File name:

Documents-976709d2.exe

Full analysis: https://app.any.run/tasks/a49677a9-0e0c-4299-8c73-9972a3333491
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 09, 2026, 21:02:53
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
rat
anti-evasion
arch-scr
arch-exec
loader
websocket
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

C7BA7DCED9C33D57491B026E61D5773B

SHA1:

52FC1EBDF313D32E094BAC737B8B272EA371FA48

SHA256:

B83E62FA4084BFF95AE93E3BE1D7D1AB61786273394981647D6DCACACA19F9B2

SSDEEP:

196608:tet4U65AYTsq6P66XfO5ER/Qnm3RvzMjb0NABuKShRa:wt4U65AD2sfswRvzMUNABuphRa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • vcredist_x86.exe (PID: 3036)
      • ScriptRunner.Installer.exe (PID: 4476)
      • MSP_Connect.exe (PID: 2612)
    • Changes settings of System certificates

      • BASupSrvcCnfg.exe (PID: 7036)
      • winagent.exe (PID: 2740)
    • Changes the Windows auto-update feature

      • PME.Agent.exe (PID: 8012)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Documents-976709d2.exe (PID: 7564)
      • agent.tmp (PID: 7636)
      • vcredist_x86.exe (PID: 3036)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • TCLauncherHelper.exe (PID: 1600)
      • BASupSrvcCnfg.exe (PID: 8088)
      • RequestHandlerAgent.exe (PID: 5728)
      • FileCacheServiceAgent.exe (PID: 6084)
      • PME.Agent.exe (PID: 7992)
      • NetworkManagement.exe (PID: 7384)
      • NetworkManagement.exe (PID: 864)
    • Executable content was dropped or overwritten

      • Documents-976709d2.exe (PID: 7564)
      • agent.exe (PID: 7616)
      • agent.exe (PID: 7812)
      • agent.tmp (PID: 7836)
      • winagent.exe (PID: 8052)
      • vcredist_x86.exe (PID: 2232)
      • vcredist_x86.exe (PID: 3036)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 8168)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • ScriptRunner.Installer.exe (PID: 4476)
      • MSP_Connect.exe (PID: 2612)
      • winagent.exe (PID: 2740)
      • BASupSrvc.exe (PID: 5612)
      • PMESetup.exe (PID: 6684)
      • PMESetup.tmp (PID: 3236)
      • RequestHandlerAgentSetup.exe (PID: 5160)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • FileCacheServiceAgentSetup.exe (PID: 2336)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core-upgrade.exe (PID: 1840)
      • NetworkManagementInstall.exe (PID: 7460)
      • NetworkManagementInstall.tmp (PID: 7568)
    • Reads the Windows owner or organization settings

      • agent.tmp (PID: 7836)
      • msiexec.exe (PID: 8144)
      • PMESetup.tmp (PID: 3236)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • NetworkManagementInstall.tmp (PID: 7568)
    • Searches for installed software

      • winagent.exe (PID: 8052)
      • vcredist_x86.exe (PID: 2232)
      • vcredist_x86.exe (PID: 3036)
      • dllhost.exe (PID: 7204)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • ScriptRunner.Installer.exe (PID: 4476)
      • winagent.exe (PID: 2740)
      • assetscan.exe (PID: 8036)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
      • winagent.exe (PID: 7376)
      • NetworkManagementInstall.tmp (PID: 7568)
    • Creates/Modifies COM task schedule object

      • winagent.exe (PID: 8052)
      • MSP_Connect.exe (PID: 2612)
    • The process checks if it is being run in the virtual environment

      • winagent.exe (PID: 8052)
      • winagent.exe (PID: 2740)
      • fmplugin.exe (PID: 6596)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 2292)
    • Process drops legitimate windows executable

      • agent.tmp (PID: 7836)
      • vcredist_x86.exe (PID: 2232)
      • winagent.exe (PID: 8052)
      • msiexec.exe (PID: 8144)
      • vcredist_x86.exe (PID: 3036)
      • MSP_Connect.exe (PID: 2612)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • PMESetup.tmp (PID: 3236)
      • NetworkManagementInstall.tmp (PID: 7568)
    • Application launched itself

