analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://drive.google.com/uc?id=1SUwCgmd6jhwI0yHwMaKU8vyWvniP_E99&export=download

Full analysis: https://app.any.run/tasks/cf7245b9-0a99-447b-b4eb-c443f504432f
Verdict: Malicious activity
Analysis date: November 16, 2019, 14:12:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

0503C0BAA5C1DD1B2196AD15432F4F72

SHA1:

43AF65E89D820F4946F6A24CB4C87F37E424C39D

SHA256:

ABAB5938A1E0B7563B38CEE29D1A1C8DF8A162AC17C7CFAEEB09F2B243722DDE

SSDEEP:

3:N8PMMtZJu2NMuvnm1T1qOz0KdVKlM:2A2HvnCR9hdVK+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • regsvr32.exe (PID: 3508)
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 4044)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 2308)
    • Executed via WMI

      • regsvr32.exe (PID: 3508)
    • Executed via COM

      • iexplore.exe (PID: 1788)
      • iexplore.exe (PID: 1992)
      • iexplore.exe (PID: 3804)
      • iexplore.exe (PID: 1772)
      • iexplore.exe (PID: 1584)
      • iexplore.exe (PID: 2108)
      • iexplore.exe (PID: 1536)
      • iexplore.exe (PID: 748)
      • iexplore.exe (PID: 620)
      • iexplore.exe (PID: 3416)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 4044)
    • Application launched itself

      • firefox.exe (PID: 4044)
      • iexplore.exe (PID: 1788)
      • iexplore.exe (PID: 1772)
      • iexplore.exe (PID: 3804)
      • iexplore.exe (PID: 748)
      • iexplore.exe (PID: 2108)
      • iexplore.exe (PID: 620)
      • iexplore.exe (PID: 3416)
    • Manual execution by user

      • explorer.exe (PID: 3908)
      • WScript.exe (PID: 2308)
      • NOTEPAD.EXE (PID: 2544)
      • NOTEPAD.EXE (PID: 3500)
    • Creates files in the user directory

      • firefox.exe (PID: 4044)
    • Reads the hosts file

      • regsvr32.exe (PID: 3508)
    • Changes internet zones settings

      • iexplore.exe (PID: 1992)
      • iexplore.exe (PID: 1788)
      • iexplore.exe (PID: 3804)
      • iexplore.exe (PID: 1584)
      • iexplore.exe (PID: 1772)
      • iexplore.exe (PID: 2108)
      • iexplore.exe (PID: 748)
      • iexplore.exe (PID: 1536)
      • iexplore.exe (PID: 620)
      • iexplore.exe (PID: 3416)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3080)
      • iexplore.exe (PID: 3180)
      • iexplore.exe (PID: 3032)
      • iexplore.exe (PID: 3836)
      • iexplore.exe (PID: 3476)
      • iexplore.exe (PID: 3296)
      • iexplore.exe (PID: 2712)
      • iexplore.exe (PID: 3700)
      • iexplore.exe (PID: 2144)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3080)
      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3180)
      • iexplore.exe (PID: 3032)
      • iexplore.exe (PID: 3836)
      • iexplore.exe (PID: 3476)
      • iexplore.exe (PID: 3296)
      • iexplore.exe (PID: 3700)
      • iexplore.exe (PID: 2712)
      • iexplore.exe (PID: 2144)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
32
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe winrar.exe no specs explorer.exe no specs wscript.exe regsvr32.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe notepad.exe no specs iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe notepad.exe no specs iexplore.exe no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2172"C:\Program Files\Mozilla Firefox\firefox.exe" "https://drive.google.com/uc?id=1SUwCgmd6jhwI0yHwMaKU8vyWvniP_E99&export=download"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
4044"C:\Program Files\Mozilla Firefox\firefox.exe" https://drive.google.com/uc?id=1SUwCgmd6jhwI0yHwMaKU8vyWvniP_E99&export=downloadC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
1028"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.0.43858104\646726711" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 1176 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
640"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.3.697681666\1313555930" -childID 1 -isForBrowser -prefsHandle 1768 -prefMapHandle 1640 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 1788 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
3664"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.13.1519966725\815133544" -childID 2 -isForBrowser -prefsHandle 2812 -prefMapHandle 2816 -prefsLen 5996 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 2828 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2472"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4044.20.344882688\430949620" -childID 3 -isForBrowser -prefsHandle 3744 -prefMapHandle 3748 -prefsLen 7297 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 4044 "\\.\pipe\gecko-crash-server-pipe.4044" 3760 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
1324"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\presentation#69645.zip"C:\Program Files\WinRAR\WinRAR.exefirefox.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3908"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2308"C:\Windows\System32\WScript.exe" "C:\Users\admin\Downloads\presentation#69645\presentation.vbs" C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3508regsvr32.exe -s C:\Users\admin\AppData\Local\Temp\pDGgvVMTSTgc.txtC:\Windows\system32\regsvr32.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
5 028
Read events
4 614
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
72
Text files
47
Unknown types
50

