File name:

Zylo Free Tweaking Utility.exe

Full analysis: https://app.any.run/tasks/ecf99fab-47f4-4811-a4f1-1604cc2aa5b4
Verdict: Malicious activity
Analysis date: January 11, 2025, 00:38:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 6 sections
MD5:

FD1111AED654E1EAA4369F56F25C7517

SHA1:

0C5CB66FF35E440EC41CB8E183F9EC812224CF90

SHA256:

94F33218382AE9C3DD1F5B8183144476A2EA31978423A25FAD1CC56AEE48EA97

SSDEEP:

98304:ebVmxGSRrjoEtzgqne8IwXQeDmzxpbzoA+wx/l6PLXlVBg4AlaSuCXOYxkPvXC5j:eVmiAp5w0Tdp3wN0+2BfGkJ6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • Zylo Free Tweaking Utility.exe (PID: 6624)
    • Executes application which crashes

      • Zylo Free Tweaking Utility.exe (PID: 6624)
    • Read disk information to detect sandboxing environments

      • Zylo Free Tweaking Utility.exe (PID: 6624)
    • The process checks if it is being run in the virtual environment

      • Zylo Free Tweaking Utility.exe (PID: 6624)
  • INFO

    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6908)
    • Reads the computer name

      • Zylo Free Tweaking Utility.exe (PID: 6624)
    • Reads the machine GUID from the registry

      • Zylo Free Tweaking Utility.exe (PID: 6624)
    • Checks supported languages

      • Zylo Free Tweaking Utility.exe (PID: 6624)
    • Checks proxy server information

      • WerFault.exe (PID: 6908)
    • Reads the software policy settings

      • WerFault.exe (PID: 6908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (64.5)
.dll | Win32 Dynamic Link Library (generic) (13.6)
.exe | Win32 Executable (generic) (9.3)
.exe | Win16/32 Executable Delphi generic (4.2)
.exe | Generic Win/DOS Executable (4.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2077:06:05 08:47:59+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 13882880
InitializedDataSize: 44544
UninitializedDataSize: -
EntryPoint: 0xd3f5ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start zylo free tweaking utility.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
6624"C:\Users\admin\AppData\Local\Temp\Zylo Free Tweaking Utility.exe" C:\Users\admin\AppData\Local\Temp\Zylo Free Tweaking Utility.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Zylo Free
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\zylo free tweaking utility.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6908C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6624 -s 79644C:\Windows\SysWOW64\WerFault.exe
Zylo Free Tweaking Utility.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 246
Read events
3 246
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6908WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Zylo Free Tweaki_2764a48cad72f660cee8e3ad715cbede5ef4c75c_dd0e8566_8b585ad4-0559-4168-93c6-1241678088c3\Report.wer
MD5:
SHA256:
6908WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Zylo Free Tweaking Utility.exe.6624.dmp
MD5:
SHA256:
6908WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6908WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6908WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6AE2.tmp.dmpbinary
MD5:6D0382B68CBD6B5FEA1BABE92BCB43CC
SHA256:D36F3C0DDD1A0065ABE26135D28E91C5404F52E99C5975F45E3ABF399943582E
6908WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6D84.tmp.xmlxml
MD5:1F0D4955736D936D06914326384E6238
SHA256:92990D1CE7DDFD9E904D8369EDB348A066E010D3685ECF5236230EF31DFFB477
6908WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6D54.tmp.WERInternalMetadata.xmlxml
MD5:37F27234B75549D129E671D17C4C1361
SHA256:CB41E3FA868DF56218D62FE677019CF70C23D3793A1D3B7C66A203036524B59B
6908WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:046B5690E11C825C0C7B2A4110A6FBBD
SHA256:9F16B7B0141ACD8BDCF0CCB02AA86F618E7793F6799424A0C2237638812EDD70
6908WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:4F88D3C8617FE604042DE6E7CD06DB18
SHA256:8449B2F80D2847F4162D973BA0B1FD8E2D8A597A992CD17069888B66F746569B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
35
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7048
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7048
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6908
WerFault.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6908
WerFault.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
google.com
  • 172.217.16.142
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.23
  • 40.126.31.71
  • 20.190.159.64
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.75
  • 20.190.159.71
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.21
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info