File name:

FileZilla Pro 3.69.1 (x86).exe

Full analysis: https://app.any.run/tasks/04416893-f712-4ad5-84b1-7bf9bf4fc485
Verdict: Malicious activity
Analysis date: April 29, 2025, 13:30:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
phishing
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

00D766FD0F7BCF3858AA2D7D3FD540B9

SHA1:

B9C0305E9F4147AE319F4F690DECEB5FE23579FD

SHA256:

7F401672FDE74E85AA1F32B9DD6A523144363250483AB02859F2FE3946C15663

SSDEEP:

196608:k29p9hWlVJWlbJnUZi+cEt5NfthAbcwvuJQEady2E:x9pjWlV4b56TcEtDtS5HE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • s.exe (PID: 8072)
    • Registers / Runs the DLL via REGSVR32.EXE

      • s.exe (PID: 8072)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5352)
      • powershell.exe (PID: 8036)
      • powershell.exe (PID: 4008)
      • powershell.exe (PID: 5740)
    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 6372)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 8036)
      • powershell.exe (PID: 4008)
      • powershell.exe (PID: 5740)
  • SUSPICIOUS

    • ADVANCEDINSTALLER mutex has been found

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
    • Process drops legitimate windows executable

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
    • Reads the Windows owner or organization settings

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • msiexec.exe (PID: 7668)
    • There is functionality for taking screenshot (YARA)

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • s.exe (PID: 8072)
    • Executable content was dropped or overwritten

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • s.exe (PID: 8072)
      • powershell.exe (PID: 5352)
      • VC_redist.x64.exe (PID: 7556)
      • dotNetFx46_Full_setup.exe (PID: 8160)
      • VC_redist.x86.exe (PID: 7872)
      • Value.exe (PID: 2416)
    • Detects AdvancedInstaller (YARA)

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
    • Creates a software uninstall entry

      • s.exe (PID: 8072)
    • Creates/Modifies COM task schedule object

      • s.exe (PID: 8072)
      • regsvr32.exe (PID: 6028)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • s.exe (PID: 8072)
    • The process creates files with name similar to system file names

      • s.exe (PID: 8072)
    • Reads security settings of Internet Explorer

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • VC_redist.x64.exe (PID: 7556)
    • The process hide an interactive prompt from the user

      • msiexec.exe (PID: 6372)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 6372)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 6372)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 6372)
    • Starts CMD.EXE for commands execution

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • cmd.exe (PID: 660)
      • cmd.exe (PID: 7708)
    • Executing commands from a ".bat" file

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • cmd.exe (PID: 660)
      • cmd.exe (PID: 7708)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 660)
    • Application launched itself

      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 660)
    • The process executes via Task Scheduler

      • powershell.exe (PID: 8036)
      • powershell.exe (PID: 4008)
      • Value.exe (PID: 2416)
      • powershell.exe (PID: 5740)
  • INFO

    • The sample compiled with english language support

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • s.exe (PID: 8072)
      • msiexec.exe (PID: 7668)
    • Checks supported languages

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • msiexec.exe (PID: 7668)
      • s.exe (PID: 8072)
      • msiexec.exe (PID: 920)
      • msiexec.exe (PID: 864)
      • msiexec.exe (PID: 6372)
      • info.exe (PID: 7792)
      • VC_redist.x64.exe (PID: 7556)
      • VC_redist.x86.exe (PID: 7872)
      • dotNetFx46_Full_setup.exe (PID: 8160)
    • Reads the computer name

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • msiexec.exe (PID: 7668)
      • s.exe (PID: 8072)
      • msiexec.exe (PID: 864)
      • msiexec.exe (PID: 920)
      • msiexec.exe (PID: 6372)
      • info.exe (PID: 7792)
      • VC_redist.x64.exe (PID: 7556)
      • dotNetFx46_Full_setup.exe (PID: 8160)
      • VC_redist.x86.exe (PID: 7872)
    • Reads Environment values

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • msiexec.exe (PID: 920)
      • msiexec.exe (PID: 6372)
    • Create files in a temporary directory

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • s.exe (PID: 8072)
      • powershell.exe (PID: 5352)
      • VC_redist.x64.exe (PID: 7556)
    • Process checks computer location settings

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7600)
      • VC_redist.x64.exe (PID: 7556)
    • Creates files in the program directory

      • s.exe (PID: 8072)
    • Disables trace logs

      • powershell.exe (PID: 5352)
    • Reads the software policy settings

      • powershell.exe (PID: 5352)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7668)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 5352)
    • Reads the machine GUID from the registry

      • VC_redist.x86.exe (PID: 7872)
      • dotNetFx46_Full_setup.exe (PID: 8160)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 8036)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 8036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:03 13:51:40+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.43
CodeSize: 2920960
InitializedDataSize: 1194496
UninitializedDataSize: -
EntryPoint: 0x2351b0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: GetintoWAY
FileDescription: FileZilla Pro 3.69.1 (x86) Installer
FileVersion: 0.0.0.0
InternalName: FileZilla Pro 3.69.1 (x86)
LegalCopyright: Copyright (C) 2025 GetintoWAY
OriginalFileName: FileZilla Pro 3.69.1 (x86).exe
ProductName: FileZilla Pro 3.69.1 (x86)
ProductVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
171
Monitored processes
38
Malicious processes
3
Suspicious processes
8

