File name:

c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe

Full analysis: https://app.any.run/tasks/9bd44f37-0886-4926-a46e-a29b61f89d1b
Verdict: Malicious activity
Analysis date: March 05, 2024, 03:51:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
remote
getmescreen
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

46CE83FD31D1B64C184E4307862DBC11

SHA1:

B5937BC379C27A4C48D2C34D542AFBD2DA71BF59

SHA256:

C6931330AC5B1674F9B2C3691F2C061B51066839622A49A97F4608A3959E1767

SSDEEP:

98304:Ssi3qWmzqqmJl1VaEvgyPCCZ8QN9zMxjQs5dFdroIuBo5zOB+Cm86JM3XmuuSaCA:NalIVXRTj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
    • GETMESCREEN has been detected (SURICATA)

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
    • Changes Internet Explorer settings (feature browser emulation)

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5296)
    • Executes as Windows Service

      • jfygsjxzleqyshllfljmdpsktgilorp-elevate.exe (PID: 5788)
    • Application launched itself

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
    • Executable content was dropped or overwritten

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
    • Connects to unusual port

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
    • Reads security settings of Internet Explorer

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
  • INFO

    • Checks supported languages

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5296)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 6660)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4496)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 2888)
      • jfygsjxzleqyshllfljmdpsktgilorp-elevate.exe (PID: 5788)
    • Creates files in the program directory

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
    • Reads the computer name

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
      • jfygsjxzleqyshllfljmdpsktgilorp-elevate.exe (PID: 5788)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 2888)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4496)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 6660)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5296)
    • Creates files or folders in the user directory

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
      • WWAHost.exe (PID: 2196)
    • Process checks computer location settings

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 4420)
    • Checks proxy server information

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 5332)
      • WWAHost.exe (PID: 2196)
      • slui.exe (PID: 2128)
    • Reads mouse settings

      • c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe (PID: 2888)
    • Reads security settings of Internet Explorer

      • WWAHost.exe (PID: 2196)
    • Reads the software policy settings

      • WWAHost.exe (PID: 2196)
      • slui.exe (PID: 2128)
    • Manual execution by a user

      • chrome.exe (PID: 1556)
    • Application launched itself

      • chrome.exe (PID: 1556)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 1556)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:03:01 07:59:26+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.36
CodeSize: 4235264
InitializedDataSize: 20480
UninitializedDataSize: 21577728
EntryPoint: 0x189e680
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.18.1.0
ProductVersionNumber: 2.18.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0009)
CharacterSet: Unicode
CompanyName: Getscreen.me
InternalName: Getscreen.me
OriginalFileName: getscreen.exe
ProductName: Getscreen.me
FileVersion: 2.18.1
LegalCopyright: Copyright (C) 2023
ProductVersion: 2.18.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
177
Monitored processes
27
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe no specs #GETMESCREEN c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe no specs jfygsjxzleqyshllfljmdpsktgilorp-elevate.exe no specs c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe no specs c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe wwahost.exe filecoauth.exe no specs slui.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1052C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1556"C:\Program Files\Google\Chrome\Application\chrome.exe" "--disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
112.0.5615.50
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\112.0.5615.50\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=112.0.5615.50 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff89605aa60,0x7ff89605aa70,0x7ff89605aa80C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
112.0.5615.50
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\112.0.5615.50\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1820"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4872 --field-trial-handle=1920,i,9645818428824889520,13016201756516363829,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
112.0.5615.50
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\112.0.5615.50\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2128C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
2188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=2092 --field-trial-handle=1920,i,9645818428824889520,13016201756516363829,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
112.0.5615.50
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\112.0.5615.50\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2196"C:\WINDOWS\system32\wwahost.exe" -ServerName:App.wwaC:\Windows\System32\WWAHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft WWA Host
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wwahost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
2484"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=4400 --field-trial-handle=1920,i,9645818428824889520,13016201756516363829,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
112.0.5615.50
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\112.0.5615.50\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2888"C:\Users\admin\AppData\Local\Temp\c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe" -cpipe \\.\pipe\PCommand96yzkwsyuchnmtbnq -childC:\Users\admin\AppData\Local\Temp\c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
User:
SYSTEM
Company:
Getscreen.me
Integrity Level:
SYSTEM
Exit code:
0
Version:
2.18.1
Modules
Images
c:\users\admin\appdata\local\temp\c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
3032"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=4828 --field-trial-handle=1920,i,9645818428824889520,13016201756516363829,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
112.0.5615.50
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\112.0.5615.50\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
17 171
Read events
17 081
Write events
78
Delete events
12

Modification events

(PID) Process:(4420) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4420) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4420) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4420) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(5332) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\36\52C64B7E
Operation:writeName:@%systemroot%\system32\FirewallControlPanel.dll,-12122
Value:
Windows Defender Firewall
(PID) Process:(5296) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Operation:writeName:c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Value:
11001
(PID) Process:(5296) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Operation:writeName:c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Value:
11001
(PID) Process:(5296) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getscreen.me
Operation:writeName:http
Value:
2
(PID) Process:(5296) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getscreen.me
Operation:writeName:https
Value:
2
(PID) Process:(5296) c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains\getscreen.me
Operation:writeName:http
Value:
2
Executable files
1
Suspicious files
129
Text files
87
Unknown types
47