      • vcredist_x86.exe (PID: 3036)
      • TCLauncherHelper.exe (PID: 1600)
      • BASupSrvcCnfg.exe (PID: 7036)
    • Using short paths in the command line

      • vcredist_x86.exe (PID: 3036)
      • winagent.exe (PID: 8052)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 8168)
      • winagent.exe (PID: 2740)
      • BASupSrvc.exe (PID: 5612)
      • PMESetup.exe (PID: 6684)
      • PMESetup.tmp (PID: 3236)
      • RequestHandlerAgentSetup.exe (PID: 5160)
      • FileCacheServiceAgentSetup.exe (PID: 2336)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • fmplugin.exe (PID: 6596)
      • NetworkManagementInstall.exe (PID: 7460)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7264)
      • winagent.exe (PID: 2740)
      • BASupSrvc.exe (PID: 5612)
      • BASupSrvcUpdater.exe (PID: 752)
      • RequestHandlerAgent.exe (PID: 7464)
      • FileCacheServiceAgent.exe (PID: 1524)
      • PME.Agent.exe (PID: 8012)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
      • NetworkManagement.exe (PID: 864)
    • There is functionality for taking screenshot (YARA)

      • winagent.exe (PID: 8052)
      • winagent.exe (PID: 2740)
      • MSP_Connect.exe (PID: 2612)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 8144)
      • MSP_Connect.exe (PID: 2612)
    • Using the short paths format

      • winagent.exe (PID: 8052)
      • msiexec.exe (PID: 8144)
      • assetscan.exe (PID: 8036)
      • conhost.exe (PID: 7056)
      • PMESetup.tmp (PID: 3236)
      • conhost.exe (PID: 8188)
      • conhost.exe (PID: 5016)
      • conhost.exe (PID: 7560)
      • fmplugin.exe (PID: 6596)
      • winagent.exe (PID: 2740)
    • The process creates files with name similar to system file names

      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • MSP_Connect.exe (PID: 2612)
    • Starts itself from another location

      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
    • Uses TASKKILL.EXE to kill process

      • msiexec.exe (PID: 7200)
    • Executes application which crashes

      • winagent.exe (PID: 8052)
    • Drops 7-zip archiver for unpacking

      • msiexec.exe (PID: 8144)
    • Adds/modifies Windows certificates

      • BASupSrvcCnfg.exe (PID: 7036)
      • winagent.exe (PID: 2740)
    • Creates or modifies Windows services

      • BASupSrvc.exe (PID: 6240)
      • RequestHandlerAgent.exe (PID: 5728)
      • FileCacheServiceAgent.exe (PID: 6084)
      • PME.Agent.exe (PID: 7992)
      • NetworkManagement.exe (PID: 7384)
      • NetworkManagement.exe (PID: 864)
    • The process executes via Task Scheduler

      • TCLauncherHelper.exe (PID: 1600)
    • Windows service management via SC.EXE

      • sc.exe (PID: 1560)
      • sc.exe (PID: 756)
      • sc.exe (PID: 6148)
      • sc.exe (PID: 3204)
      • sc.exe (PID: 5104)
      • sc.exe (PID: 5492)
      • sc.exe (PID: 4788)
      • sc.exe (PID: 6536)
      • sc.exe (PID: 7212)
      • sc.exe (PID: 5788)
      • sc.exe (PID: 3348)
      • sc.exe (PID: 7300)
    • Uses ICACLS.EXE to modify access control lists

      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • PMESetup.tmp (PID: 3236)
    • Restarts service on failure

      • sc.exe (PID: 6952)
      • sc.exe (PID: 5164)
      • sc.exe (PID: 5152)
      • sc.exe (PID: 7980)
    • Starts SC.EXE for service management

      • FileCacheServiceAgent.exe (PID: 6084)
      • PME.Agent.exe (PID: 7992)
      • NetworkManagement.exe (PID: 7384)
    • Starts CMD.EXE for commands execution

      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
    • Starts POWERSHELL.EXE for commands execution

      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
    • Gets system UUID (POWERSHELL)

      • powershell.exe (PID: 7232)
      • powershell.exe (PID: 1488)
  • INFO

    • Process checks computer location settings

      • Documents-976709d2.exe (PID: 7564)
      • agent.tmp (PID: 7636)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • TCLauncherHelper.exe (PID: 1600)
      • fmplugin.exe (PID: 6596)
    • Checks supported languages

