analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip?raw=true

Full analysis: https://app.any.run/tasks/f92e8d6d-894f-424a-a98e-20ae2a1e5455
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: January 14, 2022, 21:11:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
trojan
ransomware
cryptowall
Indicators:
MD5:

1C2DF4ACD4C5C0715EF0252B698FD6B6

SHA1:

9873878ED48B2E0AD25889232E0EEB243BF468A2

SHA256:

E38FCFEBD4D0DC3922AF8069B71D3F87D3B259DD4FD59B0C9B5CA4714F4E5A2A

SSDEEP:

3:N8tEdsxHuJKqIEHDhzzu5c7K5E31z5c7K5FfDUj:2u6tuJKz+By5cOaFz5cO7DUj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • cryptowall.bin.exe (PID: 1632)
      • cryptowall.bin.exe (PID: 2896)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 3232)
    • Drops executable file immediately after starts

      • explorer.exe (PID: 3232)
    • Uses SVCHOST.EXE for hidden code execution

      • explorer.exe (PID: 3232)
    • Writes to a start menu file

      • explorer.exe (PID: 3232)
    • Starts BCDEDIT.EXE to disable recovery

      • explorer.exe (PID: 3232)
    • Deletes shadow copies

      • explorer.exe (PID: 3232)
    • CRYPTOWALL was detected

      • svchost.exe (PID: 508)
    • Connects to CnC server

      • svchost.exe (PID: 508)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 3036)
      • cryptowall.bin.exe (PID: 1632)
      • cryptowall.bin.exe (PID: 2896)
    • Reads the computer name

      • WinRAR.exe (PID: 3036)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3036)
      • explorer.exe (PID: 3232)
    • Creates files in the user directory

      • explorer.exe (PID: 3232)
    • Application launched itself

      • cryptowall.bin.exe (PID: 1632)
    • Checks for external IP

      • svchost.exe (PID: 508)
    • Starts Microsoft Office Application

      • WINWORD.EXE (PID: 3132)
  • INFO

    • Checks supported languages

      • firefox.exe (PID: 880)
      • firefox.exe (PID: 3904)
      • firefox.exe (PID: 2404)
      • firefox.exe (PID: 868)
      • firefox.exe (PID: 3872)
      • firefox.exe (PID: 3424)
      • firefox.exe (PID: 2808)
      • explorer.exe (PID: 3232)
      • vssadmin.exe (PID: 3644)
      • bcdedit.exe (PID: 3696)
      • bcdedit.exe (PID: 3536)
      • svchost.exe (PID: 508)
      • WINWORD.EXE (PID: 3132)
      • CLVIEW.EXE (PID: 3980)
    • Reads CPU info

      • firefox.exe (PID: 3904)
    • Reads the computer name

      • firefox.exe (PID: 3904)
      • firefox.exe (PID: 2404)
      • firefox.exe (PID: 868)
      • firefox.exe (PID: 3424)
      • firefox.exe (PID: 3872)
      • firefox.exe (PID: 2808)
      • svchost.exe (PID: 508)
      • explorer.exe (PID: 3232)
      • vssadmin.exe (PID: 3644)
      • WINWORD.EXE (PID: 3132)
      • CLVIEW.EXE (PID: 3980)
    • Application launched itself

      • firefox.exe (PID: 880)
      • firefox.exe (PID: 3904)
    • Creates files in the user directory

      • firefox.exe (PID: 3904)
      • WINWORD.EXE (PID: 3132)
    • Creates files in the program directory

      • firefox.exe (PID: 3904)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 3904)
      • svchost.exe (PID: 508)
    • Manual execution by user

      • WinRAR.exe (PID: 3036)
      • cryptowall.bin.exe (PID: 1632)
      • WINWORD.EXE (PID: 3132)
    • Reads the date of Windows installation

      • firefox.exe (PID: 3904)
    • Reads settings of System Certificates

      • svchost.exe (PID: 508)
    • Reads Microsoft Outlook installation path

      • CLVIEW.EXE (PID: 3980)
    • Reads internet explorer settings

      • CLVIEW.EXE (PID: 3980)
    • Reads Microsoft Office registry keys

      • CLVIEW.EXE (PID: 3980)
      • WINWORD.EXE (PID: 3132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
17
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe cryptowall.bin.exe no specs cryptowall.bin.exe no specs explorer.exe #CRYPTOWALL svchost.exe vssadmin.exe no specs bcdedit.exe no specs bcdedit.exe no specs winword.exe no specs clview.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
880"C:\Program Files\Mozilla Firefox\firefox.exe" "https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip?raw=true"C:\Program Files\Mozilla Firefox\firefox.exeExplorer.EXE
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
3904"C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/ytisf/theZoo/blob/master/malware/Binaries/Ransomware.Cryptowall/Ransomware.Cryptowall.zip?raw=trueC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\version.dll
2404"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.0.499002023\258823247" -parentBuildID 20201112153044 -prefsHandle 1144 -prefMapHandle 1136 -prefsLen 1 -prefMapSize 238726 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 1216 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
1
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
868"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.6.2122202073\9987182" -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3000 -prefsLen 245 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 3016 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
3424"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.13.843543187\270927113" -childID 2 -isForBrowser -prefsHandle 2212 -prefMapHandle 2232 -prefsLen 6644 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 2168 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
2808"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.20.1615068559\870576500" -childID 3 -isForBrowser -prefsHandle 3480 -prefMapHandle 3472 -prefsLen 7399 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 3512 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
3872"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3904.27.604004350\685509159" -childID 4 -isForBrowser -prefsHandle 3780 -prefMapHandle 1692 -prefsLen 7638 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3904 "\\.\pipe\gecko-crash-server-pipe.3904" 3792 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
3036"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Ransomware.Cryptowall.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
1632"C:\Users\admin\Desktop\cryptowall.bin.exe" C:\Users\admin\Desktop\cryptowall.bin.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cryptowall.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
2896"C:\Users\admin\Desktop\cryptowall.bin.exe" C:\Users\admin\Desktop\cryptowall.bin.execryptowall.bin.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cryptowall.bin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
Total events
18 392
Read events
17 927
Write events
320
Delete events
145

