File name:

Zylo Free Tweaking Utility.exe

Full analysis: https://app.any.run/tasks/48bf6c23-d77b-4e63-bae3-7b76c6cc5eca
Verdict: Malicious activity
Analysis date: January 11, 2025, 00:40:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 6 sections
MD5:

FD1111AED654E1EAA4369F56F25C7517

SHA1:

0C5CB66FF35E440EC41CB8E183F9EC812224CF90

SHA256:

94F33218382AE9C3DD1F5B8183144476A2EA31978423A25FAD1CC56AEE48EA97

SSDEEP:

98304:ebVmxGSRrjoEtzgqne8IwXQeDmzxpbzoA+wx/l6PLXlVBg4AlaSuCXOYxkPvXC5j:eVmiAp5w0Tdp3wN0+2BfGkJ6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • Zylo Free Tweaking Utility.exe (PID: 6448)
    • Executes application which crashes

      • Zylo Free Tweaking Utility.exe (PID: 6448)
    • Read disk information to detect sandboxing environments

      • Zylo Free Tweaking Utility.exe (PID: 6448)
    • The process checks if it is being run in the virtual environment

      • Zylo Free Tweaking Utility.exe (PID: 6448)
  • INFO

    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6764)
    • Reads the computer name

      • Zylo Free Tweaking Utility.exe (PID: 6448)
    • Reads the machine GUID from the registry

      • Zylo Free Tweaking Utility.exe (PID: 6448)
    • Reads the software policy settings

      • WerFault.exe (PID: 6764)
    • Checks proxy server information

      • WerFault.exe (PID: 6764)
    • Checks supported languages

      • Zylo Free Tweaking Utility.exe (PID: 6448)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (64.5)
.dll | Win32 Dynamic Link Library (generic) (13.6)
.exe | Win32 Executable (generic) (9.3)
.exe | Win16/32 Executable Delphi generic (4.2)
.exe | Generic Win/DOS Executable (4.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2077:06:05 08:47:59+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 13882880
InitializedDataSize: 44544
UninitializedDataSize: -
EntryPoint: 0xd3f5ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
126
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start zylo free tweaking utility.exe werfault.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6448"C:\Users\admin\AppData\Local\Temp\Zylo Free Tweaking Utility.exe" C:\Users\admin\AppData\Local\Temp\Zylo Free Tweaking Utility.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Zylo Free
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\zylo free tweaking utility.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6764C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6448 -s 41640C:\Windows\SysWOW64\WerFault.exe
Zylo Free Tweaking Utility.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7116C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
3 283
Read events
3 283
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6764WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Zylo Free Tweaki_2764a48cad72f660cee8e3ad715cbede5ef4c75c_dd0e8566_d3b4cb51-2e93-4d4e-ac93-45b86794531e\Report.wer
MD5:
SHA256:
6764WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Zylo Free Tweaking Utility.exe.6448.dmp
MD5:
SHA256:
6764WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER79F6.tmp.dmpbinary
MD5:A2F54B30E47B0FAC9C3B7F0550C728F6
SHA256:7C838CBC02CCF466315FA1C6BCBCC5C6EE61A72D2D287C6CDD2999469DBD5410
6764WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7DFF.tmp.xmlxml
MD5:7108423B9B8A1780730795930AB02E9D
SHA256:B3AB6079756D39E2AEFC9C64ACF868B4563E3C606C8BAF59BC15D316C44B573D
6764WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7DC0.tmp.WERInternalMetadata.xmlxml
MD5:A94C06583CB1B58E16101FEF8B07CAF4
SHA256:4B59C0D33BB1993D16D28812D677BE0681B040DB1703214B1F5F9002D321D069
6764WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6764WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6764WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:3458B1DB346C5C338BB780DFECA181F8
SHA256:0F7CCEB8402AB2EC87AA29C01E82D7CAA14559EA468B4F5B4DBC2D16516B9E54
6764WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:EA248513B1A78DE50F464B86AEB30CAF
SHA256:3DA02691AD695FE3EE8B5660513ACE576ED7C54EB7E56B820F08A479C269333B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
35
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6764
WerFault.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6764
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1576
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1576
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6208
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.131:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
3220
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.145
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.76
  • 20.190.160.22
  • 40.126.32.134
  • 40.126.32.72
  • 40.126.32.74
  • 20.190.160.14
  • 40.126.32.140
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
watson.events.data.microsoft.com
  • 13.89.179.12
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info