File name:

parsec-windows.exe

Full analysis: https://app.any.run/tasks/a3780929-a92c-4190-b85b-2e77ecf4729c
Verdict: Malicious activity
Analysis date: April 04, 2025, 02:44:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

0B9F6C9D89E9B427A469F34988B48F2C

SHA1:

DC29246551FB3BAAF77DCB3B926A2BF7E6FC567A

SHA256:

206CD186AAA431D3975EB30F682B83851EF4F81125D2004F53B681117DA23EC6

SSDEEP:

98304:i8QkWrhYycq4DJLyPsYLhOtx+WVCj5VWMkV17LrQQSrLhdtjB2MzxuPhzAPHwZLM:23UUScD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • parsec-windows.exe (PID: 812)
      • parsec-windows.exe (PID: 6004)
      • pservice.exe (PID: 2096)
      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7404)
      • parsecd.exe (PID: 7528)
    • Changes the autorun value in the registry

      • nefconw.exe (PID: 3008)
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • parsec-windows.exe (PID: 6004)
    • The process creates files with name similar to system file names

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
    • The process executes VB scripts

      • parsec-windows.exe (PID: 6004)
    • Uses TASKKILL.EXE to kill process

      • wscript.exe (PID: 4024)
    • Windows service management via SC.EXE

      • sc.exe (PID: 5344)
      • sc.exe (PID: 5956)
      • sc.exe (PID: 6512)
    • Stops a currently running service

      • sc.exe (PID: 2516)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 5244)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2316)
      • wscript.exe (PID: 4024)
      • wscript.exe (PID: 6656)
      • wscript.exe (PID: 5436)
      • wscript.exe (PID: 4448)
      • wscript.exe (PID: 5156)
    • Creates a software uninstall entry

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
    • Creates a new Windows service

      • sc.exe (PID: 4652)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 5156)
      • wscript.exe (PID: 5436)
      • wscript.exe (PID: 4448)
    • Executable content was dropped or overwritten

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • nefconw.exe (PID: 6324)
      • drvinst.exe (PID: 1388)
      • nefconw.exe (PID: 3008)
      • drvinst.exe (PID: 4608)
      • parsec-vdd.exe (PID: 1388)
      • drvinst.exe (PID: 840)
      • nefconw.exe (PID: 1328)
      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7404)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • wscript.exe (PID: 5436)
    • Executes as Windows Service

      • pservice.exe (PID: 2096)
      • WUDFHost.exe (PID: 2516)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • wscript.exe (PID: 4448)
    • Starts CMD.EXE for commands execution

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
    • Executing commands from a ".bat" file

      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
    • Creates files in the driver directory

      • drvinst.exe (PID: 1388)
      • drvinst.exe (PID: 4608)
      • drvinst.exe (PID: 840)
    • Drops a system driver (possible attempt to evade defenses)

      • nefconw.exe (PID: 6324)
      • drvinst.exe (PID: 1388)
      • parsec-vud.exe (PID: 4756)
      • nefconw.exe (PID: 3008)
      • drvinst.exe (PID: 4608)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 3100)
      • drvinst.exe (PID: 968)
      • drvinst.exe (PID: 6268)
      • drvinst.exe (PID: 7148)
    • Uses WEVTUTIL.EXE to remove publishers and event logs from the manifest

      • parsec-vdd.exe (PID: 1388)
      • wevtutil.exe (PID: 5156)
    • Uses WEVTUTIL.EXE to install publishers and event logs from the manifest

      • parsec-vdd.exe (PID: 1388)
      • wevtutil.exe (PID: 7236)
    • Reads security settings of Internet Explorer

      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7528)
    • Application launched itself

      • parsecd.exe (PID: 7404)
  • INFO

    • The sample compiled with english language support

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
      • drvinst.exe (PID: 840)
      • nefconw.exe (PID: 1328)
      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7404)
    • Creates files in the program directory

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • parsec-vdd.exe (PID: 1388)
      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7404)
      • parsecd.exe (PID: 7528)
    • Reads the computer name