Dropped files

PID
Process
Filename
Type
6660c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeC:\ProgramData\Getscreen.me\memory\0000pipe0PCommand96yzkwsyuchnmtbnq0
MD5:
SHA256:
5332c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeC:\ProgramData\Getscreen.me\memory\6FBC8D83AD6EDA010CFED87CB06EDA01D4140000FFFFFFFF
MD5:
SHA256:
5332c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeC:\ProgramData\Getscreen.me\folder\settings.datbinary
MD5:5F5D66467C9C30E1B45189F314FF1341
SHA256:A4E119198F47952AA3F328E3D4110A08CD3B62F289F09B49C84CC22CF15A8422
2196WWAHost.exeC:\Users\admin\AppData\Local\Packages\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:087C973EE582BD54DC1F633E1392277A
SHA256:313EDF9F05C9069903ED0F3D07C1157B12C6C79DE9A9FD31011983AAEB31A915
2196WWAHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\LocalState\_sessionState.json~RF13ea15.TMP
MD5:
SHA256:
2196WWAHost.exeC:\Users\admin\AppData\Local\Packages\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\AC\INetCache\E26FM3FM\Converged_v21033_mG-wAdV--_sq1kXms675SA2[1].csstext
MD5:986FB001D57EFBFB2AD645E6B3AEF948
SHA256:DE304CB4D64E769DD16A7B4500603205D2606FE0877DD046460C7B8DF06A31B3
4420c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exeC:\ProgramData\Getscreen.me\logs\20240305.logtext
MD5:6206CE7CFC815D280C4B7DF3416B4473
SHA256:D9C8901014B558CC762AD5CFC8FE325F993AC0C307E1B6EAD083342BCC0487F4
2196WWAHost.exeC:\Users\admin\AppData\Local\Packages\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:9B587B23C0FF0D6F6F3FD9D901E72C21
SHA256:B73D4C15AF0B2E45478CAED83C27D345E3F61625657F892976D6CECAE15D5B06
2196WWAHost.exeC:\Users\admin\AppData\Local\Packages\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\AC\INetCache\KOPKSTOR\WinJS_vcvx4TydCFioSeM4NLxTDw2[1].jstext
MD5:BDCBF1E13C9D0858A849E33834BC530F
SHA256:3989FE38739BBA3E3DD9D60C4364D9DCCA55F44A1B1786DE77F97F17CA0EF21B
2196WWAHost.exeC:\Users\admin\AppData\Local\Packages\microsoft.windows.cloudexperiencehost_cw5n1h2txyewy\AC\INetCache\YL5601VO\Win10HostLogin_PCore_HfP-Sb46KZndD2sgGfN-Xg2[1].jstext
MD5:1DF3FE49BE3A2999DD0F6B2019F37E5E
SHA256:1B9F9BE297257A572FE65D6B84768469ACF5A39D87C5ABA1671CFBA13469A5D4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
135
DNS requests
58
Threats
418

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5928
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
4072
svchost.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
binary
1.01 Kb
unknown
1248
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
314 b
unknown
1608
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
unknown
binary
471 b
unknown
5184
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
binary
471 b
unknown
5184
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
5184
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
binary
471 b
unknown
2196
WWAHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
2196
WWAHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
binary
471 b
unknown
6628
SystemSettings.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
314 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4072
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6896
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5928
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:138
whitelisted
3848
svchost.exe
239.255.255.250:1900
unknown
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
78.47.165.25:443
getscreen.me
Hetzner Online GmbH
DE
unknown
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
45.65.9.108:3478
px-us1.getscreen.me
unknown
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
95.85.71.16:3478
px-in1.getscreen.me
unknown
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
162.55.165.163:3478
px-eu1.getscreen.me
unknown
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
5.188.225.23:3478
px-br1.getscreen.me
unknown

DNS requests

Domain
IP
Reputation
getscreen.me
  • 78.47.165.25
  • 5.75.168.191
unknown
image.getscreen.me
  • 5.9.146.41
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
px-us1.getscreen.me
  • 45.65.9.108
unknown
px-br1.getscreen.me
  • 5.188.225.23
unknown
px-eu1.getscreen.me
  • 162.55.165.163
unknown
px-au1.getscreen.me
  • 103.43.75.192
unknown
px-il1.getscreen.me
  • 146.185.219.90
unknown
px-us2.getscreen.me
  • 5.161.108.215
unknown
px-in1.getscreen.me
  • 95.85.71.16
unknown

Threats

PID
Process
Class
Message
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
REMOTE [ANY.RUN] GetMeScreen Remote Desctop Software (TURN)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
5332
c6931330ac5b1674f9b2c3691f2c061b51066839622a49a97f4608a3959e1767.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
No debug info