      • Documents-976709d2.exe (PID: 7564)
      • agent.exe (PID: 7616)
      • agent.tmp (PID: 7636)
      • agent.exe (PID: 7812)
      • agent.tmp (PID: 7836)
      • unzip.exe (PID: 7864)
      • unzip.exe (PID: 7984)
      • winagent.exe (PID: 8052)
      • vcredist_x86.exe (PID: 3036)
      • vcredist_x86.exe (PID: 2232)
      • msiexec.exe (PID: 8144)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 8168)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • msiexec.exe (PID: 7200)
      • ScriptRunner.Installer.exe (PID: 4476)
      • winagent.exe (PID: 2740)
      • assetscan.exe (PID: 8036)
      • MSP_Connect.exe (PID: 2612)
      • TextInputHost.exe (PID: 6056)
      • BASupSrvc.exe (PID: 6240)
      • BASupSrvcCnfg.exe (PID: 7036)
      • TCSettingsHlp.exe (PID: 404)
      • BASupSrvc.exe (PID: 5612)
      • TCLauncherHelper.exe (PID: 7220)
      • TCLauncherHelper.exe (PID: 8092)
      • TCLauncherHelper.exe (PID: 1600)
      • TCLauncherHelper.exe (PID: 5040)
      • BASupSysInf.exe (PID: 6400)
      • BASupSrvcUpdater.exe (PID: 752)
      • BASupSysInf.exe (PID: 5356)
      • BASupSrvcCnfg.exe (PID: 8088)
      • PMESetup.tmp (PID: 3236)
      • PMESetup.exe (PID: 6684)
      • RequestHandlerAgentSetup.exe (PID: 5160)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • RequestHandlerAgent.exe (PID: 5728)
      • RequestHandlerAgent.exe (PID: 7464)
      • FileCacheServiceAgentSetup.exe (PID: 2336)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • FileCacheServiceAgent.exe (PID: 6084)
      • FileCacheServiceAgent.exe (PID: 1524)
      • PME.Agent.exe (PID: 8012)
      • PME.Agent.exe (PID: 7992)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7504)
      • fmplugin.exe (PID: 6596)
      • msp-agent-core.exe (PID: 2668)
      • msp-agent-core.exe (PID: 4752)
      • msp-agent-core-upgrade.exe (PID: 3032)
      • msp-agent-core-upgrade.exe (PID: 1840)
      • msp-agent-core.exe (PID: 7792)
      • msp-agent-core.exe (PID: 552)
      • msp-agent-core.exe (PID: 7648)
      • msp-agent-core.exe (PID: 2348)
      • msp-agent-core-upgrade.exe (PID: 1340)
      • winagent.exe (PID: 7376)
      • msp-agent-core.exe (PID: 5416)
      • msp-agent-core.exe (PID: 8108)
      • msp-agent-core.exe (PID: 4828)
      • NetworkManagementInstall.exe (PID: 7460)
      • NetworkManagementInstall.tmp (PID: 7568)
      • msp-agent-core.exe (PID: 8176)
      • NetworkManagement.exe (PID: 7384)
      • NetworkManagement.exe (PID: 8184)
      • NetworkManagement.exe (PID: 864)
      • msp-agent-core.exe (PID: 7400)
      • msp-agent-core.exe (PID: 5436)
      • msp-agent-core.exe (PID: 7472)
    • Create files in a temporary directory

      • agent.exe (PID: 7616)
      • Documents-976709d2.exe (PID: 7564)
      • agent.exe (PID: 7812)
      • agent.tmp (PID: 7836)
      • vcredist_x86.exe (PID: 2232)
    • Reads the computer name

