File name:

parsec-windows.exe

Full analysis: https://app.any.run/tasks/fcff1ecb-7312-4c61-822e-fc9b24b7d06a
Verdict: Malicious activity
Analysis date: January 30, 2025, 13:22:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

DCB05245F0235006F2FDAB1CBECD643F

SHA1:

82C1E837487AB78B3F0E6A238F70332AA81455FF

SHA256:

E9717407026BEF30509D151D4B665B67AD61A01AC51D8058B98A6BA80F1A3A6E

SSDEEP:

98304:1zQkWrhYycq4DJLyPsYLhOtx+WVCj5VWMkV17LrQQSrLhdtjB2MzxuPhzAPHf8sO:SOKTSt/LD8k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • parsec-windows.exe (PID: 5720)
      • parsec-windows.exe (PID: 3688)
    • Changes the autorun value in the registry

      • nefconw.exe (PID: 5448)
  • SUSPICIOUS

    • The process executes VB scripts

      • parsec-windows.exe (PID: 3688)
    • The process creates files with name similar to system file names

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • parsec-vdd.exe (PID: 2280)
    • Executable content was dropped or overwritten

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • drvinst.exe (PID: 3220)
      • nefconw.exe (PID: 2728)
      • nefconw.exe (PID: 5448)
      • drvinst.exe (PID: 3144)
      • parsec-vdd.exe (PID: 2280)
      • nefconw.exe (PID: 5448)
      • drvinst.exe (PID: 4672)
      • parsecd.exe (PID: 4976)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • parsec-vdd.exe (PID: 2280)
    • Uses TASKKILL.EXE to kill process

      • wscript.exe (PID: 3984)
    • There is functionality for taking screenshot (YARA)

      • parsec-windows.exe (PID: 3688)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3984)
      • wscript.exe (PID: 4976)
      • wscript.exe (PID: 5000)
      • wscript.exe (PID: 396)
      • wscript.exe (PID: 2736)
      • wscript.exe (PID: 5320)
    • Stops a currently running service

      • sc.exe (PID: 2928)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 4976)
      • wscript.exe (PID: 396)
      • wscript.exe (PID: 2736)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • wscript.exe (PID: 4976)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 5252)
    • Creates a new Windows service

      • sc.exe (PID: 5112)
    • Creates a software uninstall entry

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • parsec-vdd.exe (PID: 2280)
    • Executes as Windows Service

      • pservice.exe (PID: 1556)
      • WUDFHost.exe (PID: 4468)
    • Windows service management via SC.EXE

      • sc.exe (PID: 5160)
      • sc.exe (PID: 3732)
      • sc.exe (PID: 3420)
    • Starts CMD.EXE for commands execution

      • parsec-vud.exe (PID: 5096)
      • parsec-windows.exe (PID: 3688)
      • parsec-vdd.exe (PID: 2280)
    • Drops a system driver (possible attempt to evade defenses)

      • parsec-vud.exe (PID: 5096)
      • nefconw.exe (PID: 2728)
      • drvinst.exe (PID: 3220)
      • nefconw.exe (PID: 5448)
      • drvinst.exe (PID: 3144)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • wscript.exe (PID: 2736)
    • Creates files in the driver directory

      • drvinst.exe (PID: 3220)
      • drvinst.exe (PID: 3144)
      • drvinst.exe (PID: 4672)
    • Executing commands from a ".bat" file

      • parsec-vud.exe (PID: 5096)
      • parsec-vdd.exe (PID: 2280)
    • Checks Windows Trust Settings

      • drvinst.exe (PID: 3144)
      • drvinst.exe (PID: 3220)
      • parsecd.exe (PID: 4976)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 4976)
      • drvinst.exe (PID: 5404)
      • drvinst.exe (PID: 1616)
      • drvinst.exe (PID: 4264)
    • Uses WEVTUTIL.EXE to remove publishers and event logs from the manifest

      • parsec-vdd.exe (PID: 2280)
      • wevtutil.exe (PID: 2680)
    • Reads security settings of Internet Explorer

      • parsecd.exe (PID: 4976)
    • Uses WEVTUTIL.EXE to install publishers and event logs from the manifest

      • parsec-vdd.exe (PID: 2280)
      • wevtutil.exe (PID: 1576)
  • INFO

    • Creates files in the program directory

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • parsec-vdd.exe (PID: 2280)
    • Reads the computer name

      • parsec-windows.exe (PID: 3688)
      • pservice.exe (PID: 1556)
      • nefconw.exe (PID: 2324)
      • nefconw.exe (PID: 2728)
      • nefconw.exe (PID: 5448)
      • drvinst.exe (PID: 3144)
      • drvinst.exe (PID: 3220)
      • drvinst.exe (PID: 4976)
      • drvinst.exe (PID: 5404)
      • drvinst.exe (PID: 1616)
      • nefconw.exe (PID: 2464)
      • nefconw.exe (PID: 5448)
      • nefconw.exe (PID: 4244)
      • drvinst.exe (PID: 4672)
      • drvinst.exe (PID: 4264)
      • parsecd.exe (PID: 4976)
    • Create files in a temporary directory

