File name:

ScreenConnect.WindowsClient.zip.zip

Full analysis: https://app.any.run/tasks/83ecc606-27af-419b-9d50-33a1abec6cda
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: June 16, 2025, 16:53:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
arch-exec
screenconnect
remote
rat
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

6D66E7D0A26D47DAD118EB8B52B1C8E0

SHA1:

8A4B6AC3B671CF66F1FB9679DA2E65BC1E99B0DB

SHA256:

BD8EE5A9E32FC935EF6F938596D1DDF49729407CCF6F29915B7C10275BB36AEE

SSDEEP:

6144:pl+fgc7HrMhzSjDABWFUqHgoK2KQzQqdzw:ufgcrrUS/AsHfK2KQzQYs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6640)
    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 6900)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6640)
      • WinRAR.exe (PID: 4888)
      • dfsvc.exe (PID: 5264)
    • Application launched itself

      • WinRAR.exe (PID: 6640)
      • WinRAR.exe (PID: 2348)
    • Adds/modifies Windows certificates

      • ScreenConnect.Client.exe (PID: 3672)
      • dfsvc.exe (PID: 5264)
    • Reads Internet Explorer settings

      • dfsvc.exe (PID: 5264)
    • The process creates files with name similar to system file names

      • dfsvc.exe (PID: 5264)
    • Executes as Windows Service

      • ScreenConnect.ClientService.exe (PID: 6900)
    • Potential Corporate Privacy Violation

      • ScreenConnect.ClientService.exe (PID: 6900)
    • There is functionality for taking screenshot (YARA)

      • ScreenConnect.ClientService.exe (PID: 6900)
      • ScreenConnect.WindowsClient.exe (PID: 6256)
    • Detects ScreenConnect RAT (YARA)

      • ScreenConnect.WindowsClient.exe (PID: 6256)
      • ScreenConnect.ClientService.exe (PID: 6900)
    • Executable content was dropped or overwritten

      • dfsvc.exe (PID: 5264)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4888)
      • WinRAR.exe (PID: 5924)
    • Reads the machine GUID from the registry

      • ScreenConnect.Client.exe (PID: 3672)
      • dfsvc.exe (PID: 5264)
    • Reads the computer name

      • ScreenConnect.Client.exe (PID: 3672)
      • dfsvc.exe (PID: 5264)
    • Creates files or folders in the user directory

      • dfsvc.exe (PID: 5264)
    • Reads Environment values

      • dfsvc.exe (PID: 5264)
    • Checks supported languages

      • ScreenConnect.Client.exe (PID: 3672)
      • dfsvc.exe (PID: 5264)
    • Create files in a temporary directory

      • dfsvc.exe (PID: 5264)
    • Process checks whether UAC notifications are on

      • dfsvc.exe (PID: 5264)
    • Disables trace logs

      • dfsvc.exe (PID: 5264)
    • Reads the software policy settings

      • dfsvc.exe (PID: 5264)
    • Checks proxy server information

      • dfsvc.exe (PID: 5264)
    • Manual execution by a user

      • notepad++.exe (PID: 7140)
      • notepad++.exe (PID: 3720)
      • WinRAR.exe (PID: 2348)
      • notepad++.exe (PID: 1852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:06:16 16:49:24
ZipCRC: 0x7a8dde57
ZipCompressedSize: 187252
ZipUncompressedSize: 187703
ZipFileName: ScreenConnect.WindowsClient.zip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
167
Monitored processes
19
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe screenconnect.client.exe no specs dfsvc.exe slui.exe rundll32.exe no specs openwith.exe no specs notepad++.exe notepad++.exe winrar.exe no specs winrar.exe screenconnect.client.exe no specs screenconnect.windowsclient.exe no specs screenconnect.clientservice.exe #SCREENCONNECT screenconnect.clientservice.exe #SCREENCONNECT screenconnect.windowsclient.exe no specs screenconnect.windowsclient.exe no specs openwith.exe no specs notepad++.exe