      • Documents-976709d2.exe (PID: 7564)
      • agent.tmp (PID: 7636)
      • agent.tmp (PID: 7836)
      • winagent.exe (PID: 8052)
      • vcredist_x86.exe (PID: 3036)
      • vcredist_x86.exe (PID: 2232)
      • msiexec.exe (PID: 8144)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • ScriptRunner.Installer.exe (PID: 4476)
      • msiexec.exe (PID: 7200)
      • winagent.exe (PID: 2740)
      • assetscan.exe (PID: 8036)
      • MSP_Connect.exe (PID: 2612)
      • TextInputHost.exe (PID: 6056)
      • BASupSrvc.exe (PID: 6240)
      • BASupSrvcCnfg.exe (PID: 7036)
      • BASupSrvc.exe (PID: 5612)
      • TCLauncherHelper.exe (PID: 7220)
      • TCLauncherHelper.exe (PID: 1600)
      • TCLauncherHelper.exe (PID: 8092)
      • TCLauncherHelper.exe (PID: 5040)
      • BASupSrvcUpdater.exe (PID: 752)
      • BASupSysInf.exe (PID: 6400)
      • BASupSysInf.exe (PID: 5356)
      • PMESetup.exe (PID: 6684)
      • BASupSrvcCnfg.exe (PID: 8088)
      • PMESetup.tmp (PID: 3236)
      • RequestHandlerAgentSetup.exe (PID: 5160)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • RequestHandlerAgent.exe (PID: 7464)
      • FileCacheServiceAgentSetup.exe (PID: 2336)
      • RequestHandlerAgent.exe (PID: 5728)
      • FileCacheServiceAgent.exe (PID: 6084)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • fmplugin.exe (PID: 6596)
      • FileCacheServiceAgent.exe (PID: 1524)
      • PME.Agent.exe (PID: 7992)
      • PME.Agent.exe (PID: 8012)
      • msp-agent-core.exe (PID: 2668)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7504)
      • msp-agent-core.exe (PID: 4752)
      • msp-agent-core-upgrade.exe (PID: 1840)
      • msp-agent-core.exe (PID: 7792)
      • msp-agent-core.exe (PID: 552)
      • msp-agent-core.exe (PID: 7648)
      • msp-agent-core.exe (PID: 2348)
      • msp-agent-core.exe (PID: 8176)
      • msp-agent-core.exe (PID: 5416)
      • msp-agent-core.exe (PID: 8108)
      • msp-agent-core.exe (PID: 4828)
      • NetworkManagementInstall.tmp (PID: 7568)
      • NetworkManagement.exe (PID: 7384)
      • NetworkManagement.exe (PID: 8184)
      • msp-agent-core.exe (PID: 7400)
      • msp-agent-core.exe (PID: 7472)
      • msp-agent-core.exe (PID: 5436)
      • NetworkManagement.exe (PID: 864)
    • The sample compiled with english language support

      • agent.tmp (PID: 7836)
      • vcredist_x86.exe (PID: 2232)
      • winagent.exe (PID: 8052)
      • vcredist_x86.exe (PID: 3036)
      • msiexec.exe (PID: 8144)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 8168)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • ScriptRunner.Installer.exe (PID: 4476)
      • MSP_Connect.exe (PID: 2612)
      • winagent.exe (PID: 2740)
      • PMESetup.tmp (PID: 3236)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core-upgrade.exe (PID: 1840)
      • NetworkManagementInstall.tmp (PID: 7568)
    • Creates files in the program directory

      • agent.tmp (PID: 7836)
      • unzip.exe (PID: 7864)
      • winagent.exe (PID: 8052)
      • vcredist_x86.exe (PID: 2232)
      • vcredist_x86.exe (PID: 3036)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • ScriptRunner.Installer.exe (PID: 4476)
      • winagent.exe (PID: 2740)
      • assetscan.exe (PID: 8036)
      • MSP_Connect.exe (PID: 2612)
      • BASupSrvc.exe (PID: 6240)
      • TCLauncherHelper.exe (PID: 7220)
      • BASupSrvcCnfg.exe (PID: 7036)
      • TCSettingsHlp.exe (PID: 404)
      • TCLauncherHelper.exe (PID: 1600)
      • BASupSrvc.exe (PID: 5612)
      • BASupSrvcUpdater.exe (PID: 752)
      • BASupSysInf.exe (PID: 5356)
      • BASupSrvcCnfg.exe (PID: 8088)
      • PMESetup.tmp (PID: 3236)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • RequestHandlerAgent.exe (PID: 5728)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • FileCacheServiceAgent.exe (PID: 6084)
      • fmplugin.exe (PID: 6596)
      • FileCacheServiceAgent.exe (PID: 1524)
      • msiexec.exe (PID: 6376)
      • PME.Agent.exe (PID: 7992)
      • msp-agent-core.exe (PID: 2668)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core-upgrade.exe (PID: 1840)
      • msp-agent-core.exe (PID: 7792)
      • NetworkManagementInstall.tmp (PID: 7568)
      • NetworkManagement.exe (PID: 7384)
      • NetworkManagement.exe (PID: 864)
    • Creates a software uninstall entry

