URL:

https://www.google.com/url?q=https://www.canva.com/design/DAGl-D6ZT_k/skFDL9NkJ50V1wJk-R4Jcg/view?utm_content%3DDAGl-D6ZT_k%26utm_campaign%3Ddesignshare%26utm_medium%3Dlink2%26utm_source%3Duniquelinks%26utlId%3Dhdbe2770070&sa=D&source=apps-viewer-frontend&ust=1745973133886367&usg=AOvVaw3Pbr9dxxXicuTtUFCprUY4&hl=en

Full analysis: https://app.any.run/tasks/2b1eda39-f0fb-41d6-b7de-516265c8a5f1
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 29, 2025, 13:40:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
possible-phishing
connectwise
rmm-tool
screenconnect
remote
rat
Indicators:
MD5:

258AB28FCAFE74ADAEB2576491A5E9A7

SHA1:

B9BBC0A9A150842C1B580B736E7E739EB1E0C5A1

SHA256:

F53FDF7A9E8EAD0A72117E0A918CDB42FB74FF6A38892FDDFFE7738EA1D3BA52

SSDEEP:

6:2OLI21GLNLGV4M2Xdr1s8mXGN/bSNE4CWVLO0RuhDWKQdlUEsDRlGrSUjr:2V2Hz2Xdi8mWNjSNE4AMuNWLdyn6v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 3676)
  • SUSPICIOUS

    • Possible Social Engineering Attempted

      • msedge.exe (PID: 672)
    • Reads the Internet Settings

      • Request for Proposal (RFP).exe (PID: 2924)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
    • Reads security settings of Internet Explorer

      • Request for Proposal (RFP).exe (PID: 2924)
      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.WindowsClient.exe (PID: 1168)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
    • Uses RUNDLL32.EXE to load library

      • msiexec.exe (PID: 4040)
      • msiexec.exe (PID: 2820)
      • msiexec.exe (PID: 3824)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 3844)
      • rundll32.exe (PID: 1032)
      • rundll32.exe (PID: 2352)
    • Executes as Windows Service

      • ScreenConnect.ClientService.exe (PID: 3676)
      • VSSVC.exe (PID: 1608)
    • Screenconnect has been detected

      • msiexec.exe (PID: 3372)
      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.ClientService.exe (PID: 3676)
    • Application launched itself

      • msiexec.exe (PID: 3372)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 3372)
    • SCREENCONNECT mutex has been found

      • ScreenConnect.ClientService.exe (PID: 3676)
    • Creates or modifies Windows services

      • ScreenConnect.ClientService.exe (PID: 3676)
    • Potential Corporate Privacy Violation

      • ScreenConnect.ClientService.exe (PID: 3676)
    • Detects ScreenConnect RAT (YARA)

      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
    • Connects to unusual port

      • ScreenConnect.ClientService.exe (PID: 3676)
    • There is functionality for taking screenshot (YARA)

      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
  • INFO

    • Executable content was dropped or overwritten

      • msedge.exe (PID: 672)
      • msedge.exe (PID: 2452)
      • msiexec.exe (PID: 3788)
      • msiexec.exe (PID: 3372)
      • msiexec.exe (PID: 2096)
      • msiexec.exe (PID: 3336)
    • Reads the computer name

      • Request for Proposal (RFP).exe (PID: 2924)
      • msiexec.exe (PID: 4040)
      • msiexec.exe (PID: 3376)
      • msiexec.exe (PID: 1892)
      • msiexec.exe (PID: 3372)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.WindowsClient.exe (PID: 1168)
    • Checks supported languages

      • Request for Proposal (RFP).exe (PID: 2924)
      • msiexec.exe (PID: 4040)
      • msiexec.exe (PID: 3376)
      • msiexec.exe (PID: 1892)
      • ScreenConnect.ClientService.exe (PID: 3676)
      • msiexec.exe (PID: 3372)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
      • ScreenConnect.WindowsClient.exe (PID: 1168)
    • Reads the machine GUID from the registry

      • Request for Proposal (RFP).exe (PID: 2924)
      • msiexec.exe (PID: 3372)
      • msiexec.exe (PID: 4040)
      • msiexec.exe (PID: 3376)
      • msiexec.exe (PID: 1892)
      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
      • ScreenConnect.WindowsClient.exe (PID: 1168)
    • Application launched itself

      • msedge.exe (PID: 2452)
    • Create files in a temporary directory

      • Request for Proposal (RFP).exe (PID: 2924)
      • rundll32.exe (PID: 3844)
      • msiexec.exe (PID: 3372)
    • CONNECTWISE has been detected

      • msiexec.exe (PID: 3788)
      • msiexec.exe (PID: 3372)
      • ScreenConnect.WindowsClient.exe (PID: 3836)
      • ScreenConnect.ClientService.exe (PID: 3676)
      • ScreenConnect.WindowsClient.exe (PID: 1168)
    • SCREENCONNECT has been detected

      • msiexec.exe (PID: 3372)
      • ScreenConnect.ClientService.exe (PID: 3676)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3372)
    • Manual execution by a user