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • nefconw.exe (PID: 2728)
      • nefconw.exe (PID: 5448)
      • parsec-vdd.exe (PID: 2280)
      • nefconw.exe (PID: 5448)
    • Checks supported languages

      • parsec-windows.exe (PID: 3688)
      • pservice.exe (PID: 1556)
      • nefconc.exe (PID: 1476)
      • parsec-vud.exe (PID: 5096)
      • nefconw.exe (PID: 2728)
      • drvinst.exe (PID: 3220)
      • nefconw.exe (PID: 2324)
      • nefconw.exe (PID: 5448)
      • drvinst.exe (PID: 3144)
      • drvinst.exe (PID: 1616)
      • drvinst.exe (PID: 4976)
      • parsec-vdd.exe (PID: 2280)
      • drvinst.exe (PID: 5404)
      • nefconw.exe (PID: 2464)
      • nefconw.exe (PID: 5448)
      • nefconw.exe (PID: 4244)
      • drvinst.exe (PID: 4672)
      • drvinst.exe (PID: 4264)
      • parsecd.exe (PID: 4976)
    • The sample compiled with english language support

      • parsec-windows.exe (PID: 3688)
      • parsec-vud.exe (PID: 5096)
      • parsec-vdd.exe (PID: 2280)
      • nefconw.exe (PID: 5448)
      • drvinst.exe (PID: 4672)
      • parsecd.exe (PID: 4976)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 3220)
      • drvinst.exe (PID: 3144)
      • drvinst.exe (PID: 4672)
      • parsecd.exe (PID: 4976)
    • Reads the software policy settings

      • drvinst.exe (PID: 3220)
      • drvinst.exe (PID: 3144)
      • drvinst.exe (PID: 4672)
      • parsecd.exe (PID: 4976)
    • Reads the time zone

      • runonce.exe (PID: 5732)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 5732)
    • Creates files or folders in the user directory

      • parsecd.exe (PID: 4976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:30 16:55:23+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 184832
UninitializedDataSize: 2048
EntryPoint: 0x3552
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 150.97.3.0
ProductVersionNumber: 150.97.3.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Parsec
FileVersion: 150.97.3.0
ProductName: Parsec
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
184
Monitored processes
67
Malicious processes
10
Suspicious processes
6

Behavior graph

Click at the process to see the details
start parsec-windows.exe wscript.exe no specs sc.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs wscript.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs wscript.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs wscript.exe no specs schtasks.exe no specs conhost.exe no specs wscript.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs pservice.exe no specs wscript.exe no specs netsh.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs parsec-vud.exe cmd.exe no specs conhost.exe no specs nefconc.exe no specs cmd.exe no specs conhost.exe no specs nefconw.exe no specs nefconw.exe drvinst.exe drvinst.exe no specs nefconw.exe drvinst.exe drvinst.exe no specs runonce.exe no specs grpconv.exe no specs drvinst.exe no specs cmd.exe no specs conhost.exe no specs parsec-vdd.exe wevtutil.exe no specs conhost.exe no specs wevtutil.exe no specs cmd.exe no specs conhost.exe no specs nefconw.exe no specs nefconw.exe no specs nefconw.exe drvinst.exe drvinst.exe no specs wudfhost.exe no specs wevtutil.exe no specs conhost.exe no specs wevtutil.exe no specs parsecd.exe parsec-windows.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396"C:\WINDOWS\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\service-install.vbs" "C:\Program Files\Parsec\pservice.exe"C:\Windows\SysWOW64\wscript.exeparsec-windows.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
396cmd /c "C:\Program Files\Parsec\vdd\parsec-vdd.exe" /SC:\Windows\SysWOW64\cmd.exeparsec-windows.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
424"C:\Windows\System32\grpconv.exe" -oC:\Windows\System32\grpconv.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Progman Group Converter
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\grpconv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
448"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=parsecd.exeC:\Windows\SysWOW64\netsh.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1476"C:\Program Files\Parsec Virtual USB Adapter Driver\nefconc.exe" --find-hwid --hardware-id VUSBAC:\Program Files\Parsec Virtual USB Adapter Driver\nefconc.execmd.exe
User:
admin
Company:
Nefarius Software Solutions e.U.
Integrity Level:
HIGH
Description:
Nefarius' Device Console Utility
Exit code:
1168
Version:
1.10.0.0
Modules
Images
c:\program files\parsec virtual usb adapter driver\nefconc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
1556"C:\Program Files\Parsec\pservice.exe"C:\Program Files\Parsec\pservice.exeservices.exe
User:
SYSTEM
Company:
Parsec
Integrity Level:
SYSTEM
Description:
Parsec
Version:
150.91.0.0
Modules
Images
c:\program files\parsec\pservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1576wevtutil im "C:\Program Files\Parsec Virtual Display Driver\mm.man"C:\Windows\SysWOW64\wevtutil.exeparsec-vdd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Eventing Command Line Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wevtutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcp_win.dll
1616DrvInst.exe "8" "4" "C:\WINDOWS\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_37113b1521fc4458\parsecvirtualds.inf" "0" "43799a85b" "00000000000001FC" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
Total events
19 008
Read events
18 878
Write events
113
Delete events
17

