Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\bcryptprimitives.pdb.1.5 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD36000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186ED792000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED385000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbi.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\netapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD30000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ObjectsE.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exet.pdbui source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\samlib.pdbbb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED36E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDF5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB9B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED385000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\rasadhlp.pdblb8 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB85000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbgh source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdbbX source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WinTypes.pdblse] source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE839000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDE6B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\TextInputFramework.pdb\* source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\CoreUIComponents.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB77000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD2A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDB1B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\cryptbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED39B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED362000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\WindowManagementAPI.pdb\* source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB73000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB6B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED35C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEDE3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE208000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbx source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE37F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDD52000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186ED792000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gr32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEDE3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD2A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED395000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC97000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB85000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE7CE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED395000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED39B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB60000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE323000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exec.pdb* source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED35C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDB81000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDABE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE401000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-868841125.exentdll.pdbA source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3F5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE94B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dhcpcsvc6.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA74000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exex.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED356000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbbg source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB83000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB9B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED38F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE1D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: _samlib.pdbll\samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\kernel32.pdbh source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD3C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED356000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: prox.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE94B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: fastprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA7A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEEA7000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2209202970.00000186EC850000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA74000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC97000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE407000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: win32u.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE17000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA7A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE11000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DRV\winspool.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEE3D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nt.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE0E1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED350000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDE6B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB73000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fastprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\TextInputFramework.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE8F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB89000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB95000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\rasadhlp.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb3~ source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UxTheme.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDDAD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE40D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA6E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE37F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFB5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE1D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE839000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\JSAMSIProvider64.pdb.pdbP source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB83000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE208000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbs.dat source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3F5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UxTheme.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDDAD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED350000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WinTypes.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB54000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD24000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: win32u.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE17000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdb;V source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE0B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE2C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE8F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EED86000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE895000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EED86000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB95000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\devobj.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD30000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE07C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdbll source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdbl\gdiplus.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InternalTlsAllocDataxesExprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED374000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE774000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: msvcp_win.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\InputHost.pdbe.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbP source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED36E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdbb.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFBB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDBDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb64.dll( source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED374000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE40D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDD52000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD24000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE407000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB54000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE774000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\powrprof.