URL:

https://mega.nz/file/QOE0gIiY#_oLOTV2fsFB5hJ56DqKSPZA8A8JR6Yv8TT-TOok9ezE

Full analysis: https://app.any.run/tasks/adb210aa-2b59-43cd-ac56-688eeb51e2a3
Verdict: Malicious activity
Analysis date: November 05, 2023, 13:25:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
SHA1:

4EDAE178C8510FE406162118EEA0984625B38B99

SHA256:

D3A910C7A2CD12E65287607A1127DBAA4A0B3EB62D16E795A0FD65D4145962B6

SSDEEP:

3:N8X/iggVCpiBkYvGCr/COsnI:28VCpimYvGOa1nI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
    • The process creates files with name similar to system file names

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
    • Reads settings of System Certificates

      • NinjaRipper2.exe (PID: 3744)
    • Reads the Internet Settings

      • NinjaRipper2.exe (PID: 3744)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3460)
      • firefox.exe (PID: 3428)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1700)
      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
      • NinjaRipper2.exe (PID: 3744)
    • Manual execution by a user

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
      • WinRAR.exe (PID: 1364)
      • wmpnscfg.exe (PID: 1700)
      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 2760)
      • NinjaRipper2.exe (PID: 3744)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1364)
    • Checks supported languages

      • wmpnscfg.exe (PID: 1700)
      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
      • NinjaRipper2.exe (PID: 3744)
    • Create files in a temporary directory

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
    • Creates files in the program directory

      • Ninja Ripper 2.0.5 beta.setup.exe (PID: 3784)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 1364)
      • firefox.exe (PID: 3460)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 1700)
      • NinjaRipper2.exe (PID: 3744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
16
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs wmpnscfg.exe no specs firefox.exe no specs winrar.exe no specs ninja ripper 2.0.5 beta.setup.exe no specs ninja ripper 2.0.5 beta.setup.exe ninjaripper2.exe

Process information

PID
CMD
Path
Indicators
Parent process
556"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3460.4.1304017491\1082348423" -childID 3 -isForBrowser -prefsHandle 3836 -prefMapHandle 3840 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1e50b0a-31fe-4408-be67-de8ac9919081} 3460 "\\.\pipe\gecko-crash-server-pipe.3460" 3856 187b7e00 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1232"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3460.7.1327694956\635992671" -childID 6 -isForBrowser -prefsHandle 4116 -prefMapHandle 4112 -prefsLen 34336 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fd2f574-ae1c-4914-8432-1dfcdcd300ca} 3460 "\\.\pipe\gecko-crash-server-pipe.3460" 4192 17e1d560 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1364"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Ninja Ripper 2.0.5.zip"C:\program files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1700"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2760"C:\Users\admin\Desktop\Ninja Ripper 2.0.5 beta.setup.exe" C:\Users\admin\Desktop\Ninja Ripper 2.0.5 beta.setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\ninja ripper 2.0.5 beta.setup.exe
c:\windows\system32\ntdll.dll
3120"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3460.8.751565355\977389009" -childID 7 -isForBrowser -prefsHandle 4592 -prefMapHandle 4588 -prefsLen 31122 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8bdb608-127d-4e73-bfb6-3efec48f1888} 3460 "\\.\pipe\gecko-crash-server-pipe.3460" 4720 165479b0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3428"C:\Program Files\Mozilla Firefox\firefox.exe" "https://mega.nz/file/QOE0gIiY#_oLOTV2fsFB5hJ56DqKSPZA8A8JR6Yv8TT-TOok9ezE"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3460"C:\Program Files\Mozilla Firefox\firefox.exe" https://mega.nz/file/QOE0gIiY#_oLOTV2fsFB5hJ56DqKSPZA8A8JR6Yv8TT-TOok9ezEC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3552"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3460.5.1898428332\797736731" -childID 4 -isForBrowser -prefsHandle 3980 -prefMapHandle 3984 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4eeb4291-347b-477e-bcfa-966e0bd0179d} 3460 "\\.\pipe\gecko-crash-server-pipe.3460" 3964 17e1d3f0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3564"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3460.0.1611529264\2070755779" -parentBuildID 20230710165010 -prefsHandle 1120 -prefMapHandle 1112 -prefsLen 28523 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0059ed0b-c239-40c6-ac2f-4e1dcc43362a} 3460 "\\.\pipe\gecko-crash-server-pipe.3460" 1204 d0a9360 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
1
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
15 062
Read events
14 966
Write events
93
Delete events
3