      • agent.tmp (PID: 7836)
      • vcredist_x86.exe (PID: 3036)
      • msiexec.exe (PID: 8144)
      • ScriptRunner.Installer.exe (PID: 4476)
      • PMESetup.tmp (PID: 3236)
      • RequestHandlerAgentSetup.tmp (PID: 7212)
      • FileCacheServiceAgentSetup.tmp (PID: 3464)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
      • NetworkManagementInstall.tmp (PID: 7568)
    • Reads product name

      • winagent.exe (PID: 8052)
      • winagent.exe (PID: 2740)
      • assetscan.exe (PID: 8036)
      • winagent.exe (PID: 7376)
    • Reads Environment values

      • winagent.exe (PID: 8052)
      • assetscan.exe (PID: 8036)
      • winagent.exe (PID: 2740)
      • FileCacheServiceAgent.exe (PID: 6084)
      • FileCacheServiceAgent.exe (PID: 1524)
      • winagent.exe (PID: 7376)
      • NetworkManagement.exe (PID: 864)
    • Launching a file from a Registry key

      • vcredist_x86.exe (PID: 3036)
      • ScriptRunner.Installer.exe (PID: 4476)
      • MSP_Connect.exe (PID: 2612)
    • Creates files or folders in the user directory

      • vcredist_x86.exe (PID: 3036)
      • WerFault.exe (PID: 7616)
      • BASupSrvcCnfg.exe (PID: 8088)
    • Reads the machine GUID from the registry

      • vcredist_x86.exe (PID: 3036)
      • msiexec.exe (PID: 8144)
      • ScriptRunnerInstaller-2.98.2.2.exe (PID: 1176)
      • ScriptRunner.Installer.exe (PID: 4476)
      • winagent.exe (PID: 2740)
      • TCLauncherHelper.exe (PID: 7220)
      • BASupSrvcCnfg.exe (PID: 7036)
      • TCLauncherHelper.exe (PID: 8092)
      • TCLauncherHelper.exe (PID: 1600)
      • TCLauncherHelper.exe (PID: 5040)
      • BASupSrvc.exe (PID: 5612)
      • BASupSysInf.exe (PID: 6400)
      • BASupSysInf.exe (PID: 5356)
      • BASupSrvcUpdater.exe (PID: 752)
      • BASupSrvcCnfg.exe (PID: 8088)
      • RequestHandlerAgent.exe (PID: 7464)
      • RequestHandlerAgent.exe (PID: 5728)
      • FileCacheServiceAgent.exe (PID: 6084)
      • FileCacheServiceAgent.exe (PID: 1524)
      • fmplugin.exe (PID: 6596)
      • PME.Agent.exe (PID: 8012)
      • PME.Agent.exe (PID: 7992)
      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
      • NetworkManagement.exe (PID: 8184)
      • NetworkManagement.exe (PID: 7384)
      • NetworkManagement.exe (PID: 864)
    • Checks proxy server information

      • vcredist_x86.exe (PID: 3036)
      • WerFault.exe (PID: 7616)
      • BASupSrvcCnfg.exe (PID: 8088)
      • slui.exe (PID: 4020)
    • Manages system restore points

      • SrTasks.exe (PID: 7632)
    • The sample compiled with german language support

      • msiexec.exe (PID: 8144)
    • Creating file in SysWOW64

      • msiexec.exe (PID: 8144)
    • The sample compiled with russian language support

      • msiexec.exe (PID: 8144)
    • The sample compiled with spanish language support

      • msiexec.exe (PID: 8144)
    • The sample compiled with Italian language support

      • msiexec.exe (PID: 8144)
    • The sample compiled with french language support

      • msiexec.exe (PID: 8144)
    • The sample compiled with korean language support

      • msiexec.exe (PID: 8144)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 8144)
    • The sample compiled with chinese language support

      • msiexec.exe (PID: 8144)
    • Reads Windows Product ID

      • assetscan.exe (PID: 8036)
    • Compiled with Borland Delphi (YARA)