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exelib.pdb* source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: <;top\symbols\dll\samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE401000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-868841125.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\JSAMSIProvider64.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SleepExen-868841125.exellnt.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE2C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbidb8 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE07C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\MMDevAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA14000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NtDelayExecutionnkexegdiplus.pdb: source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exepdb.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB89000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE0E1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE895000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD3C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\netutils.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED362000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\propsys.pdbb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE11000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-868841125.pdbm source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB7F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEE3D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED38F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\iphlpapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdbx source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $.0x140D5D2E2841125.exeObjectsE.pdb? source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE323000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB7F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFB5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDF5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-868841125.pdbF source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-868841125.exesExgr32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD36000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDBDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\InputHost.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFBB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb.pdbb` source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\comctl32.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDCF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE0B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB77000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDABE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB71000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB60000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA14000.00000004.00000020.00020000.00000000.sdmp |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0 |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0 |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: svchost.exe, 00000006.00000002.3279821933.0000020E27200000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/ |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567 |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg |
Source: qmgr.db.6.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe |
Source: edb.log.6.dr | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://proxy.contoso.com:3128/ |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01http://www.webrtc.org/exper |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-time |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-timeurn:3gpp:video-orientationhttp://www.we |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/color-space |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00 |
Source: getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/inband-cn |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/playout-delay |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/transport-wide-cc-02 |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-content-type |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-frame-tracking-id |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-layers-allocation00 |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-timing |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EA6D1000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.g |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.ge |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.getsa |
Source: getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.getsc |
Source: getscreen-868841125.exe, 00000005.00000002.2214333049.000002C3402D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscre |
Source: getscreen-868841125.exe, 00000003.00000003.2250765934.0000011749DD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/r |
Source: getscreen-868841125.exe, 00000005.00000003.2213515795.000002C340339000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/privacy-policy/ |
Source: getscreen-868841125.exe, 00000005.00000002.2213882113.000000D6604F5000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/te |
Source: getscreen-868841125.exe, 00000005.00000003.2213515795.000002C340339000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/terms-of-use/ |
Source: getscreen-868841125.exe, 00000003.00000003.2273783273.0000011749E0F000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2273360244.0000011749DDF000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2242383051.0000011749E2E000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2250765934.0000011749DD5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/user-guides/agent/ |
Source: edb.log.6.dr | String found in binary or memory: https://g.live.com/odclientsettings/Prod/C: |
Source: svchost.exe, 00000006.00000003.2063230865.0000020E27020000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C: |
Source: qmgr.db.6.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C: |
Source: getscreen-868841125.exe, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mfwmaaec.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: audioses.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: windows.ui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: windowmanagementapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: symsrv.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: directmanipulation.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: icm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: uiautomationcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: seclogon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-868841125.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\bcryptprimitives.pdb.1.5 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD36000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186ED792000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED385000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbi.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\netapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD30000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ObjectsE.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exet.pdbui source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\samlib.pdbbb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED36E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDF5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB9B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED385000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\rasadhlp.pdblb8 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB85000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbgh source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdbbX source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WinTypes.pdblse] source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE839000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDE6B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\TextInputFramework.pdb\* source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\CoreUIComponents.