File name:

FileZilla Pro 3.69.1 (x64).exe

Full analysis: https://app.any.run/tasks/aa77e2b9-c602-4f1b-b891-f0c04f6537f6
Verdict: Malicious activity
Analysis date: April 29, 2025, 13:13:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
phishing
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

7972F32CC11047ED8F5F6900C76FE69F

SHA1:

5B5E997D9CB7EC821E3AC0CE7088CB32EDC8A070

SHA256:

B463AC9A5E008DF75E1692944D7459BFE5DF7C004806BE2BE9352383BD7BF477

SSDEEP:

196608:k2V2W+XgWAa278eqGkEGZ+Rnwlw8cutiKeMctpmK/Vcc:xVaM/8eqGkEoGn5F0ivvmIVcc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • s.exe (PID: 7692)
    • Registers / Runs the DLL via REGSVR32.EXE

      • s.exe (PID: 7692)
    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 4996)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1196)
      • powershell.exe (PID: 2908)
      • powershell.exe (PID: 2392)
      • powershell.exe (PID: 6388)
      • powershell.exe (PID: 7292)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2908)
      • powershell.exe (PID: 7292)
      • powershell.exe (PID: 2392)
      • powershell.exe (PID: 6388)
  • SUSPICIOUS

    • ADVANCEDINSTALLER mutex has been found

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • s.exe (PID: 7692)
    • Process drops legitimate windows executable

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
    • Executable content was dropped or overwritten

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • s.exe (PID: 7692)
      • powershell.exe (PID: 1196)
      • VC_redist.x64.exe (PID: 7792)
      • dotNetFx46_Full_setup.exe (PID: 5600)
      • Value.exe (PID: 7696)
      • VC_redist.x86.exe (PID: 8036)
    • Reads the Windows owner or organization settings

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • msiexec.exe (PID: 7464)
    • Reads security settings of Internet Explorer

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • VC_redist.x64.exe (PID: 7792)
    • The process creates files with name similar to system file names

      • s.exe (PID: 7692)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 6872)
    • Creates a software uninstall entry

      • s.exe (PID: 7692)
    • Detects AdvancedInstaller (YARA)

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
    • There is functionality for taking screenshot (YARA)

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • s.exe (PID: 7692)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 4996)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 4996)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 4996)
    • The process hide an interactive prompt from the user

      • msiexec.exe (PID: 4996)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 5360)
      • cmd.exe (PID: 5756)
      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 5360)
      • cmd.exe (PID: 5756)
      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
    • Application launched itself

      • cmd.exe (PID: 5756)
      • cmd.exe (PID: 5360)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 5360)
      • cmd.exe (PID: 5756)
    • The process executes via Task Scheduler

      • powershell.exe (PID: 2908)
      • powershell.exe (PID: 7292)
      • powershell.exe (PID: 2392)
      • CanReuseTransform.exe (PID: 5624)
      • Value.exe (PID: 7696)
      • Value.exe (PID: 864)
      • powershell.exe (PID: 6388)
    • Connects to unusual port

      • AddInUtil.exe (PID: 3156)
  • INFO

    • The sample compiled with english language support

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • msiexec.exe (PID: 7464)
      • s.exe (PID: 7692)
    • Checks supported languages

      • msiexec.exe (PID: 7464)
      • msiexec.exe (PID: 7548)
      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • s.exe (PID: 7692)
      • msiexec.exe (PID: 6644)
      • msiexec.exe (PID: 3180)
      • msiexec.exe (PID: 4996)
      • VC_redist.x64.exe (PID: 7792)
      • info.exe (PID: 7852)
      • VC_redist.x86.exe (PID: 8036)
    • Reads the computer name

      • msiexec.exe (PID: 7464)
      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • msiexec.exe (PID: 7548)
      • s.exe (PID: 7692)
      • msiexec.exe (PID: 3180)
      • msiexec.exe (PID: 4996)
      • msiexec.exe (PID: 6644)
      • VC_redist.x64.exe (PID: 7792)
      • info.exe (PID: 7852)
      • VC_redist.x86.exe (PID: 8036)
    • Reads Environment values

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • msiexec.exe (PID: 7548)
      • msiexec.exe (PID: 3180)
      • msiexec.exe (PID: 4996)
    • Create files in a temporary directory

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • s.exe (PID: 7692)
      • powershell.exe (PID: 1196)
      • VC_redist.x64.exe (PID: 7792)
    • Process checks computer location settings

      • FileZilla Pro 3.69.1 (x64).exe (PID: 7384)
      • VC_redist.x64.exe (PID: 7792)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7464)
    • Creates files in the program directory

      • s.exe (PID: 7692)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 1196)
    • Disables trace logs

      • powershell.exe (PID: 1196)
    • Reads the software policy settings

      • powershell.exe (PID: 1196)
    • Reads the machine GUID from the registry

      • VC_redist.x86.exe (PID: 8036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:03 13:51:40+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.43
CodeSize: 2920960
InitializedDataSize: 1194496
UninitializedDataSize: -
EntryPoint: 0x2351b0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: GetintoWAY
FileDescription: FileZilla Pro 3.69.1 (x64) Installer
FileVersion: 0.0.0.0
InternalName: FileZilla Pro 3.69.1 (x64)
LegalCopyright: Copyright (C) 2025 GetintoWAY
OriginalFileName: FileZilla Pro 3.69.1 (x64).exe
ProductName: FileZilla Pro 3.69.1 (x64)
ProductVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
180
Monitored processes
43
Malicious processes
3
Suspicious processes
9