      • MSP_Connect.exe (PID: 2612)
      • BASupSrvcCnfg.exe (PID: 7036)
      • BASupSrvc.exe (PID: 5612)
    • Process checks whether UAC notifications are on

      • TCLauncherHelper.exe (PID: 7220)
      • BASupSrvcCnfg.exe (PID: 7036)
      • TCLauncherHelper.exe (PID: 8092)
      • TCLauncherHelper.exe (PID: 1600)
      • TCLauncherHelper.exe (PID: 5040)
      • BASupSrvcCnfg.exe (PID: 8088)
    • Checks operating system version

      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • msp-agent-core.exe (PID: 6788)
      • msp-agent-core.exe (PID: 7792)
    • Reads the time zone

      • fmplugin.exe (PID: 6596)
    • Disables trace logs

      • FileCacheServiceAgent.exe (PID: 1524)
      • NetworkManagement.exe (PID: 864)
    • SQLite executable

      • NetworkManagementInstall.tmp (PID: 7568)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:07:22 02:33:09+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 74752
InitializedDataSize: 21504
UninitializedDataSize: -
EntryPoint: 0x11de6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.2.0.715
ProductVersionNumber: 1.2.0.715
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: N-able Technologies
FileDescription: Advanced Monitoring Agent Setup
FileVersion: -
InternalName: -
OriginalFileName: -
ProductName: Advanced Monitoring Agent
ProductVersion: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
320
Monitored processes
158
Malicious processes
12
Suspicious processes
15

Behavior graph

Click at the process to see the details
start documents-976709d2.exe agent.exe agent.tmp no specs agent.exe agent.tmp unzip.exe no specs conhost.exe no specs unzip.exe no specs conhost.exe no specs winagent.exe svchost.exe vcredist_x86.exe vcredist_x86.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe scriptrunnerinstaller-2.98.2.2.exe scriptrunnerinstaller-2.98.2.2.exe scriptrunner.installer.exe msiexec.exe no specs taskkill.exe no specs conhost.exe no specs winagent.exe werfault.exe assetscan.exe no specs tiworker.exe no specs msp_connect.exe slui.exe textinputhost.exe no specs basupsrvc.exe no specs tclauncherhelper.exe no specs basupsrvccnfg.exe tcsettingshlp.exe no specs conhost.exe no specs basupsrvc.exe tclauncherhelper.exe no specs tclauncherhelper.exe no specs tclauncherhelper.exe no specs basupsysinf.exe no specs basupsysinf.exe no specs basupsrvcupdater.exe conhost.exe no specs conhost.exe no specs basupsrvccnfg.exe pmesetup.exe pmesetup.tmp sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs requesthandleragentsetup.exe requesthandleragentsetup.tmp icacls.exe no specs conhost.exe no specs requesthandleragent.exe sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs requesthandleragent.exe no specs filecacheserviceagentsetup.exe filecacheserviceagentsetup.tmp icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs filecacheserviceagent.exe conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs filecacheserviceagent.exe fmplugin.exe conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs pme.agent.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs pme.agent.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs msiexec.exe no specs msp-agent-core.exe no specs conhost.exe no specs msp-agent-core.exe cmd.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs msp-agent-core-upgrade.exe no specs conhost.exe no specs msp-agent-core-upgrade.exe conhost.exe no specs msp-agent-core.exe msp-agent-core.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs msp-agent-core-upgrade.exe no specs conhost.exe no specs winagent.exe msp-agent-core.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs networkmanagementinstall.exe networkmanagementinstall.tmp networkmanagement.exe conhost.exe no specs sc.exe no specs networkmanagement.exe no specs conhost.exe no specs networkmanagement.exe msp-agent-core.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs msp-agent-core.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
144"icacls" "C:\ProgramData\MspPlatform\PME\ThirdPartyPatch" /remove:g *S-1-1-0C:\Windows\SysWOW64\icacls.exePMESetup.tmp
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
144\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeNetworkManagement.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
404"C:\Program Files (x86)\Take Control Agent\TCSettingsHlp.exe" -a -i LOGICnowC:\Program Files (x86)\Take Control Agent\TCSettingsHlp.exeMSP_Connect.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Description:
TCSettingsHlp
Exit code:
0
Version:
7.50.26.1526
Modules
Images
c:\program files (x86)\take control agent\tcsettingshlp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
552"C:\Program Files (x86)\MSP Agent\msp-agent-core.exe" --provisioning_stateC:\Program Files (x86)\Msp Agent\msp-agent-core.exewinagent.exe
User:
SYSTEM
Company:
N-able Technologies, Ltd.
Integrity Level:
SYSTEM
Description:
N-able MSP Agent Core
Exit code:
0
Modules
Images
c:\program files (x86)\msp agent\msp-agent-core.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
752"C:\Program Files (x86)\Take Control Agent\BASupSrvcUpdater.exe"C:\Program Files (x86)\Take Control Agent\BASupSrvcUpdater.exe
services.exe
User:
SYSTEM
Company:
N-able Take Control
Integrity Level:
SYSTEM
Description:
N-able Take Control Agent
Version:
7.50.26.1526
Modules
Images
c:\program files (x86)\take control agent\basupsrvcupdater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
756"C:\WINDOWS\system32\sc.exe" qdescription SolarWinds.MSP.PME.Agent.PmeServiceC:\Windows\SysWOW64\sc.exePMESetup.tmp
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\rpcrt4.dll
792\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
800\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
800\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
816\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemsp-agent-core.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
132 716
Read events
131 672
Write events
950
Delete events
94

