URL:

https://secureconnect.honeywellcloud.com/Bin/ScreenConnect.ClientSetup.exe?e=Access&y=Guest&c=AUB%20Bank&c=Bahrain&c=Sayed%20Hussain&c=E482322&c=Sayed.Hussain%40Honeywell.com&c=KSA-EBI-META&c=&c=

Full analysis: https://app.any.run/tasks/4b1eca19-7b99-4b1f-b4ab-dafbc445604e
Verdict: Malicious activity
Analysis date: November 26, 2023, 10:36:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
screenconnect
remote
Indicators:
SHA1:

08777B3FBFC9EB3E904936ACDA1A96346408D074

SHA256:

83445B9BB07DABC76745608D064C20C1D25337C0DCE47759865E34E99C97BD6E

SSDEEP:

6:2Z2L1cuZcFKCF/G5AWYP21kTo7QGYgkZMIMLltY:2Z2L1mFg5AL2aRjZUhq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 2316)
    • Creates a writable file in the system directory

      • ScreenConnect.ClientService.exe (PID: 3172)
    • Connects to the CnC server

      • ScreenConnect.ClientService.exe (PID: 3172)
    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 3172)
  • SUSPICIOUS

    • Reads the Internet Settings

      • ScreenConnect.ClientSetup.exe (PID: 3924)
      • ScreenConnect.WindowsClient.exe (PID: 1872)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2072)
      • ScreenConnect.ClientService.exe (PID: 3172)
    • Uses RUNDLL32.EXE to load library

      • msiexec.exe (PID: 3208)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 2316)
    • Creates or modifies Windows services

      • ScreenConnect.ClientService.exe (PID: 3172)
  • INFO

    • Reads the computer name

      • wmpnscfg.exe (PID: 2820)
      • ScreenConnect.ClientSetup.exe (PID: 3924)
      • msiexec.exe (PID: 2316)
      • msiexec.exe (PID: 3208)
      • msiexec.exe (PID: 3600)
      • ScreenConnect.WindowsClient.exe (PID: 1872)
      • ScreenConnect.WindowsClient.exe (PID: 2904)
      • msiexec.exe (PID: 3944)
      • ScreenConnect.ClientService.exe (PID: 3172)
    • Checks supported languages

      • ScreenConnect.ClientSetup.exe (PID: 3924)
      • msiexec.exe (PID: 2316)
      • wmpnscfg.exe (PID: 2820)
      • msiexec.exe (PID: 3208)
      • msiexec.exe (PID: 3600)
      • msiexec.exe (PID: 3944)
      • ScreenConnect.WindowsClient.exe (PID: 2904)
      • ScreenConnect.ClientService.exe (PID: 3172)
      • ScreenConnect.WindowsClient.exe (PID: 1872)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2820)
      • ScreenConnect.ClientSetup.exe (PID: 3924)
      • msiexec.exe (PID: 2316)
      • msiexec.exe (PID: 3208)
      • msiexec.exe (PID: 3600)
      • ScreenConnect.WindowsClient.exe (PID: 1872)
      • ScreenConnect.WindowsClient.exe (PID: 2904)
      • msiexec.exe (PID: 3944)
      • ScreenConnect.ClientService.exe (PID: 3172)
    • Application launched itself

      • iexplore.exe (PID: 2856)
      • msiexec.exe (PID: 2316)
    • The process uses the downloaded file

      • iexplore.exe (PID: 2856)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3024)
      • iexplore.exe (PID: 2856)
      • msiexec.exe (PID: 1360)
      • rundll32.exe (PID: 3396)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2820)
    • Create files in a temporary directory

      • ScreenConnect.ClientSetup.exe (PID: 3924)
      • rundll32.exe (PID: 3396)
      • msiexec.exe (PID: 2316)
    • Reads CPU info

