URL:

https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip?raw=true

Full analysis: https://app.any.run/tasks/f92e8d6d-894f-424a-a98e-20ae2a1e5455
Verdict: Malicious activity
Threats:

CryptoWall is a notorious ransomware family that emerged in early 2014 and rapidly became one of the most destructive cyber threats of its time. This malware encrypts victims' files using strong AES encryption, demands ransom payments in Bitcoin, and has generated hundreds of millions of dollars for cybercriminals.

Analysis date: January 14, 2022, 21:11:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
ransomware
cryptowall
Indicators:
MD5:

1C2DF4ACD4C5C0715EF0252B698FD6B6

SHA1:

9873878ED48B2E0AD25889232E0EEB243BF468A2

SHA256:

E38FCFEBD4D0DC3922AF8069B71D3F87D3B259DD4FD59B0C9B5CA4714F4E5A2A

SSDEEP:

3:N8tEdsxHuJKqIEHDhzzu5c7K5E31z5c7K5FfDUj:2u6tuJKz+By5cOaFz5cO7DUj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • cryptowall.bin.exe (PID: 1632)
      • cryptowall.bin.exe (PID: 2896)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 3232)
    • Drops executable file immediately after starts

      • explorer.exe (PID: 3232)
    • Writes to a start menu file

      • explorer.exe (PID: 3232)
    • Uses SVCHOST.EXE for hidden code execution

      • explorer.exe (PID: 3232)
    • Deletes shadow copies

      • explorer.exe (PID: 3232)
    • Starts BCDEDIT.EXE to disable recovery

      • explorer.exe (PID: 3232)
    • CRYPTOWALL was detected

      • svchost.exe (PID: 508)
    • Connects to CnC server

      • svchost.exe (PID: 508)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 3036)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3036)
      • explorer.exe (PID: 3232)
    • Checks supported languages

      • cryptowall.bin.exe (PID: 1632)
      • cryptowall.bin.exe (PID: 2896)
      • WinRAR.exe (PID: 3036)
    • Application launched itself

      • cryptowall.bin.exe (PID: 1632)
    • Creates files in the user directory

      • explorer.exe (PID: 3232)
    • Checks for external IP

      • svchost.exe (PID: 508)
    • Starts Microsoft Office Application

      • WINWORD.EXE (PID: 3132)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 880)
      • firefox.exe (PID: 3904)
    • Reads the computer name

      • firefox.exe (PID: 2404)
      • firefox.exe (PID: 3904)
      • firefox.exe (PID: 868)
      • firefox.exe (PID: 2808)
      • firefox.exe (PID: 3424)
      • firefox.exe (PID: 3872)
      • explorer.exe (PID: 3232)
      • svchost.exe (PID: 508)
      • vssadmin.exe (PID: 3644)
      • WINWORD.EXE (PID: 3132)
      • CLVIEW.EXE (PID: 3980)
    • Reads CPU info

      • firefox.exe (PID: 3904)
    • Creates files in the user directory

      • firefox.exe (PID: 3904)
      • WINWORD.EXE (PID: 3132)
    • Checks supported languages

      • firefox.exe (PID: 3424)
      • firefox.exe (PID: 2808)
      • firefox.exe (PID: 880)
      • firefox.exe (PID: 3904)
      • firefox.exe (PID: 3872)
      • firefox.exe (PID: 2404)
      • firefox.exe (PID: 868)
      • explorer.exe (PID: 3232)
      • svchost.exe (PID: 508)
      • bcdedit.exe (PID: 3536)
      • bcdedit.exe (PID: 3696)
      • vssadmin.exe (PID: 3644)
      • WINWORD.EXE (PID: 3132)
      • CLVIEW.EXE (PID: 3980)
    • Creates files in the program directory

      • firefox.exe (PID: 3904)
    • Manual execution by user

      • WinRAR.exe (PID: 3036)
      • cryptowall.bin.exe (PID: 1632)
      • WINWORD.EXE (PID: 3132)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 3904)
      • svchost.exe (PID: 508)
    • Reads the date of Windows installation

      • firefox.exe (PID: 3904)
    • Reads settings of System Certificates

      • svchost.exe (PID: 508)
    • Reads Microsoft Office registry keys

      • CLVIEW.EXE (PID: 3980)
      • WINWORD.EXE (PID: 3132)
    • Reads Microsoft Outlook installation path