Process information

PID
CMD
Path
Indicators
Parent process
1096C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1100"C:\Users\admin\AppData\Local\Apps\2.0\6BEO61BJ.MM5\JBD92BAK.3A1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\ScreenConnect.WindowsClient.exe" "RunRole" "534ab0f6-3b9d-4abd-8f3e-6fc7fe756fbf" "System"C:\Users\admin\AppData\Local\Apps\2.0\6BEO61BJ.MM5\JBD92BAK.3A1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
SYSTEM
Company:
ScreenConnect Software
Integrity Level:
SYSTEM
Description:
ScreenConnect Client
Exit code:
0
Version:
25.4.16.9293
Modules
Images
c:\users\admin\appdata\local\apps\2.0\6beo61bj.mm5\jbd92bak.3a1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1380C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1852"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\AppData\Local\Apps\2.0\6BEO61BJ.MM5\JBD92BAK.3A1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\user.config"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.3636_none_60b6a03d71f818d5\comctl32.dll
2280"C:\Users\admin\AppData\Local\Apps\2.0\6BEO61BJ.MM5\JBD92BAK.3A1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-evqb7y-relay.screenconnect.com&p=443&s=19476b13-4a6a-4ae5-8999-1afab9442bdc&k=BgIAAACkAABSU0ExAAgAAAEAAQBxdUfHVEZUJ7C89etXoBeqypR71qv3Ak6dhvW6w7Jk%2fRnkvP96ZXVmK73OMPsqdX%2b%2bqpANYLOTnlqwRB2Qu9gTBJWtp0q2sKGq7bEPkjVti0REA2RjU3X6DuATU9LkgyBqCYE8TiADaODaw37ZJ%2bA1cYStHXtoqwiCLbY5zPRhNLy8xA7pbmouWHAlcDm4I9HMfOTVMwpSyXCN%2fD%2bzAFCtmLCqI%2bHmptRS4T0d5XqucKFozMjE%2fUuTljPCfSvJgMDYN8XeaggGKdX6KY%2bUJhR%2bEwjYoBD%2bdV7CGUlwt%2fFggvlhyjLI%2bGAL%2bpKSV8pr5JiJ2tNK4pk1FExHuU8%2fd67G&r=&i=HelpDesk" "1"C:\Users\admin\AppData\Local\Apps\2.0\6BEO61BJ.MM5\JBD92BAK.3A1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\ScreenConnect.ClientService.exe
ScreenConnect.WindowsClient.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
25.4.16.9293
Modules
Images
c:\users\admin\appdata\local\apps\2.0\6beo61bj.mm5\jbd92bak.3a1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
2348"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\ScreenConnect.WindowsClient.zip.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3112C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3672"C:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\ScreenConnect.Client.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\ScreenConnect.Client.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4888.17415\screenconnect.client.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
3720"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\AppData\Local\Apps\2.0\6BEO61BJ.MM5\JBD92BAK.3A1\scre..tion_8fbb309794d2792f_0019.0004_73ec9ae9ac9c9b33\ScreenConnect.WindowsClient.exe.config"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.3636_none_60b6a03d71f818d5\comctl32.dll
4888"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa6640.15132\ScreenConnect.WindowsClient.zipC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
22 371
Read events
22 078
Write events
246
Delete events
47

Modification events

(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\ScreenConnect.WindowsClient.zip.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4888) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4888) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
Executable files
18
Suspicious files
30
Text files
40
Unknown types
5