Modification events

(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.5.3 (a)
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\Advanced Monitoring Agent
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\Advanced Monitoring Agent\
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:Inno Setup: Icon Group
Value:
Advanced Monitoring Agent
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:Inno Setup: Language
Value:
UKEnglish
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:DisplayName
Value:
Advanced Monitoring Agent
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:UninstallString
Value:
"C:\Program Files (x86)\Advanced Monitoring Agent\unins000.exe"
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Program Files (x86)\Advanced Monitoring Agent\unins000.exe" /SILENT
(PID) Process:(7836) agent.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced Monitoring Agent_is1
Operation:writeName:NoModify
Value:
1
Executable files
679
Suspicious files
242
Text files
384
Unknown types
13

Dropped files

PID
Process
Filename
Type
7564Documents-976709d2.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\agent.exeexecutable
MD5:3A64AD48A8D03E7ECC9F58355B8E393F
SHA256:08CAF67A3DC4036552D26B87773B63620B2FC12455C8477F130FAE58EA77D0E4
7836agent.tmpC:\Users\admin\AppData\Local\Temp\is-HBINL.tmp\_isetup\_setup64.tmpexecutable
MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
SHA256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
7564Documents-976709d2.exeC:\Users\admin\AppData\Local\Temp\7ZipSfx.000\package.zipcompressed
MD5:8D169351432BBFF5EABF9D1896828EF6
SHA256:5EDA46EE2E2793B8D5B3302A909567324BF9ED309B5265D4E3E2712F7FA22F43
7616agent.exeC:\Users\admin\AppData\Local\Temp\is-H1H7E.tmp\agent.tmpexecutable
MD5:A2C4D52C66B4B399FACADB8CC8386745
SHA256:6C0465CE64C07E729C399A338705941D77727C7D089430957DF3E91A416E9D2A
7836agent.tmpC:\Program Files (x86)\Advanced Monitoring Agent\is-848OE.tmptext
MD5:E4361DEF38811D2F295B5686BD2C2B5B
SHA256:0E5882114864D4A708B472D524063867FA770958B770B67FC0AF7F8ED4757AD2
7836agent.tmpC:\Program Files (x86)\Advanced Monitoring Agent\is-LHGSO.tmpexecutable
MD5:D7C918793B7F6EBFB34D34FCBF0A8749
SHA256:9C2F4F7BDAB3FFD39EFAF9DD904CF031A38E1253B6645A61A2FA8364E0808299
7836agent.tmpC:\Program Files (x86)\Advanced Monitoring Agent\unins000.exeexecutable
MD5:D7C918793B7F6EBFB34D34FCBF0A8749
SHA256:9C2F4F7BDAB3FFD39EFAF9DD904CF031A38E1253B6645A61A2FA8364E0808299
7836agent.tmpC:\Program Files (x86)\Advanced Monitoring Agent\1.lngtext
MD5:E4361DEF38811D2F295B5686BD2C2B5B
SHA256:0E5882114864D4A708B472D524063867FA770958B770B67FC0AF7F8ED4757AD2
7836agent.tmpC:\Program Files (x86)\Advanced Monitoring Agent\2.lngtext
MD5:94566142FEDCB1289CCD8E5D67D36EC5
SHA256:8922C25B3A4D394F4AF801F469493D8B0941C6ED03D31C00A616E53D930D8934
7836agent.tmpC:\Program Files (x86)\Advanced Monitoring Agent\4.lngtext
MD5:AE2624E65E959A3CC5BFD1C90F85231F
SHA256:999EB14EABFBDAF625E5BBCC5237318B2DB016CDDCFB3827E3A262064589666C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
381
TCP/UDP connections
144
DNS requests
60
Threats
99