      • Request for Proposal (RFP).exe (PID: 1564)
      • explorer.exe (PID: 3164)
      • Request for Proposal (RFP).exe (PID: 3500)
      • Request for Proposal (RFP).exe (PID: 3332)
      • Request for Proposal (RFP).exe (PID: 2536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
46
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs request for proposal (rfp).exe no specs request for proposal (rfp).exe msiexec.exe msiexec.exe msiexec.exe no specs rundll32.exe vssvc.exe no specs msedge.exe no specs msedge.exe no specs msiexec.exe no specs msiexec.exe no specs #SCREENCONNECT screenconnect.clientservice.exe #SCREENCONNECT screenconnect.windowsclient.exe no specs screenconnect.windowsclient.exe no specs explorer.exe no specs request for proposal (rfp).exe no specs request for proposal (rfp).exe msiexec.exe msiexec.exe no specs rundll32.exe msiexec.exe no specs request for proposal (rfp).exe no specs request for proposal (rfp).exe msiexec.exe msiexec.exe no specs rundll32.exe msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1396 --field-trial-handle=1304,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
984"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3248 --field-trial-handle=1304,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1032rundll32.exe "C:\Users\admin\AppData\Local\Temp\MSIF71D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1636171 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsC:\Windows\System32\rundll32.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1168"C:\Program Files\ScreenConnect Client (b35f61150dce71c0)\ScreenConnect.WindowsClient.exe" "RunRole" "0efec824-27d4-4eb9-9b3e-e030ebae2872" "System"C:\Program Files\ScreenConnect Client (b35f61150dce71c0)\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
SYSTEM
Company:
ScreenConnect Software
Integrity Level:
SYSTEM
Description:
ScreenConnect Client
Exit code:
0
Version:
24.3.7.9067
Modules
Images
c:\program files\screenconnect client (b35f61150dce71c0)\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1284C:\Windows\system32\MsiExec.exe -Embedding 81C1165E1524B2E9D47D5232C7714900C:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1372"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1304,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1564"C:\Users\admin\Downloads\Request for Proposal (RFP).exe" C:\Users\admin\Downloads\Request for Proposal (RFP).exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\request for proposal (rfp).exe
c:\windows\system32\ntdll.dll
1608C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1784"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1644 --field-trial-handle=1304,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1800"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1288 --field-trial-handle=1304,i,11055911708876039895,7097607087486091142,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
17 037
Read events
16 633
Write events
346
Delete events
58

Modification events

(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2452) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
77B2573B81922F00
(PID) Process:(2452) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
(PID) Process:(2452) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
Executable files
40
Suspicious files
136
Text files
39
Unknown types
2

Dropped files

PID
Process
Filename
Type
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF182e3f.TMP
MD5:
SHA256:
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF182e7d.TMP
MD5:
SHA256:
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF1830a0.TMP
MD5:
SHA256:
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
2692msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pmabinary
MD5:886E82F2CA62ECCCE64601B30592078A
SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Platform Notifications\LOG.old~RF183246.TMPtext
MD5:2EC139710F1BF406CD11DCEF20BF6FD1
SHA256:524DE59920694F2D54BC9D21C08AA2403019C7674A1368FCF7CFA153E7A2E3E6
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old~RF182e1f.TMPtext
MD5:CE86C8F851C5C62FD3B245514A656CC3
SHA256:E59B71835032C5D6C65BA4BB15A1676C7287241388CBE117F3C16F601B84E3D0
2452msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Last Versiontext
MD5:61FE7896F9494DCDF53480A325F4FB85
SHA256:ACFD3CD36E0DFCF1DCB67C7F31F2A5B9BA0815528A0C604D4330DFAA9E683E51
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
33
DNS requests
31
Threats
17

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
672
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
672
msedge.exe
150.171.27.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
672
msedge.exe
216.58.206.68:443
www.google.com
GOOGLE
US
whitelisted
2452
msedge.exe
239.255.255.250:1900
whitelisted
672
msedge.exe
104.16.102.112:443
www.canva.com
CLOUDFLARENET
whitelisted
672
msedge.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
672
msedge.exe
104.16.103.112:443
www.canva.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
www.google.com
  • 216.58.206.68
whitelisted
www.canva.com
  • 104.16.102.112
  • 104.16.103.112
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
  • 104.126.37.160
  • 104.126.37.128
  • 104.126.37.163
  • 104.126.37.179
  • 104.126.37.170
  • 104.126.37.162
  • 104.126.37.178
  • 104.126.37.177
  • 104.126.37.171
whitelisted
static.canva.com
  • 104.16.103.112
  • 104.16.102.112
whitelisted
static.cloudflareinsights.com
  • 104.16.80.73
  • 104.16.79.73
whitelisted
o13855.ingest.sentry.io
  • 34.120.195.249
whitelisted
media.canva.com
  • 104.16.102.112
  • 104.16.103.112
whitelisted
font-public.canva.com
  • 104.16.102.112
  • 104.16.103.112
whitelisted

Threats

PID
Process
Class
Message
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Canva designs and to share platform (static .canva .com)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Canva designs and to share platform (static .canva .com)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Canva designs and to share platform (static .canva .com)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Canva designs and to share platform (static .canva .com)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] An application monitoring request to sentry .io
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] An application monitoring request to sentry .io
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Canva designs and to share platform (static .canva .com)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
672
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Canva designs and to share platform (static .canva .com)
No debug info