Behavior graph

Click at the process to see the details
start filezilla pro 3.69.1 (x86).exe msiexec.exe msiexec.exe no specs s.exe regsvr32.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs powershell.exe conhost.exe no specs slui.exe no specs vc_redist.x64.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs info.exe conhost.exe no specs #PHISHING svchost.exe vc_redist.x86.exe powershell.exe no specs conhost.exe no specs dotnetfx46_full_setup.exe powershell.exe no specs conhost.exe no specs value.exe powershell.exe no specs conhost.exe no specs filezilla pro 3.69.1 (x86).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
660C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\EXEDC4C.bat" "C:\Windows\SysWOW64\cmd.exeFileZilla Pro 3.69.1 (x86).exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
736C:\WINDOWS\System32\attrib.exe -r "C:\Users\admin\AppData\Local\Temp\EXEDC4C.bat" C:\Windows\SysWOW64\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
864C:\Windows\syswow64\MsiExec.exe -Embedding A3D8BED76860918B9D4B7C73D0EEFCF4 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
920C:\Windows\syswow64\MsiExec.exe -Embedding 810CEEC4CCABA9D71D55DB8AC965F23DC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1188"C:\WINDOWS\system32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\FileZilla Pro.msi" AI_SETUPEXEPATH="C:\Users\admin\AppData\Local\Temp\FileZilla Pro 3.69.1 (x86).exe" SETUPEXEDIR=C:\Users\admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1745932317 " ALLUSERS="1" AI_EUIMSI="" AI_MISSING_PREREQS="FileZilla Pro"C:\Windows\SysWOW64\msiexec.exeFileZilla Pro 3.69.1 (x86).exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2416"C:\Users\admin\AppData\Roaming\SafeWaitHandle\Value.exe"C:\Users\admin\AppData\Roaming\SafeWaitHandle\Value.exe
svchost.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\safewaithandle\value.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2420C:\WINDOWS\System32\attrib.exe -r "\\?\C:\Users\admin\AppData\Local\Temp\FILEZI~1.MSI" C:\Windows\SysWOW64\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
24 565
Read events
24 479
Write events
76
Delete events
10

Modification events

(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Version
Value:
3.69.1
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Package
Value:
1
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Updated
Value:
0
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:UninstallString
Value:
"C:\Program Files (x86)\FileZilla Pro\uninstall.exe"
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\FileZilla Pro
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayName
Value:
FileZilla Pro 3.69.1
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\FileZilla Pro\FileZilla.exe
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayVersion
Value:
3.69.1
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLInfoAbout
Value:
https://filezilla-project.org/
(PID) Process:(8072) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLUpdateInfo
Value:
https://filezilla-project.org/
Executable files
58
Suspicious files
142
Text files
728
Unknown types
0

Dropped files

PID
Process
Filename
Type
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\FileZilla Pro.msi
MD5:
SHA256:
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSIF213.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSIF3CA.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\shiF109.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\holder0.aiphbinary
MD5:0A0B3892D3BE447FE6F8C135918294DE
SHA256:DA15FBC5965F11F8D75A513BA05AB0B9CBB49E4A24F66BA965A8029B9C61C114
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7600\Newimage
MD5:1E80DE80CEFEE55D7CFDA0DF2EDCF3B2
SHA256:4E64F4E40D8CBFF082B37186C831AF4B49E3131C62C00A0CF53E0A6E7E24AC2B
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7600\completiimage
MD5:C23AF89757665BC0386FD798A61B2112
SHA256:031ED0378F819926D7B5B2C6C9367A0FB1CBAE40E1A3959E2652FE30A47D52F2
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7600\insticonimage
MD5:EAC3781BA9FB0502D6F16253EB67B2B4
SHA256:F864E8640C98B65C6C1B9B66A850661E8397ED6E66B06F4424396275488AF1BE
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSIF5DE.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7600FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7600\Upimage
MD5:FD64F54DB4CBF736A6FC0D7049F5991E
SHA256:C269353D19D50E2688DB102FEF8226CA492DB17133043D7EB5420EE8542D571C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
18
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.19.198.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7792
info.exe
GET
200
82.115.223.212:80
http://stats-1.crabdance.com/api/record?t=a10
unknown
malicious
1280
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1280
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.19.198.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1280
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.19.198.194
  • 23.32.238.34
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.72
  • 20.190.160.132
  • 20.190.160.65
  • 20.190.160.5
  • 40.126.32.140
  • 40.126.32.138
  • 40.126.32.76
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
lofhr.com
  • 185.208.156.66
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.crabdance .com Domain
2196
svchost.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain ( .crabdance .com)
7792
info.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
7792
info.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
7792
info.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.crabdance .com Domain
7792
info.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
No debug info