENET
unknown
4052
firefox.exe
142.250.184.234:443
safebrowsing.googleapis.com
whitelisted
4052
firefox.exe
34.107.243.93:443
push.services.mozilla.com
GOOGLE
US
unknown
4052
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
4052
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
unknown
4052
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown

DNS requests

Domain
IP
Reputation
televzr.com
  • 104.21.63.211
  • 172.67.150.95
  • 2606:4700:3032::ac43:965f
  • 2606:4700:3031::6815:3fd3
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
spocs.getpocket.com
  • 34.117.188.166
shared
gkegw.prod.ads.prod.webservices.mozgcp.net
  • 34.117.188.166
unknown
r3.o.lencr.org
  • 184.24.77.54
  • 184.24.77.48
  • 184.24.77.79
shared
firefox.settings.services.mozilla.com
  • 34.149.100.209
whitelisted

Threats

No threats detected
Process
Message
Setup.exe
The operation completed successfully.