URL:

https://download1509.mediafire.com/tqx8o2f6qdmgurkXmrE95jdE4L6KjRhMeLRjCoi6TzVPMOFNAvDHuGEyX5ANHJeym7bCCxQOaJxzYCFcGp72WaFdhwuRzo3lLv_RHK9bSkYC4xJrwUCzq3dikkxk1n2gMC2mEvJUCevdhknpu5ZTlnjVL1DqS5UP-OtbNnv1maVmdpbX/bvcg43860s6r6bv/AME+Beta+v0.7.13.zip

Full analysis: https://app.any.run/tasks/bf240dc3-2d02-4df1-b420-3200a72e8ff9
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: June 21, 2025, 22:37:15
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-scr
stealer
Indicators:
MD5:

624C0CB2F3C55D39AEAE05CFF9D0AF4E

SHA1:

3F3CF19EDF29B0BEEBBBF9D3D69170FBFC4A0461

SHA256:

DE21F4EC3ECEFDEED07B5D8589B93DB78725E1B27718E959E9C9B80643732B12

SSDEEP:

3:N8SE6QV8oeGGU0DsQe6RpTS6APMRZqWMfxId/jG2ktonzocEIW7Bp2tUIE2iVoTI:2S6jeGD0DsEPTXAPCZqHK/jKqUY8SAhp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • 7za.exe (PID: 6684)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Reads the date of Windows installation

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Application launched itself

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Process drops legitimate windows executable

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Executable content was dropped or overwritten

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • The process drops C-runtime libraries

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • The process creates files with name similar to system file names

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Reads security settings of Internet Explorer

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 7544)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 6748)
      • AME Beta v0.7.13.exe (PID: 5032)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Connects to unusual port

      • AME Beta v0.7.13.exe (PID: 1816)
    • Searches for installed software

      • AME Beta v0.7.13.exe (PID: 1816)
  • INFO

    • Reads Microsoft Office registry keys

      • firefox.exe (PID: 4968)
    • Application launched itself

      • firefox.exe (PID: 4676)
      • firefox.exe (PID: 4968)
      • msedge.exe (PID: 6948)
      • msedge.exe (PID: 7028)
      • msedge.exe (PID: 6160)
    • Launching a file from the Downloads directory

      • firefox.exe (PID: 4968)
    • The sample compiled with english language support

      • firefox.exe (PID: 4968)
      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 4968)
    • Manual execution by a user

      • WinRAR.exe (PID: 6680)
      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Reads the machine GUID from the registry

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 7544)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 6748)
      • AME Beta v0.7.13.exe (PID: 5800)
      • AME Beta v0.7.13.exe (PID: 5032)
    • Reads the computer name

      • AME Beta v0.7.13.exe (PID: 1816)
      • 7za.exe (PID: 2800)
      • AME Beta v0.7.13.exe (PID: 7544)
      • AME Beta v0.7.13.exe (PID: 3132)
      • identity_helper.exe (PID: 5876)
      • 7za.exe (PID: 6684)
      • AME Beta v0.7.13.exe (PID: 6748)
      • AME Beta v0.7.13.exe (PID: 5800)
      • 7za.exe (PID: 7360)
      • AME Beta v0.7.13.exe (PID: 5032)
    • Checks supported languages

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 7544)
      • 7za.exe (PID: 2800)
      • 7za.exe (PID: 6684)
      • identity_helper.exe (PID: 5876)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 6748)
      • AME Beta v0.7.13.exe (PID: 5800)
      • 7za.exe (PID: 7360)
      • AME Beta v0.7.13.exe (PID: 5032)
    • Process checks computer location settings

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Create files in a temporary directory

      • AME Beta v0.7.13.exe (PID: 1816)
      • 7za.exe (PID: 2800)
      • AME Beta v0.7.13.exe (PID: 3132)
      • 7za.exe (PID: 6684)
      • 7za.exe (PID: 7360)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Creates files in the program directory

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 7544)
      • MoUsoCoreWorker.exe (PID: 5528)
    • Reads Environment values

      • AME Beta v0.7.13.exe (PID: 1816)
      • AME Beta v0.7.13.exe (PID: 3132)
      • identity_helper.exe (PID: 5876)
      • AME Beta v0.7.13.exe (PID: 7544)
      • AME Beta v0.7.13.exe (PID: 5800)
    • Reads the software policy settings

      • slui.exe (PID: 6160)
      • AME Beta v0.7.13.exe (PID: 1816)
    • Disables trace logs

      • AME Beta v0.7.13.exe (PID: 1816)
    • Checks proxy server information

      • AME Beta v0.7.13.exe (PID: 1816)
      • slui.exe (PID: 6160)
    • Reads the time zone