Modification events

(PID) Process:(3688) parsec-windows.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Parsec.App.0
Value:
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:URLInfoAbout
Value:
https://parsec.app
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:URLUpdateInfo
Value:
https://parsec.app/changelog
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:Comments
Value:
Parsec
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Parsec\parsecd.exe
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:DisplayName
Value:
Parsec
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:DisplayVersion
Value:
150-97c
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:EstimatedSize
Value:
8384
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:HelpLink
Value:
https://support.parsec.app
(PID) Process:(3688) parsec-windows.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Parsec
Operation:writeName:InstallLocation
Value:
C:\Program Files\Parsec
Executable files
38
Suspicious files
43
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
3688parsec-windows.exeC:\Program Files\Parsec\wscripts\firewall-add.vbstext
MD5:882374285898F16B5F9FF44AFC1AE701
SHA256:0BE5AA5CC6395A86878F56B131E13DB4908E48F06E892FF8F8CF9E2D3B6C8ABB
3688parsec-windows.exeC:\Users\admin\AppData\Local\Temp\nsg9ABD.tmp\nsDialogs.dllexecutable
MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
SHA256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
3688parsec-windows.exeC:\Users\admin\AppData\Local\Temp\nsg9ABD.tmp\System.dllexecutable
MD5:192639861E3DC2DC5C08BB8F8C7260D5
SHA256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
3688parsec-windows.exeC:\Program Files\Parsec\wscripts\service-kill-parsec.vbstext
MD5:F7B0C63E7AEA5CBD96F7BF1021B28B73
SHA256:71F9CC28497B959377439F6611615EF582745DD5B9CCA02B5C4B24BB1FC3DFB8
3688parsec-windows.exeC:\Program Files\Parsec\wscripts\legacy-cleanup.vbstext
MD5:C78520C3162C1962F3164714B37EB4D0
SHA256:DEA38BD553ABE93C689DE42D0220ADD18F9BE3E3D2FA53F97EB8649F586DF4F3
3688parsec-windows.exeC:\Program Files\Parsec\wscripts\service-remove.vbstext
MD5:B90E75DD7903CB2D6328BB3714865C7A
SHA256:970B3C2A9EA1906A177810990478932E3517F47ABA267CF2AB9E4BA65E7B475F
3688parsec-windows.exeC:\Program Files\Parsec\wscripts\firewall-remove.vbstext
MD5:5D4D70CDF36FCDAA292DA1DA9133320C
SHA256:75F1DECE4FDA689A907F6D74B513ADB0C1771C1B79EA71160179542C9C4AB2F0
3688parsec-windows.exeC:\Users\admin\AppData\Local\Temp\nsg9ABD.tmp\ApplicationID.dllexecutable
MD5:A858C1A57E32485505B1977CF0A125BE
SHA256:1462A072345E86318B981089B08B613A34027DDF527BFB66606C683F218FC3B4
3688parsec-windows.exeC:\Program Files\Parsec\skel\appdata.jsonbinary
MD5:BB6E6B8AFC3F4A2F63FD320709A15628
SHA256:13CEB79C26F30FEA1FCE3F6FB8C6D315C87A18E883A22C9DF04B6864AB5314FC
3688parsec-windows.exeC:\Program Files\Parsec\uninstall.exeexecutable
MD5:2484881C9936EA7CC7387568E10D3179
SHA256:36088CE3A5C5F0A8827166B59CCDBDFF98AB133FC9205C73D81CB50BBD1B0FF8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
10
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.192:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4976
parsecd.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
4976
parsecd.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
4976
parsecd.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAloEugzUPGt9OnVZ%2FPPgls%3D
unknown
whitelisted
POST
204
92.123.104.67:443
https://www.bing.com/threshold/xls.aspx
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.192:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3976
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
92.123.104.60:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.48.23.192
  • 23.48.23.137
  • 23.48.23.190
  • 23.48.23.194
  • 23.48.23.191
  • 23.48.23.138
  • 23.48.23.188
  • 23.48.23.185
  • 23.48.23.134
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.bing.com
  • 92.123.104.60
  • 92.123.104.66
  • 92.123.104.4
  • 92.123.104.65
  • 92.123.104.67
  • 92.123.104.5
  • 92.123.104.59
  • 92.123.104.63
  • 92.123.104.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
self.events.data.microsoft.com
  • 20.42.65.94
whitelisted

Threats

No threats detected
No debug info