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB77000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD2A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDB1B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\cryptbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED39B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED362000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\WindowManagementAPI.pdb\* source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB73000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB6B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED35C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEDE3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE208000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbx source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE37F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDD52000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186ED792000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gr32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEDE3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD2A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED395000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC97000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB85000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE7CE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED395000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED39B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB60000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE323000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exec.pdb* source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED35C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDB81000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDABE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE401000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-868841125.exentdll.pdbA source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3F5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE94B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dhcpcsvc6.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA74000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exex.pdbdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED356000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbbg source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB83000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB9B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED38F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE1D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: _samlib.pdbll\samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\kernel32.pdbh source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD3C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED356000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: prox.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE94B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: fastprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA7A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEEA7000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2209202970.00000186EC850000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA74000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDC97000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE407000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: win32u.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE17000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA7A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE11000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DRV\winspool.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEE3D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nt.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE0E1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED350000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDE6B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB73000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fastprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\TextInputFramework.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE8F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB89000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB95000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\rasadhlp.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb3~ source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UxTheme.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDDAD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE40D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA6E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE37F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFB5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE1D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE839000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\JSAMSIProvider64.pdb.pdbP source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB83000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE208000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbs.dat source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE3F5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UxTheme.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDDAD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED350000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WinTypes.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB54000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD24000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: win32u.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE17000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdb;V source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE0B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE2C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE8F0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EED86000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE895000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EED86000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB95000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\devobj.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD30000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE07C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdbll source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdbl\gdiplus.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InternalTlsAllocDataxesExprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED374000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE774000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: msvcp_win.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\InputHost.pdbe.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbP source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED36E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdbb.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFBB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDBDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb64.dll( source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED374000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE40D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDD52000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD24000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE407000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB54000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE774000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\powrprof.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exelib.pdb* source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: <;top\symbols\dll\samlib.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE401000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-868841125.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\JSAMSIProvider64.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SleepExen-868841125.exellnt.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE2C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbidb8 source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E92DD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE07C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\MMDevAPI.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA14000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NtDelayExecutionnkexegdiplus.pdb: source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-868841125.exepdb.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB89000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE0E1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EE895000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD3C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\netutils.