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8052
winagent.exe
POST
200
104.18.39.236:443
https://upload1.am.remote.management/command/agentprocessor_v2.php
US
xml
155 b
unknown
8052
winagent.exe
POST
200
104.18.39.236:443
https://upload2.am.remote.management/command/agentprocessor_v2.php
US
xml
297 b
unknown
2216
svchost.exe
GET
200
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/WaaSAssessment?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&ring=Retail&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=10.0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=562&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=WaaSAssessment&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&ServicingBranch=CB&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&HonorWUfBDeferrals=1&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
text
5.51 Kb
whitelisted
2216
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
2216
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
6768
MoUsoCoreWorker.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
8052
winagent.exe
POST
200
104.18.39.236:443
https://upload3.am.remote.management/command/agentprocessor_v2.php
US
xml
661 b
unknown
2216
svchost.exe
GET
200
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=562&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
text
1.43 Kb
whitelisted
8052
winagent.exe
GET
200
149.13.75.67:443
https://rm-downloads.logicnow.com/fmplugin_binaries/fmplugin_core-release_1.5.59-65503b57-1.zip
US
compressed
128 Kb
unknown
3036
vcredist_x86.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
US
binary
1.05 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
2216
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3488
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
8052
winagent.exe
104.18.39.236:443
upload1.am.remote.management
CLOUDFLARENET
US
whitelisted
2216
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2216
svchost.exe
2.16.241.12:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
2216
svchost.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
8052
winagent.exe
149.13.75.67:443
rm-downloads.logicnow.com
I-3
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.206
whitelisted
upload1.am.remote.management
  • 104.18.39.236
  • 172.64.148.20
unknown
upload2.am.remote.management
  • 104.18.39.236
  • 172.64.148.20
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 23.59.18.102
  • 88.221.169.152
whitelisted
upload3.am.remote.management
  • 104.18.39.236
  • 172.64.148.20
unknown
rm-downloads.logicnow.com
  • 149.13.75.67
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.128
  • 40.126.31.130
  • 20.190.159.128
  • 20.190.159.75
  • 20.190.159.64
  • 40.126.31.67
  • 40.126.31.2
  • 20.190.159.129
  • 40.126.31.73
  • 40.126.31.0
  • 40.126.31.69
  • 20.190.159.4
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 23.63.118.230
  • 184.30.131.245
whitelisted

Threats

PID
Process
Class
Message
2292
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
2292
svchost.exe
Misc activity
ET INFO Observed RMM Domain in DNS Lookup (remote .management)
8052
winagent.exe
Misc activity
ET INFO Observed RMM Domain in TLS SNI (remote .management)
2292
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
2292
svchost.exe
Misc activity
ET INFO Observed RMM Domain in DNS Lookup (remote .management)
8052
winagent.exe
Misc activity
ET INFO Observed RMM Domain in TLS SNI (remote .management)
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2292
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query for Suspicious TLD (.management)
8052
winagent.exe
Misc activity
ET INFO Observed RMM Domain in TLS SNI (remote .management)
2292
svchost.exe
Misc activity
ET INFO Observed RMM Domain in DNS Lookup (remote .management)
Process
Message
NetworkManagement.exe
Native library pre-loader is trying to load native SQLite library "C:\Program Files\Advanced Monitoring Agent Network Management\x64\SQLite.Interop.dll"...
NetworkManagement.exe
Native library pre-loader is trying to load native SQLite library "C:\Program Files\Advanced Monitoring Agent Network Management\x64\SQLite.Interop.dll"...