Modification events

(PID) Process:(880) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
CABCBA075D010000
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
EDC4BA075D010000
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3904) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
4
Suspicious files
173
Text files
110
Unknown types
32

Dropped files

PID
Process
Filename
Type
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:617E94164ABA9B4BBA5626338358197D
SHA256:1D57170AE5D05D711C14C0AFAD022B5F044D4348EBFF778F7FC975EF5231E24D
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:617E94164ABA9B4BBA5626338358197D
SHA256:1D57170AE5D05D711C14C0AFAD022B5F044D4348EBFF778F7FC975EF5231E24D
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:98BB2A9D15359389D682CF8367064407
SHA256:8BAF1B57A1AC6A06E97B4F9519F535E1CB4FD475E8DEA68643770C6F80E7741F
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:994A33896BB41A278A315D0D796422B6
SHA256:54EC50A20FFF8CC016710E49437CF6A11D3FE5EE7B28C185E4A9AAFEE2908B63
3904firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_hYpRifUULnavPMGbinary
MD5:33EA878F52612BC48470BD6A19770B4D
SHA256:CB7FB6CA811DC7872F2FEDDFA43CAD4EB87BB7DC20E1CA98F53CCA0555BAE88E
3904firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftl.tmptext
MD5:3625F1DDA6D119478AD89D13950C9ACA
SHA256:CB40F6A8D58901D612A86690A41D4E273F24936FC926E98F82C0918CBEF4FC64
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3904firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
62
DNS requests
70
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3904
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
508
svchost.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIAjrICMzZli2TN25s%3D
US
der
724 b
whitelisted
3904
firefox.exe
POST
200
142.250.185.195:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
3904
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
508
svchost.exe
GET
302
34.117.59.81:80
http://myexternalip.com/raw
US
text
50 b
shared
3904
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
US
text
8 b
whitelisted
508
svchost.exe
POST
94.247.31.19:8080
http://proxy1-1-1.i2p/wtobdk0a3e1izo
ES
malicious
508
svchost.exe
GET
184.106.112.172:80
http://curlmyip.com/
US
malicious
508
svchost.exe
GET
200
142.250.185.195:80
http://ocsp.pki.goog/gts1d4/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQDiOJGRlIYAiAoAAAABKkNX
US
der
472 b
whitelisted
508
svchost.exe
POST
94.247.31.19:8080
http://proxy2-2-2.i2p/3w4hxy7uoq0lv7
ES
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3904
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
3904
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3904
firefox.exe
142.250.74.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3904
firefox.exe
140.82.121.4:443
github.com
US
malicious
3904
firefox.exe
13.32.121.7:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
suspicious
3904
firefox.exe
35.163.137.0:443
location.services.mozilla.com
Amazon.com, Inc.
US
unknown
3904
firefox.exe
44.239.15.106:443
push.services.mozilla.com
University of California, San Diego
US
unknown
3904
firefox.exe
185.199.108.133:443
raw.githubusercontent.com
GitHub, Inc.
NL
malicious
3904
firefox.exe
142.250.185.110:443
www.youtube.com
Google Inc.
US
whitelisted
3904
firefox.exe
13.32.121.113:443
content-signature-2.cdn.mozilla.net
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
github.com
  • 140.82.121.4
shared
firefox.settings.services.mozilla.com
  • 13.32.121.7
  • 13.32.121.6
  • 13.32.121.96
  • 13.32.121.70
whitelisted
location.services.mozilla.com
  • 35.163.137.0
  • 35.163.35.154
  • 52.42.77.140
  • 52.26.7.9
  • 52.11.104.45
  • 52.89.115.53
whitelisted
locprod2-elb-us-west-2.prod.mozaws.net
  • 52.89.115.53
  • 52.11.104.45
  • 52.26.7.9
  • 52.42.77.140
  • 35.163.35.154
  • 35.163.137.0
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cs9.wac.phicdn.net
  • 93.184.220.29
whitelisted
safebrowsing.googleapis.com
  • 142.250.74.202
  • 2a00:1450:4001:811::200a
whitelisted
push.services.mozilla.com
  • 44.239.15.106
whitelisted

Threats

PID
Process
Class
Message
3904
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
3904
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
508
svchost.exe
A Network Trojan was detected
ET POLICY Possible IP Check ip-addr.es
508
svchost.exe
Potential Corporate Privacy Violation
ET POLICY External IP Check myexternalip.com
508
svchost.exe
Potential Corporate Privacy Violation
ET POLICY IP Check Domain (myexternalip .com in TLS SNI)
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall Check-in
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall CryptoWall 3.0 Check-in
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall Check-in
508
svchost.exe
A Network Trojan was detected
ET TROJAN CryptoWall CryptoWall 3.0 Check-in
508
svchost.exe
A Network Trojan was detected
ET POLICY Possible IP Check ip-addr.es
2 ETPRO signatures available at the full report
No debug info