      • parsec-windows.exe (PID: 6004)
      • pservice.exe (PID: 2096)
      • nefconw.exe (PID: 6324)
      • nefconw.exe (PID: 2040)
      • drvinst.exe (PID: 1388)
      • nefconw.exe (PID: 3008)
      • drvinst.exe (PID: 4608)
      • drvinst.exe (PID: 968)
      • drvinst.exe (PID: 3100)
      • drvinst.exe (PID: 6268)
      • nefconw.exe (PID: 5436)
      • nefconw.exe (PID: 1568)
      • drvinst.exe (PID: 7148)
      • drvinst.exe (PID: 840)
      • nefconw.exe (PID: 1328)
      • parsecd.exe (PID: 7404)
      • parsecd.exe (PID: 7528)
      • parsecd.exe (PID: 7336)
    • Create files in a temporary directory

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • nefconw.exe (PID: 6324)
      • nefconw.exe (PID: 3008)
      • parsec-vdd.exe (PID: 1388)
      • nefconw.exe (PID: 1328)
    • Checks supported languages

      • parsec-windows.exe (PID: 6004)
      • parsec-vud.exe (PID: 4756)
      • nefconc.exe (PID: 1616)
      • pservice.exe (PID: 2096)
      • nefconw.exe (PID: 2040)
      • nefconw.exe (PID: 6324)
      • drvinst.exe (PID: 1388)
      • drvinst.exe (PID: 3100)
      • nefconw.exe (PID: 3008)
      • drvinst.exe (PID: 4608)
      • drvinst.exe (PID: 968)
      • parsec-vdd.exe (PID: 1388)
      • nefconw.exe (PID: 5436)
      • drvinst.exe (PID: 6268)
      • drvinst.exe (PID: 7148)
      • nefconw.exe (PID: 1568)
      • drvinst.exe (PID: 840)
      • nefconw.exe (PID: 1328)
      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7404)
      • parsecd.exe (PID: 7528)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 1388)
      • drvinst.exe (PID: 4608)
      • drvinst.exe (PID: 840)
      • parsecd.exe (PID: 7336)
      • pservice.exe (PID: 2096)
      • parsecd.exe (PID: 7528)
      • parsecd.exe (PID: 7404)
    • Reads the software policy settings

      • drvinst.exe (PID: 1388)
      • drvinst.exe (PID: 4608)
      • drvinst.exe (PID: 840)
      • pservice.exe (PID: 2096)
      • parsecd.exe (PID: 7336)
      • parsecd.exe (PID: 7404)
      • parsecd.exe (PID: 7528)
    • Reads the time zone

      • runonce.exe (PID: 5156)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 5156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:30 16:55:23+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 184832
UninitializedDataSize: 2048
EntryPoint: 0x3552
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 150.97.4.0
ProductVersionNumber: 150.97.4.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Parsec
FileVersion: 150.97.4.0
ProductName: Parsec
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
204
Monitored processes
71
Malicious processes
14
Suspicious processes
7

Behavior graph

Click at the process to see the details
start parsec-windows.exe sppextcomobj.exe no specs slui.exe no specs wscript.exe no specs sc.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wscript.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs wscript.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs wscript.exe no specs schtasks.exe no specs conhost.exe no specs wscript.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs pservice.exe no specs wscript.exe no specs netsh.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs parsec-vud.exe cmd.exe no specs conhost.exe no specs nefconc.exe no specs cmd.exe no specs conhost.exe no specs nefconw.exe no specs nefconw.exe drvinst.exe drvinst.exe no specs nefconw.exe drvinst.exe drvinst.exe no specs runonce.exe no specs grpconv.exe no specs drvinst.exe no specs cmd.exe no specs conhost.exe no specs parsec-vdd.exe wevtutil.exe no specs conhost.exe no specs wevtutil.exe no specs cmd.exe no specs conhost.exe no specs nefconw.exe no specs nefconw.exe no specs nefconw.exe drvinst.exe drvinst.exe no specs wudfhost.exe no specs wevtutil.exe no specs conhost.exe no specs wevtutil.exe no specs parsecd.exe parsecd.exe parsecd.exe parsec-windows.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
812"C:\Users\admin\Downloads\parsec-windows.exe" C:\Users\admin\Downloads\parsec-windows.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Parsec
Exit code:
3221226540
Version:
150.97.4.0
Modules
Images
c:\users\admin\downloads\parsec-windows.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
840DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{4710e3ba-e5c2-434e-85aa-492647effbd8}\mm.inf" "9" "484386e17" "0000000000000214" "WinSta0\Default" "0000000000000218" "208" "C:\Program Files\Parsec Virtual Display Driver\driver"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
928C:\WINDOWS\system32\cmd.exe /c ""C:\Program Files\Parsec Virtual Display Driver\vddinstall.bat""C:\Windows\SysWOW64\cmd.exeparsec-vdd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
968DrvInst.exe "8" "4" "C:\WINDOWS\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_37113b1521fc4458\parsecvirtualds.inf" "0" "43799a85b" "0000000000000210" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
1040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1096cmd /c "C:\Program Files\Parsec Virtual USB Adapter Driver\nefconc.exe" --find-hwid --hardware-id VUSBAC:\Windows\SysWOW64\cmd.exeparsec-vud.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1168
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1184\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1184\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
30 132
Read events
30 001
Write events
114
Delete events
17