Behavior graph

Click at the process to see the details
start filezilla pro 3.69.1 (x64).exe msiexec.exe msiexec.exe no specs s.exe regsvr32.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs powershell.exe conhost.exe no specs vc_redist.x64.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs attrib.exe no specs info.exe attrib.exe no specs attrib.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs #PHISHING svchost.exe vc_redist.x86.exe slui.exe powershell.exe no specs conhost.exe no specs dotnetfx46_full_setup.exe powershell.exe no specs conhost.exe no specs value.exe powershell.exe no specs conhost.exe no specs value.exe no specs canreusetransform.exe no specs addinutil.exe powershell.exe no specs conhost.exe no specs filezilla pro 3.69.1 (x64).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
864"C:\WINDOWS\system32\config\systemprofile\AppData\Roaming\SafeWaitHandle\Value.exe"C:\Windows\System32\config\systemprofile\AppData\Roaming\SafeWaitHandle\Value.exesvchost.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\config\systemprofile\appdata\roaming\safewaithandle\value.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1196 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\WINDOWS\SystemTemp\pss5CA7.ps1" -propFile "C:\WINDOWS\SystemTemp\msi5CA4.txt" -scriptFile "C:\WINDOWS\SystemTemp\scr5CA5.ps1" -scriptArgsFile "C:\WINDOWS\SystemTemp\scr5CA6.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1672C:\WINDOWS\system32\cmd.exe /S /D /c" del "C:\Users\admin\AppData\Local\Temp\EXE931D.bat" "C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2332\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2392"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2908"powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc YQBkAGQALQBtAHAAUABSAGUAZgBFAFIAZQBuAEMAZQAgAC0ARQBYAGMAbABVAHMASQBvAG4AUABBAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAUwBhAGYAZQBXAGEAaQB0AEgAYQBuAGQAbABlAFwAVgBhAGwAdQBlAC4AZQB4AGUALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXAAsAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABNAGkAYwByAG8AcwBvAGYAdAAuAE4ARQBUAFwARgByAGEAbQBlAHcAbwByAGsANgA0AFwAdgA0AC4AMAAuADMAMAAzADEAOQBcAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUALABDADoAXABVAHMAZQByAHMAXABhAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcACAALQBGAE8AcgBjAEUAOwAgAEEAZABkAC0ATQBwAFAAUgBlAGYAZQByAGUATgBjAGUAIAAtAGUAeABDAEwAVQBTAEkATwBOAHAAUgBvAGMAZQBzAFMAIABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVQBzAGUAcgBzAFwAYQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABTAGEAZgBlAFcAYQBpAHQASABhAG4AZABsAGUAXABWAGEAbAB1AGUALgBlAHgAZQAgAC0AZgBPAHIAQwBFAA==C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3156C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
Value.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
AddInUtil.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\addinutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3180C:\Windows\syswow64\MsiExec.exe -Embedding 181595203A451D5743A4DDE407F090A3C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3192\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
31 165
Read events
31 074
Write events
82
Delete events
9

Modification events

(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Version
Value:
3.69.1
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Package
Value:
1
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FileZilla Pro
Operation:writeName:Updated
Value:
0
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:UninstallString
Value:
"C:\Program Files\FileZilla Pro\uninstall.exe"
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:InstallLocation
Value:
C:\Program Files\FileZilla Pro
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayName
Value:
FileZilla Pro 3.69.1
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayIcon
Value:
C:\Program Files\FileZilla Pro\FileZilla.exe
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:DisplayVersion
Value:
3.69.1
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLInfoAbout
Value:
https://filezilla-project.org/
(PID) Process:(7692) s.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FileZilla Pro
Operation:writeName:URLUpdateInfo
Value:
https://filezilla-project.org/
Executable files
57
Suspicious files
142
Text files
732
Unknown types
0

Dropped files

PID
Process
Filename
Type
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\FileZilla Pro.msi
MD5:
SHA256:
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\MSID40C.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\holder0.aiphbinary
MD5:FC0DB51038F1DC36C0AA688A7D16464D
SHA256:3EC1DE3EDE0E1EC34BB34FFA96FBE4A4F952C5AE212C1873F809C07878CD92A0
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\shiD3AD.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\MSID566.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7384\completiimage
MD5:C23AF89757665BC0386FD798A61B2112
SHA256:031ED0378F819926D7B5B2C6C9367A0FB1CBAE40E1A3959E2652FE30A47D52F2
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7384\dialog.jpgimage
MD5:5F6253CFF5A8B031BFB3B161079D0D86
SHA256:36D9BAB35D1E4B50045BF902F5D42B6F865488C75F6E60FC00A6CD6F69034AB0
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\MSID596.tmpexecutable
MD5:C9EF0378879C57A38C075BB28B88FCAB
SHA256:6E7CDAB18E1F705C0EA56A565577DB0389ECE2B5A4E0F31D3063E9103F59FBEE
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\MSID4A9.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
7384FileZilla Pro 3.69.1 (x64).exeC:\Users\admin\AppData\Local\Temp\AI_EXTUI_BIN_7384\custiconimage
MD5:BE6D2F48AA6634FB2101C273C798D4D9
SHA256:0E22BC2BF7184DFDB55223A11439304A453FB3574E3C9034A6497AF405C628EF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
19
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7852
info.exe
GET
200
82.115.223.212:80
http://stats-1.crabdance.com/api/record?t=a10
unknown
malicious
7376
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7376
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
672
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
google.com
  • 142.250.185.206
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.2
  • 20.190.160.20
  • 20.190.160.5
  • 20.190.160.132
  • 40.126.32.68
  • 20.190.160.67
  • 40.126.32.133
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
lofhr.com
  • 185.208.156.66
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.crabdance .com Domain
2196
svchost.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain ( .crabdance .com)
7852
info.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
7852
info.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
7852
info.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.crabdance .com Domain
7852
info.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
3156
AddInUtil.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 56
No debug info