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED362000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\propsys.pdbb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE11000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-868841125.pdbm source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB7F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEE3D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb source: getscreen-868841125.exe, 00000000.00000002.2210368690.00000186ED38F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\iphlpapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdbx source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $.0x140D5D2E2841125.exeObjectsE.pdb? source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EE323000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB3C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEB7F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFB5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDF5A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-868841125.pdbF source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-868841125.exesExgr32.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAD36000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDBDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\InputHost.pdb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDFBB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb.pdbb` source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\comctl32.pdbb source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDCF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EAE0B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb0 source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB77000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb source: getscreen-868841125.exe, 00000000.00000002.2212293801.00000186EDABE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB71000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb source: getscreen-868841125.exe, 00000000.00000002.2209202970.00000186ECB60000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb source: getscreen-868841125.exe, 00000000.00000002.2218439491.00000186EEA14000.00000004.00000020.00020000.00000000.sdmp |
Source: getscreen-868841125.exe, 00000000.00000002.2208281319.00000186EB222000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $VMware Virtual RAM |
Source: getscreen-868841125.exe, 00000000.00000002.2222254253.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2035425266.00007FF6EAB6C000.00000040.00000001.01000000.00000004.sdmp, getscreen-868841125.exe, 00000003.00000002.2285311262.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp, getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE9FC000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Hyper-V console (use port 2179, disable negotiation) |
Source: getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMnet |
Source: getscreen-868841125.exe, 00000000.00000002.2206756933.0000003145CF0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: {"token":"","uid":"2ED92742-89DC-DD72-92E8-869FA5A66493","turbo":"2048781730715455VtYxoHeAjUwFOXcsQB7u","turbo_old":"","invite":"","brand":"","install":false,"admin":true,"isadmin":true,"onetime":true,"file_download":true,"name":"494126","nonadmin":true,"islock":false,"blackscreen_available":true,"hibernate":true,"power_supply":true,"silent":false,"start_time":1730885756,"os":"win","rdp":false,"os_user":"user","os_username":"","build":228,"version":"3.1.5","hardware":"{\"CPU\":\"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\",\"CPUSpeed\":2000,\"CPUCores\":4,\"CPUCoresLogical\":1,\"CPUFamily\":\"Intel64 Family 6 Model 143 Stepping 8\",\"BIOS\":\"69FSTA1H7L\",\"BIOSVersion\":\"20221121\",\"BIOSDate\":\"\",\"RAMPhys\":8191,\"RAMPhysAvail\":2223,\"RAMVirt\":134217727,\"RAMVirtAvail\":134213405,\"RAMPageFile\":8191,\"RAMBanks\":[{\"Bank\":\"RAM slot #0\",\"Locator\":\"RAM slot #0\",\"DataWidth\":64,\"Manufacturer\":\"VMware Virtual RAM\",\"PartNumber\":\"VMW-4096MB\",\"SerialNumber\":\"00000001\",\"Capacity\":4096}], |
Source: getscreen-868841125.exe, 00000000.00000002.2206756933.0000003145CF0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: {"CPU":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","CPUSpeed":2000,"CPUCores":4,"CPUCoresLogical":1,"CPUFamily":"Intel64 Family 6 Model 143 Stepping 8","BIOS":"69FSTA1H7L","BIOSVersion":"20221121","BIOSDate":"","RAMPhys":8191,"RAMPhysAvail":2223,"RAMVirt":134217727,"RAMVirtAvail":134213405,"RAMPageFile":8191,"RAMBanks":[{"Bank":"RAM slot #0","Locator":"RAM slot #0","DataWidth":64,"Manufacturer":"VMware Virtual RAM","PartNumber":"VMW-4096MB","SerialNumber":"00000001","Capacity":4096}],"VideoName":"SOAHXM4H","VideoRAM":1024,"VideoCards":[{"Name":"SOAHXM4H","RAM":1024,"Integrated":false}],"Locale":"0809","LocaleOemPage":"1252","LocaleCountry":"Switzerland","LocaleCurrency":"CHF","LocaleTimezone":120,"LocaleFormatTime":"HH:mm:ss","LocaleFormatDate":"dd\/MM\/yyyy","ComputerModel":"9WKEwVnO","ComputerDomain":"FF2Ov","ComputerWorkgroup":"WORKGROUP","ComputerName":"user-PC","ComputerIP":["192.168.2.5","fe80::357a:d50d:a849:be2d"],"OSName":"Microsoft Windows 10 Pro","OSVersion":"10.0.19045","HDD":[{"Model":"W6FMLTP2 SC |
Source: getscreen-868841125.exe, 00000005.00000002.2215086204.00007FF6EE561000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: WebRTC-AllowMACBasedIPv6WebRTC-BindUsingInterfaceNameVMnetWebRTC-UseDifferentiatedCellularCostsWebRTC-AddNetworkCostToVpnNet[:id= |
Source: getscreen-868841125.exe, 00000000.00000002.2206756933.0000003145CF0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: RAM slot #0RAM slot #0@VMware Virtual RAMVMW-4096MB00000001 |
Source: getscreen-868841125.exe, 00000003.00000002.2279699658.00000117474DC000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000002.2278658945.00000117457B1000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2274781623.00000117474D7000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2243719639.00000117474CC000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3279938006.0000020E27259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3278526536.0000020E21C2B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: getscreen-868841125.exe, 00000000.00000002.2206756933.0000003145CF0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: VMware Virtual RAM |
Source: cuvzruqaiugsbcrywmwtwnufwuzsdlu-elevate.exe, 00000002.00000002.2033175765.000001D87D4A1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK |
Source: getscreen-868841125.exe, 00000000.00000002.2207050295.00000186E9264000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000005.00000003.2212512849.000002C340325000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: getscreen-868841125.exe, 00000000.00000002.2207812229.00000186EADDA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: {"token":"","uid":"2ED92742-89DC-DD72-92E8-869FA5A66493","turbo":"2048781730715455VtYxoHeAjUwFOXcsQB7u","turbo_old":"","invite":"","brand":"","install":false,"admin":true,"isadmin":true,"onetime":true,"file_download":true,"name":"494126","nonadmin":true,"islock":false,"blackscreen_available":true,"hibernate":true,"power_supply":true,"silent":false,"start_time":1730885756,"os":"win","rdp":false,"os_user":"user","os_username":"","build":228,"version":"3.1.5","hardware":"{\"CPU\":\"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\",\"CPUSpeed\":2000,\"CPUCores\":4,\"CPUCoresLogical\":1,\"CPUFamily\":\"Intel64 Family 6 Model 143 Stepping 8\",\"BIOS\":\"69FSTA1H7L\",\"BIOSVersion\":\"20221121\",\"BIOSDate\":\"\",\"RAMPhys\":8191,\"RAMPhysAvail\":2223,\"RAMVirt\":134217727,\"RAMVirtAvail\":134213405,\"RAMPageFile\":8191,\"RAMBanks\":[{\"Bank\":\"RAM slot #0\",\"Locator\":\"RAM slot #0\",\"DataWidth\":64,\"Manufacturer\":\"VMware Virtual RAM\",\"PartNumber\":\"VMW-4096MB\",\"SerialNumber\":\"00000001\",\"Capacity\":4096}],\"VideoName\":\"SOAHXM4H\",\"VideoRAM\":1024,\"VideoCards\":[{\"Name\":\"SOAHXM4H\",\"RAM\":1024,\"Integrated\":false}],\"Locale\":\"0809\",\"LocaleOemPage\":\"1252\",\"LocaleCountry\":\"Switzerland\",\"LocaleCurrency\":\"CHF\",\"LocaleTimezone\":120,\"LocaleFormatTime\":\"HH:mm:ss\",\"LocaleFormatDate\":\"dd\\\/MM\\\/yyyy\",\"ComputerModel\":\"9WKEwVnO\",\"ComputerDomain\":\"FF2Ov\",\"ComputerWorkgroup\":\"WORKGROUP\",\"ComputerName\":\"user-PC\",\"ComputerIP\":[\"192.168.2.5\",\"fe80::357a:d50d:a849:be2d\"],\"OSName\":\"Microsoft Windows 10 Pro\",\"OSVersion\":\"10.0.19045\",\"HDD\":[{\"Model\":\"W6FMLTP2 SCSI Disk Device\",\"Size\":393199}],\"LogicalDisks\":[{\"Disk\":\"C:\",\"Name\":\"\",\"FileSystem\":\"NTFS\",\"Size\":213143,\"FreeSpace\":19244}],\"SoundDevices\":[],\"NetAdapters\":[{\"Name\":\"Intel(R) 82574L Gigabit Network Connection\",\"Manufacturer\":\"Intel Corporation\",\"MACAddress\":\"EC:F4:BB:57:0D:C9\",\"Speed\":953,\"Addresses\":\"192.168.2.5, fe80::357a:d50d:a849:be2d\",\"DNS\":\"1.1.1.1\",\"DCHP\":\"\",\"Cable\":true,\"WoL\":false}],\"Monitors\":[]}"} |
Source: getscreen-868841125.exe, 00000003.00000002.2279699658.00000117474DC000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2274781623.00000117474D7000.00000004.00000020.00020000.00000000.sdmp, getscreen-868841125.exe, 00000003.00000003.2243719639.00000117474CC000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW`?G |