Modification events

(PID) Process:(6004) parsec-windows.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Parsec.App.0
Value:
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:Comments
Value:
Parsec
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Parsec\parsecd.exe
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:DisplayName
Value:
Parsec
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:DisplayVersion
Value:
150-97d
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:EstimatedSize
Value:
8414
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:HelpLink
Value:
https://support.parsec.app
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:InstallLocation
Value:
C:\Program Files\Parsec
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:NoModify
Value:
1
(PID) Process:(6004) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:NoRepair
Value:
1
Executable files
40
Suspicious files
46
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
6004parsec-windows.exeC:\Users\admin\AppData\Local\Temp\nsgDE5D.tmp\nsDialogs.dllexecutable
MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
SHA256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
6004parsec-windows.exeC:\Program Files\Parsec\wscripts\firewall-remove.vbstext
MD5:5D4D70CDF36FCDAA292DA1DA9133320C
SHA256:75F1DECE4FDA689A907F6D74B513ADB0C1771C1B79EA71160179542C9C4AB2F0
6004parsec-windows.exeC:\Users\admin\AppData\Local\Temp\nsgDE5D.tmp\System.dllexecutable
MD5:192639861E3DC2DC5C08BB8F8C7260D5
SHA256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
6004parsec-windows.exeC:\Program Files\Parsec\wscripts\service-kill-parsec.vbstext
MD5:F7B0C63E7AEA5CBD96F7BF1021B28B73
SHA256:71F9CC28497B959377439F6611615EF582745DD5B9CCA02B5C4B24BB1FC3DFB8
6004parsec-windows.exeC:\Program Files\Parsec\wscripts\service-install.vbstext
MD5:971E2A344A6E17347A81EEB21ADA7BA7
SHA256:01F62A12DE3307B375DFF3EBCD6961D76FFCBC24F70682C7875655A811CE76A1
6004parsec-windows.exeC:\Program Files\Parsec\teams.exeexecutable
MD5:FAA24223985ABFBF64E4DDCD43F062D3
SHA256:6DC71B2E92B770DCFECA4A32C8F1787210311F731F1124754DF193EC22D5D13E
6004parsec-windows.exeC:\Program Files\Parsec\wscripts\service-remove.vbstext
MD5:B90E75DD7903CB2D6328BB3714865C7A
SHA256:970B3C2A9EA1906A177810990478932E3517F47ABA267CF2AB9E4BA65E7B475F
6004parsec-windows.exeC:\Program Files\Parsec\vusb\parsec-vud.exeexecutable
MD5:FA2814C8CFF38B2F4737085C70154B8F
SHA256:F8DB024B61C36E5D45CA5B485BF855DBFE1D0523333158E873D7DEB4D86EC0E4
6004parsec-windows.exeC:\Program Files\Parsec\vdd\parsec-vdd.exeexecutable
MD5:4B9A3048286692A865187013B70F44E8
SHA256:E23332448FDAF5AA017CB308DB5EF6855FAC526A7DED05D80C039404126D5362
6004parsec-windows.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Parsec\Parsec.lnkbinary
MD5:4BA140526AEB2030DD57A7C6A3432EDE
SHA256:D173AD03C4047E223BB7F7B2423F6F9429CF62DFD66343D925915ECE107D5566
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6048
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6048
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7404
parsecd.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
7404
parsecd.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAloEugzUPGt9OnVZ%2FPPgls%3D
unknown
whitelisted
7404
parsecd.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2800
svchost.exe
95.100.186.9:443
go.microsoft.com
AKAMAI-AS
FR
whitelisted
6048
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 20.197.71.89
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.128
  • 20.190.159.4
  • 40.126.31.67
  • 40.126.31.73
  • 20.190.159.23
  • 20.190.159.131
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 184.30.131.245
whitelisted
go.microsoft.com
  • 95.100.186.9
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info