Modification events

(PID) Process:(3428) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
2166C0A101000000
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
044CC1A101000000
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
(PID) Process:(3460) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|AppLastRunTime
Value:
D14E5F3C23B0D901
Executable files
57
Suspicious files
189
Text files
57
Unknown types
0

Dropped files

PID
Process
Filename
Type
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:60E0DE9E05EC76C749D80F0D15A81B21
SHA256:08252FA62CCCCD316474E20CC7317A6B5C932B2C972234318E8CCDA39EC2EF48
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3460firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:B7A3C61D0C144CC5E166B1E769CA8F8C
SHA256:7FADCB77FFACA6B9E9F15C6F1CD3AAD4C20DCD90FA92429A627A3A7110CA2644
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:60E0DE9E05EC76C749D80F0D15A81B21
SHA256:08252FA62CCCCD316474E20CC7317A6B5C932B2C972234318E8CCDA39EC2EF48
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3460firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
72
DNS requests
144
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3460
firefox.exe
POST
200
142.250.184.227:80
http://ocsp.pki.goog/gts1c3
US
binary
472 b
unknown
3460
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
US
text
8 b
unknown
3460
firefox.exe
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
binary
472 b
unknown
3460
firefox.exe
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
binary
472 b
unknown
3460
firefox.exe
POST
200
18.245.65.219:80
http://ocsp.r2m02.amazontrust.com/
US
binary
471 b
unknown
3460
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
DE
binary
503 b
unknown
3460
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
DE
binary
503 b
unknown
3460
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
DE
binary
503 b
unknown
3460
firefox.exe
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
binary
472 b
unknown
3460
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
DE
binary
503 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3460
firefox.exe
31.216.145.5:443
mega.nz
Datacenter Luxembourg S.A.
LU
unknown
3460
firefox.exe
142.250.185.202:443
safebrowsing.googleapis.com
whitelisted
3460
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
3460
firefox.exe
89.44.169.134:443
eu.static.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
3460
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3460
firefox.exe
18.214.83.77:443
spocs.getpocket.com
AMAZON-AES
US
unknown
3460
firefox.exe
142.250.184.227:80
ocsp.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
mega.nz
  • 31.216.145.5
  • 31.216.144.5
  • 2a0b:e46:1:144::5
  • 2a0b:e46:1:145::5
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
spocs.getpocket.com
  • 18.214.83.77
  • 34.197.137.200
  • 18.205.42.245
  • 54.209.99.24
shared
proxyserverecs-1736642167.us-east-1.elb.amazonaws.com
  • 34.197.137.200
  • 54.209.99.24
  • 18.214.83.77
  • 18.205.42.245
shared
r3.o.lencr.org
  • 184.24.77.54
  • 184.24.77.76
  • 184.24.77.53
  • 184.24.77.45
  • 184.24.77.46
  • 184.24.77.56
  • 184.24.77.62
shared
a1887.dscq.akamai.net
  • 184.24.77.53
  • 184.24.77.82
  • 184.24.77.76
  • 2a02:26f0:3500:e::1732:8353
  • 2a02:26f0:3500:e::1732:835c
  • 184.24.77.56
  • 184.24.77.54
  • 184.24.77.46
  • 184.24.77.45
  • 184.24.77.62
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
1080
svchost.exe
Misc activity
ET INFO Observed DNS Query to Filesharing Service (mega .co .nz)
Process
Message
NinjaRipper2.exe
NR[3864]: ****NinjaRipper2****
NinjaRipper2.exe
NR[3864]: Exe: C:\Program Files\Ninja Ripper 2.0.5 beta\bin32\NinjaRipper2.exe
NinjaRipper2.exe
NR[3864]: WorkDir: C:\Program Files\Ninja Ripper 2.0.5 beta\bin32
NinjaRipper2.exe
NR[3864]: New QtPlugin dir=C:\Program Files\Ninja Ripper 2.0.5 beta\bin32\
NinjaRipper2.exe
NR[3864]: CmdLine: "C:\Program Files\Ninja Ripper 2.0.5 beta\bin32\NinjaRipper2.exe"
NinjaRipper2.exe
NR[3864]: New QtPlugin dir=C:\Program Files\Ninja Ripper 2.0.5 beta\bin32\platforms
NinjaRipper2.exe
NR[3864]: Pid=3744