Dropped files

PID
Process
Filename
Type
4888WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\ScreenConnect.Client.exeexecutable
MD5:BAE2933497C5E6E754F902DE82A43E77
SHA256:2ACFAEEF1A3378264B2EE4C3EBD88E146F67D9B42F11AEC6F0ADF025B6B76462
4888WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\Client.Override.resourcesbinary
MD5:CD7DBC7ABEDA9893CE25793744443958
SHA256:E13ED2C59366D0EEA74863FD71A81F0CB977CCE1EDFDE304FC538690A4F6AC89
4888WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\Client.resourcesbinary
MD5:AF3340A5BCFE20E75ED0211DA310D83B
SHA256:E0D0E5D951EF955F22D110B65B3FEDFB8B1710491563D7C541F5E3D9FD4CCEE8
4888WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\ApplicationURL.txtbinary
MD5:33FC39BEABC1B85391A7A6246239E1DC
SHA256:6C74579B4C3BF78818EE1962224DDEB0116127633E5CB80137056FA6422A0146
4888WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\Client.en-US.resourcesbinary
MD5:9FC69F433805D115364F7FDDEAE45878
SHA256:E543AF67C169C0165E594A822420685D619133D9FB94D87392BD04C9B4663DEF
6640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa6640.15132\ScreenConnect.WindowsClient.zipcompressed
MD5:7AA83FA8C81157F395B35DF16CD1061D
SHA256:3268F53FE4CEFEFF53D24E75E55F2A131C09620AF60F08005CCE3C1A8B8C2644
5264dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\PBGEC0AE.XPD\GJ9B95ZN.LTP\ScreenConnect.WindowsClient.exe.manifestxml
MD5:1398764A2195B619A3620C78FF3AC911
SHA256:853FC0E2AD32DDB49A32D021879BB5807778188DE0DBB7F56CC9D9586B24DD94
4888WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa4888.17415\Client.Override.en-US.resourcesbinary
MD5:0942FA8F68D68B1410191D77A001FA91
SHA256:8914BEA7707C4B27B8C27B1F203565799612E2B14150B1524229EA88F5DF78CA
5264dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBder
MD5:ED24CBD1E7F836E054BE6AD1EBF32F70
SHA256:600F6B2FAEE392E74CB5252C6DB0D4541321805E5C597F755D462D176680CC28
5264dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_64A201640BD8E31E72E33FB1EBF9962Dder
MD5:7B7FF74A1B7C454CA3C0C019142492C1
SHA256:4CA84D8F99D59B43B4B0C552A9C228F4CB6481CDC9AFC2398D19C601307E3107
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
38
DNS requests
25
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
32
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
4168
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7120
SIHClient.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5264
dfsvc.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
5264
dfsvc.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEA3HrFcF%2FyGZLkBDIgw6SYY%3D
unknown
whitelisted
7120
SIHClient.exe
GET
200
104.85.1.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5264
dfsvc.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRbuhDibVrw1t5r3WYz1C9Jl6I%2FtwQU729TSunkBnx6yuKQVvYv1Ensy04CEAqA7xhLjfEFgtHEdqeVdGg%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4680
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4168
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4168
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.14
  • 20.190.160.67
  • 20.190.160.132
  • 40.126.32.136
  • 20.190.160.131
  • 40.126.32.138
  • 20.190.160.130
  • 40.126.31.3
  • 40.126.31.69
  • 20.190.159.128
  • 40.126.31.1
  • 40.126.31.73
  • 20.190.159.129
  • 20.190.159.130
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 104.85.1.163
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
sbm.screenconnect.com
  • 147.28.146.46
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Misc activity
ET REMOTE_ACCESS Observed DNS Query to Known ScreenConnect/ConnectWise Remote Desktop Service Domain
2200
svchost.exe
Misc activity
ET REMOTE_ACCESS Observed DNS Query to Known ScreenConnect/ConnectWise Remote Desktop Service Domain
2200
svchost.exe
Misc activity
ET REMOTE_ACCESS Observed DNS Query to Known ScreenConnect/ConnectWise Remote Desktop Service Domain
6900
ScreenConnect.ClientService.exe
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] ScreenConnect Server Response
Process
Message
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741772 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\win32\isoreg_direct.cpp, line 1127
dfsvc.exe
*** Status originated: -1073741772 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\win32\isoreg_direct.cpp, line 1127
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
dfsvc.exe
*** Status originated: -1073741811 *** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230