      • ScreenConnect.WindowsClient.exe (PID: 2904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
15
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs screenconnect.clientsetup.exe no specs screenconnect.clientsetup.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs rundll32.exe no specs vssvc.exe no specs msiexec.exe no specs msiexec.exe no specs #SCREENCONNECT screenconnect.clientservice.exe screenconnect.windowsclient.exe no specs screenconnect.windowsclient.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1360"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\ScreenConnect\fb4c833997b10f3b\setup.msi"C:\Windows\System32\msiexec.exeScreenConnect.ClientSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1872"C:\Program Files\ScreenConnect Client (fb4c833997b10f3b)\ScreenConnect.WindowsClient.exe" "RunRole" "d15408fe-a728-4923-aeaa-efc23cb5b5cf" "User"C:\Program Files\ScreenConnect Client (fb4c833997b10f3b)\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
admin
Company:
ScreenConnect Software
Integrity Level:
MEDIUM
Description:
ScreenConnect Client
Exit code:
0
Version:
23.8.1.8686
Modules
Images
c:\program files\screenconnect client (fb4c833997b10f3b)\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2072C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2316C:\Windows\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2432"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\ScreenConnect.ClientSetup.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\ScreenConnect.ClientSetup.exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\78rfyb7z\screenconnect.clientsetup.exe
c:\windows\system32\ntdll.dll
2820"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2856"C:\Program Files\Internet Explorer\iexplore.exe" "https://secureconnect.honeywellcloud.com/Bin/ScreenConnect.ClientSetup.exe?e=Access&y=Guest&c=AUB%20Bank&c=Bahrain&c=Sayed%20Hussain&c=E482322&c=Sayed.Hussain%40Honeywell.com&c=KSA-EBI-META&c=&c="C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2904"C:\Program Files\ScreenConnect Client (fb4c833997b10f3b)\ScreenConnect.WindowsClient.exe" "RunRole" "4bf7d33f-c276-4737-832a-891d4de02f28" "System"C:\Program Files\ScreenConnect Client (fb4c833997b10f3b)\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
SYSTEM
Company:
ScreenConnect Software
Integrity Level:
SYSTEM
Description:
ScreenConnect Client
Exit code:
0
Version:
23.8.1.8686
Modules
Images
c:\program files\screenconnect client (fb4c833997b10f3b)\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3024"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2856 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3172"C:\Program Files\ScreenConnect Client (fb4c833997b10f3b)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=screlay.honeywellcloud.com&p=443&s=161e92d8-52b2-45ab-88e9-cd6134a2407c&k=BgIAAACkAABSU0ExAAgAAAEAAQAj2ASeRAOdsLfwObXg3jgoM9%2f5OvKC9Uvi7ypgNXQwdTQG6i8th7X0rLWGtj6KXUN7EMfpk7J375sz92p8C6vGv0FvmCeBbtHqy6DKeQfXz2%2fyp3tfJIM4sKSTK0f1sEa8QiYCbh5QE7hHUzyqjWgrFjzYkrceb4cgwzFcRQk%2bhGmYWps579bbP1vH5I321b90RlV92iyX%2fL48avtY81Y9TIwGhsUqJPwt2lGPJ9%2f%2fXURGfZniGu6CQNZ5sMnll7ZH%2fE5IXobUNg2itlulbaQPyCxzFe5BfBAVszgTkqh9UWOZVlrW9ZPQJAXXbi9Ta3cEGFPdUSquTk1UDMNZuzea&c=AUB%20Bank&c=Bahrain&c=Sayed%20Hussain&c=E482322&c=Sayed.Hussain%40Honeywell.com&c=KSA-EBI-META&c=&c="C:\Program Files\ScreenConnect Client (fb4c833997b10f3b)\ScreenConnect.ClientService.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Version:
23.8.1.8686
Modules
Images
c:\program files\screenconnect client (fb4c833997b10f3b)\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
16 165
Read events
16 057
Write events
95
Delete events
13

Modification events

(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2856) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
17
Suspicious files
22
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
3924ScreenConnect.ClientSetup.exeC:\Users\admin\AppData\Local\Temp\ScreenConnect\fb4c833997b10f3b\setup.msi
MD5:
SHA256:
2316msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
2316msiexec.exeC:\Windows\Installer\1c13fd.msi
MD5:
SHA256:
1360msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIFCBB.tmpexecutable
MD5:E6BA731D8672A04447772D8F33D8BD27
SHA256:221E9D72A7B5CEB75AC11F643EBADF451FAED229B50D5BDE0301A6D8B716F656
3024iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\ScreenConnect.ClientSetup.exe.5hfutc5.partialexecutable
MD5:628F2596799B5EED516DE20A4067470C
SHA256:C8606F2B1432D18B4D11D83FD0275F5983245A5962E60DDB8D51C674FD8934C7
3024iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
3024iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\ScreenConnect.ClientSetup[1].exeexecutable
MD5:BAFF53102BAB133BC81DA53F5C4EE3D7
SHA256:8B6950E8F3D2A5B6705A10E20CFE9D1CB1FAEF27AA92E8745FA93070B153D537
3396rundll32.exeC:\Users\admin\AppData\Local\Temp\MSIFCBB.tmp-\ScreenConnect.InstallerActions.dllexecutable
MD5:295A50B2EA9E5D282E3327590791D3A3
SHA256:C43EA8E572CF49B4F4A1C810A2A01887E9E4B2D5E3A593E62CD78A8B9853CF8C
2856iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\ScreenConnect.ClientSetup.exeexecutable
MD5:628F2596799B5EED516DE20A4067470C
SHA256:C8606F2B1432D18B4D11D83FD0275F5983245A5962E60DDB8D51C674FD8934C7
3024iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:B9D4554DE466A9C0392B4E7A2C1A1D62
SHA256:E97B6DE38D23A65E56BA6CCAD5BD5E9CBCA66A87D8E35A6713E9F821D2C90ED9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
16
DNS requests
6
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3024
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
unknown
binary
471 b
unknown
3024
iexplore.exe
GET
200
67.27.157.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?be0537bbbaca182f
unknown
compressed
4.66 Kb
unknown
1080
svchost.exe
GET
304
67.27.157.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5c94acfb5b892539
unknown
unknown
3024
iexplore.exe
GET
200
67.27.157.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?0e152650b56312b4
unknown
compressed
4.66 Kb
unknown
1080
svchost.exe
GET
200
67.27.157.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?68f52e492152febd
unknown
compressed
61.6 Kb
unknown
2856
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3024
iexplore.exe
20.72.175.38:443
secureconnect.honeywellcloud.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
3024
iexplore.exe
67.27.157.126:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3024
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1080
svchost.exe
67.27.157.126:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
3172
ScreenConnect.ClientService.exe
52.190.37.34:443
screlay.honeywellcloud.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2856
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
secureconnect.honeywellcloud.com
  • 20.72.175.38
unknown
ctldl.windowsupdate.com
  • 67.27.157.126
  • 67.27.159.126
  • 8.248.131.254
  • 67.26.83.254
  • 67.27.159.254
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
screlay.honeywellcloud.com
  • 52.190.37.34
unknown
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

PID
Process
Class
Message
3172
ScreenConnect.ClientService.exe
Misc activity
ET INFO ScreenConnect/ConnectWise Initial Checkin Packet M2
3172
ScreenConnect.ClientService.exe
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] ScreenConnect Server Response
No debug info