      • CLVIEW.EXE (PID: 3980)
    • Reads internet explorer settings

      • CLVIEW.EXE (PID: 3980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
17
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe cryptowall.bin.exe no specs cryptowall.bin.exe no specs explorer.exe #CRYPTOWALL svchost.exe vssadmin.exe no specs bcdedit.exe no specs bcdedit.exe no specs winword.exe no specs clview.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
508-k netsvcsC:\Windows\system32\svchost.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
868"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.6.2122202073\9987182" -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3000 -prefsLen 245 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 3016 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
880"C:\Program Files\Mozilla Firefox\firefox.exe" "https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip?raw=true"C:\Program Files\Mozilla Firefox\firefox.exeExplorer.EXE
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
1632"C:\Users\admin\Desktop\cryptowall.bin.exe" C:\Users\admin\Desktop\cryptowall.bin.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cryptowall.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
2404"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.0.499002023\258823247" -parentBuildID 20201112153044 -prefsHandle 1144 -prefMapHandle 1136 -prefsLen 1 -prefMapSize 238726 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 1216 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
1
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
2808"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.20.1615068559\870576500" -childID 3 -isForBrowser -prefsHandle 3480 -prefMapHandle 3472 -prefsLen 7399 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 3512 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
2896"C:\Users\admin\Desktop\cryptowall.bin.exe" C:\Users\admin\Desktop\cryptowall.bin.execryptowall.bin.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cryptowall.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
3036"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Ransomware.Cryptowall.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
3132"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\universitystatement.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\gdi32.dll
3232"C:\Windows\explorer.exe"C:\Windows\explorer.exe
cryptowall.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
18 392
Read events
17 927
Write events
320
Delete events
145

Modification events

(PID) Process:(880) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
CABCBA075D010000
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
EDC4BA075D010000
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
4
Suspicious files
173
Text files
110
Unknown types
32

Dropped files

PID
Process
Filename
Type
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:994A33896BB41A278A315D0D796422B6
SHA256:54EC50A20FFF8CC016710E49437CF6A11D3FE5EE7B28C185E4A9AAFEE2908B63
3904firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_hYpRifUULnavPMGbinary
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftl.tmptext
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_ahQS2zA6bNtVyNqbinary
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftltext
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-walsqlite-wal
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
62
DNS requests
70
Threats
19

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
508
svchost.exe
GET
184.106.112.172:80
http://curlmyip.com/
US
malicious
3904
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3904
firefox.exe
POST
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
3904
firefox.exe
POST
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
3904
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
508
svchost.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1d4/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQDiOJGRlIYAiAoAAAABKkNX
US
der
472 b
whitelisted
508
svchost.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIAjrICMzZli2TN25s%3D
US
der
724 b
whitelisted
3904
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
278 b
whitelisted
508
svchost.exe
POST
94.247.31.19:8080
http://proxy1-1-1.i2p/3w4hxy7uoq0lv7
ES
malicious
508
svchost.exe
POST
94.247.31.19:8080
http://proxy2-2-2.i2p/3w4hxy7uoq0lv7
ES
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3904
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
3904
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3904
firefox.exe
142.250.74.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3904
firefox.exe
13.32.121.7:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
suspicious
3904
firefox.exe
185.199.108.133:443
raw.githubusercontent.com
GitHub, Inc.
NL
malicious
3904
firefox.exe
18.66.97.89:443
tracking-protection.cdn.mozilla.net
Massachusetts Institute of Technology
US
suspicious
3904
firefox.exe
13.32.121.96:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
suspicious
508
svchost.exe
34.117.59.81:443
myexternalip.com
US
whitelisted
508
svchost.exe
34.117.59.81:80
myexternalip.com
US
whitelisted
508
svchost.exe
188.165.164.184:80
ip-addr.es
OVH SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
github.com
  • 140.82.121.4
malicious
firefox.settings.services.mozilla.com
  • 13.32.121.7
  • 13.32.121.6
  • 13.32.121.96
  • 13.32.121.70
whitelisted
location.services.mozilla.com
  • 35.163.137.0
  • 35.163.35.154
  • 52.42.77.140
  • 52.26.7.9
  • 52.11.104.45
  • 52.89.115.53
whitelisted
locprod2-elb-us-west-2.prod.mozaws.net
  • 52.89.115.53
  • 52.11.104.45
  • 52.26.7.9
  • 52.42.77.140
  • 35.163.35.154
  • 35.163.137.0
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cs9.wac.phicdn.net
  • 93.184.220.29
whitelisted
safebrowsing.googleapis.com
  • 142.250.74.202
  • 2a00:1450:4001:811::200a
whitelisted
push.services.mozilla.com
  • 44.239.15.106
whitelisted

Threats

PID
Process
Class
Message
3904
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
3904
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
508
svchost.exe
A Network Trojan was detected
ET POLICY Possible IP Check ip-addr.es
508
svchost.exe
Potential Corporate Privacy Violation
ET POLICY External IP Check myexternalip.com
508
svchost.exe
Potential Corporate Privacy Violation
ET POLICY IP Check Domain (myexternalip .com in TLS SNI)
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall Check-in
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall CryptoWall 3.0 Check-in
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall Check-in
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall CryptoWall 3.0 Check-in
508
svchost.exe
A Network Trojan was detected
ET POLICY Possible IP Check ip-addr.es
2 ETPRO signatures available at the full report
No debug info