      • MoUsoCoreWorker.exe (PID: 5528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
216
Monitored processes
60
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs svchost.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs rundll32.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs slui.exe winrar.exe no specs ame beta v0.7.13.exe ame beta v0.7.13.exe 7za.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs ame beta v0.7.13.exe msedge.exe no specs 7za.exe conhost.exe no specs ame beta v0.7.13.exe mousocoreworker.exe no specs usoclient.exe no specs ame beta v0.7.13.exe 7za.exe no specs conhost.exe no specs ame beta v0.7.13.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2160,i,334674615761066997,5852195414417659331,262144 --variations-seed-version --mojo-platform-channel-handle=2568 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1204"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3636,i,17567045583807023800,1388914847367588194,262144 --variations-seed-version --mojo-platform-channel-handle=3696 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1204"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=4340,i,334674615761066997,5852195414417659331,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1332"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250227124745 -prefsHandle 3460 -prefsLen 36996 -prefMapHandle 3464 -prefMapSize 272997 -ipcHandle 3480 -initialChannelId {feabd731-fdd5-4636-9730-467b920753dd} -parentPid 4968 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4968" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rddC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
136.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1800"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4136 -prefsLen 44877 -prefMapHandle 4140 -prefMapSize 272997 -jsInitHandle 4144 -jsInitLen 247456 -parentBuildID 20250227124745 -ipcHandle 4152 -initialChannelId {a2dbf3e0-568e-4e7d-92c8-07e91581ce34} -parentPid 4968 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4968" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
136.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\vcruntime140_1.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\bcrypt.dll
1816"C:\Users\admin\Desktop\AME Beta v0.7.13.exe" C:\Users\admin\Desktop\AME Beta v0.7.13.exe
explorer.exe
User:
admin
Company:
Ameliorated LLC
Integrity Level:
MEDIUM
Description:
AME
Exit code:
0
Version:
0.7.13
Modules
Images
c:\users\admin\desktop\ame beta v0.7.13.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1896"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2436,i,334674615761066997,5852195414417659331,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe7za.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6052 -prefsLen 39348 -prefMapHandle 6048 -prefMapSize 272997 -jsInitHandle 6044 -jsInitLen 247456 -parentBuildID 20250227124745 -ipcHandle 6072 -initialChannelId {e3c36ba7-b028-4267-9652-fe03569539ec} -parentPid 4968 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4968" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 12 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
136.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\crypt32.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
38 341
Read events
38 215
Write events
121
Delete events
5

Modification events

(PID) Process:(4968) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(6680) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6680) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6680) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6680) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1816) AME Beta v0.7.13.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AME Beta v0_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1816) AME Beta v0.7.13.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AME Beta v0_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1816) AME Beta v0.7.13.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AME Beta v0_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1816) AME Beta v0.7.13.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AME Beta v0_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1816) AME Beta v0.7.13.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AME Beta v0_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
177
Suspicious files
551
Text files
229
Unknown types
1

Dropped files

PID
Process
Filename
Type
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\bounce-tracking-protection.sqlite-journalbinary
MD5:4CD47FF17B8DCC9977F509A4FB7F0BFF
SHA256:24FBEA6D236896E70892A220452B1E2CD6C8FD1DECB5257467BE81DDEF3705B1
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\datareporting\glean\db\data.safe.binbinary
MD5:E3FC1A783723F57DD176551BA95A2197
SHA256:5961DB5898EF50EFAEB4C9D59D2033EA908DD47362214D5DD1CCBD4BAFC11F76
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
4968firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\activity-stream.contile.jsonbinary
MD5:D3E4EF3AF2EBD1645F896683A05200F6
SHA256:D01AE7727BB2394E0604C836C60F2AE813D2497CA4FA3A9DCA0C78CF8E736AC6
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:7392B1B042B042F86426952F3A0A4F05
SHA256:C6E93671BDF5DDD0271CDFB161C90DFD50D3C43051EFBF5CCB2A348D52D20ECB
4968firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
136
DNS requests
196
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4968
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
4968
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
4968
firefox.exe
POST
200
142.250.186.163:80
http://o.pki.goog/s/wr3/FIY
unknown
whitelisted
4968
firefox.exe
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
whitelisted
4968
firefox.exe
POST
200
142.250.186.163:80
http://o.pki.goog/we2
unknown
whitelisted
4968
firefox.exe
POST
200
104.18.38.233:80
http://ocsp.sectigo.com/
unknown
whitelisted
4968
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
4968
firefox.exe
POST
200
142.250.186.163:80
http://o.pki.goog/s/wr3/azY
unknown
whitelisted
4968
firefox.exe
POST
200
142.250.186.163:80
http://o.pki.goog/s/wr3/azY
unknown
whitelisted
4968
firefox.exe
POST
200
142.250.186.163:80
http://o.pki.goog/s/wr3/azY
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1488
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4968
firefox.exe
34.160.144.191:443
content-signature-2.cdn.mozilla.net
GOOGLE
US
whitelisted
4968
firefox.exe
205.196.123.197:443
download1509.mediafire.com
MEDIAFIRE
US
whitelisted
4968
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
4968
firefox.exe
34.36.137.203:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
whitelisted
4968
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
whitelisted
4968
firefox.exe
142.250.186.163:80
o.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.110
whitelisted
content-signature-2.cdn.mozilla.net
  • 34.160.144.191
whitelisted
content-signature-chains.prod.autograph.services.mozaws.net
  • 34.160.144.191
  • 2600:1901:0:92a9::
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
download1509.mediafire.com
  • 205.196.123.197
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.36.137.203
whitelisted
spocs.getpocket.com
  • 34.36.137.203
whitelisted
mc.prod.ads.prod.webservices.mozgcp.net
  • 34.36.137.203
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Potentially Bad Traffic
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (download .mediafire .com)
2200
svchost.exe
Potentially Bad Traffic
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (download .mediafire .com)
2200
svchost.exe
Potentially Bad Traffic
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (download .mediafire .com)
No debug info