Dropped files

PID
Process
Filename
Type
4044firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shm
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shm
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\base-track-digest256.sbstore
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\block-flash-digest256.pset
MD5:
SHA256:
4044firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\block-flash-digest256.sbstore
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
41
DNS requests
83
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4044
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3296
iexplore.exe
GET
404
5.53.124.190:80
http://w8.wensa.at/api1/SInuAqOqNuvdyQBJkCr0dER/a65VEXKqbI/YQlQiAsWU1fh_2BV1/_2B21yDVv5qU/6i5pUSlSthS/P7NlNa3P7MxzTM/He8DAGL7CNrQA0TJtsQfR/iZEK8haT9IMM7BrN/l2dCWSpcs09yy7x/Cj_2BJVZNymBaQgEhr/91rp0E71q/4q6rH5n5LNrnvNQAv_2F/DBoDNmln49Se4hls74h/rELYgPT7TjwR9VTB_2FE_2/BD1e4IFqb4msV/r15ZcNWZ/oHVh8P9cHB2Dn9UM_0A_0DK/XA7uE8fedC/q7rBwZuTEpr/e_2FAr
RU
html
167 b
malicious
3836
iexplore.exe
GET
404
5.53.124.190:80
http://w8.wensa.at/api1/uN0MyLT9fTA_/2BFS_2BJQOB/3ovz_2Bjgdl_2B/MP941orIpiH0Tmc_2BswJ/fLQoiQ53mUeYcaf8/3WBDyxn7vGRhZKI/EjdfVvIKNFRCkirApg/eSxXE27vC/H9j2oeB61KWLWlndEMet/Wp_2BzFbI_2FKrfiyUv/xJZvmPqpxV3lq3mF_2FZMS/_2FyOdgnL82hi/pzZXwmnY/gwsvtayBF6z2jdOHtyRQGOO/tpxKgyGALT/_2Bo69U7x_2FeP46Y/J3wBhz44rsFp/fCRo0ld0rMF/Jzr_0A_0Dquynp/3UCrj54SZGyC2mMaQY/djw
RU
html
167 b
malicious
4044
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
4044
firefox.exe
POST
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
4044
firefox.exe
POST
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1
US
der
472 b
whitelisted
3700
iexplore.exe
GET
404
5.53.124.190:80
http://w8.wensa.at/api1/CLe_2B2y0ORoaoa9OW8FIk/dYOzCpddmulBH/9_2FG4mW/CBnC3Z3QovboVd0FzPpUlns/s7QVbTzhRw/agESwmmWGKeg9L4_2/BGi2m5sN1DtC/lCYtNJWVk6W/0hvTVcT_2Bh_2B/JAZivdMklPA1ECqHDpXJv/vpoJ_2FrMUxr5kmh/02H4Kk6WC1_2FmK/URlZJRPfSZjT9TKj3_/2B53HA0Oj/e3kYapplhBi_2BdOOuoR/ZnVnZUb_2FOtvAKxXlP/mHzB8gbzjvGytsM3oguzSs/YW_0A_0Dv_2F3/TEpUZJ5DtvY1Ck3RpECy/XqC
RU
html
167 b
malicious
4044
firefox.exe
POST
200
216.58.206.3:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
2712
iexplore.exe
GET
404
5.53.124.190:80
http://w8.wensa.at/api1/cQJnpVvHV6E/uA_2BLAetl33A_/2FHDeAFQKkb_2FWrKEfvY/GonwbzBdasMLmgdY/pLpJ5A5qOP9kzeF/eXnCW2AKSDmrBKQTO3/Ra8j1W6Ek/60aWOR7FyfTfi_2BnVKn/ZtB9PgAoeoJpblPemnF/vH9o2WD9ZSeoW9d74TYOAH/KO6lZOO7RKrUu/sUX2hhQv/wDGZLTFI6CHEx4EpWMJHKKe/7pfBeQmXZc/Ie8Y459bjnwGfRhQi/PAzQ6Fi_2FPh/zfjr_2FuGeX/Snbdz_0A_0DAXg/_2FxI9bY0aBOeVDnPxhxf/B_2Fv_2F
RU
html
167 b
malicious
1788
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4044
firefox.exe
2.16.186.112:80
detectportal.firefox.com
Akamai International B.V.
whitelisted
4044
firefox.exe
52.89.218.39:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
4044
firefox.exe
143.204.214.5:443
snippets.cdn.mozilla.net
US
malicious
4044
firefox.exe
35.162.117.80:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
4044
firefox.exe
52.35.84.106:443
push.services.mozilla.com
Amazon.com, Inc.
US
malicious
4044
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
4044
firefox.exe
216.58.206.3:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4044
firefox.exe
172.217.18.174:443
drive.google.com
Google Inc.
US
whitelisted
4044
firefox.exe
172.217.18.170:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
4044
firefox.exe
216.58.206.1:443
doc-04-7g-docs.googleusercontent.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 2.16.186.112
  • 2.16.186.50
whitelisted
a1089.dscd.akamai.net
  • 2.16.186.50
  • 2.16.186.112
whitelisted
search.services.mozilla.com
  • 52.89.218.39
  • 52.35.182.58
  • 35.164.109.147
whitelisted
search.r53-2.services.mozilla.com
  • 35.164.109.147
  • 52.35.182.58
  • 52.89.218.39
whitelisted
push.services.mozilla.com
  • 52.35.84.106
whitelisted
autopush.prod.mozaws.net
  • 52.35.84.106
whitelisted
snippets.cdn.mozilla.net
  • 143.204.214.5
  • 143.204.214.11
  • 143.204.214.95
  • 143.204.214.118
whitelisted
d228z91au11ukj.cloudfront.net
  • 143.204.214.118
  • 143.204.214.95
  • 143.204.214.11
  • 143.204.214.5
whitelisted
tiles.services.mozilla.com
  • 35.162.117.80
  • 35.166.89.106
  • 54.69.207.70
  • 34.223.160.244
  • 34.213.101.166
  • 35.155.128.5
  • 54.68.132.173
  • 54.186.225.209
whitelisted
tiles.r53-2.services.mozilla.com
  • 54.186.225.209
  • 54.68.132.173
  • 35.155.128.5
  • 34.213.101.166
  • 34.223.160.244
  • 54.69.207.70
  • 35.166.89.106
  • 35.162.117.80
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
No debug info