Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9976000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exelib.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8C0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF20000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD015000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exec6.pdbl source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exet.pdbpdb$ source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD02D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdb.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB729000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD83A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD81C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDF40000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFF2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdb7c source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD02D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdb_b/D9 source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFE4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE310000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oses.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDA4D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ZwWaitForMultipleObjectssExhttp.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB723000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MFWMAAEC.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE888000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDF40000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exemsvcp_win.pdb) source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE5EA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB69E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD00F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF025000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD009000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF295000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB0E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE6A9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.dllorye.pdb, source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: <;op\symbols\dll\samlib.pdbb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE81E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE36B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD840000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD015000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdbb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FECD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF295000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB723000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD834000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD810000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FECD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE7C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB698000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD009000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD82E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD822000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ZwWaitForMultipleObjectssExhttp.pdbh source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD816000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB6D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: BaseThreadInitThunkexesExypi.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEDF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbp source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD82E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF357000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF26000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exet.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6D3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdbOb?D; source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFF2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdbatu source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9976000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8D7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\gdi32full.pdbwbGD4 source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFFD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\gdi32full.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEDF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: fastprox.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF2C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF357000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD74D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF26000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD834000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEBC7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF2C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: (26FWPolicyIOMgr.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDAB2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF2EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nt.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE582000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB0E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exet.pdbuiF source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE310000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF025000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFEA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ypi.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEE62000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD003000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE4C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF20000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE81E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE456000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD027000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8C0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\FirewallAPI.pdbpdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8D7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\cryptbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdbdb?b source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE6A9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE4C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6AA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB71D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: win32u.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD822000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE767000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF238000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED9C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdblbWc'E source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF238000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFEA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB729000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE51D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: putHost.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD01B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEC7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: msvcp_win.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdbJ source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ox.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD81C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: version.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD7FF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE45C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD828000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE5EA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD01B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD840000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEE62000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB71D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEBC7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6AA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEC7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdbOS source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9976000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB6D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE36B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: BaseThreadInitThunkexelox.pdbw source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE767000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE51D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE582000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD027000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED9C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD00F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF031000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF2EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB69E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE7C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFE4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NtDelayExecution439.exellnt.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF031000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE456000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exelib.pdbbX source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD828000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: version.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD7FF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\Windows.Storage.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\msvcp_win.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exemswsock.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE45C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: orye.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD83A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $.0x1405FE40F2.dllputHost.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB717000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD816000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB698000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdbb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0 |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0 |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: svchost.exe, 00000005.00000002.2924527429.0000018C79000000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C79218000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU |
Source: edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5 |
Source: edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n |
Source: edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/ |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C79218000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567 |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C79218000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C7924D000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe |
Source: edb.log.5.dr | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://proxy.contoso.com:3128/ |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01http://www.webrtc.org/exper |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-time |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-timeurn:3gpp:video-orientationhttp://www.we |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/color-space |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00 |
Source: getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/inband-cn |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/playout-delay |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/transport-wide-cc-02 |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-content-type |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-frame-tracking-id |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-layers-allocation00 |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-timing |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF651E41000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.g |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.ge |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.getsa |
Source: getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.getsc |
Source: getscreen-524501439.exe, 00000004.00000002.1731022451.000001EA72590000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscre |
Source: getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F2188000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000003.1730276155.000001EA725EB000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000004.00000002.1731296103.000001EA725FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/privacy-policy/ |
Source: getscreen-524501439.exe, 00000004.00000002.1730505971.000000D3562F5000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/te |
Source: getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F2188000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000003.1730276155.000001EA725EB000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000004.00000002.1731296103.000001EA725FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/terms-of-use/ |
Source: getscreen-524501439.exe, 00000003.00000003.1741425324.00000224DAE73000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/user-guides/agent/ |
Source: getscreen-524501439.exe, 00000003.00000003.1743659448.00000224DADF8000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000003.00000003.1768740692.00000224DAE2D000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000003.00000003.1744174474.00000224DAE23000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/user-guides/agent/div |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C792C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6 |
Source: edb.log.5.dr | String found in binary or memory: https://g.live.com/odclientsettings/Prod.C: |
Source: edb.log.5.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2 |
Source: edb.log.5.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C: |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C792C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96 |
Source: svchost.exe, 00000005.00000003.1696828733.0000018C792C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe |
Source: edb.log.5.dr | String found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C: |
Source: getscreen-524501439.exe, 00000000.00000003.1681532461.000001E0FB6E1000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mfwmaaec.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: audioses.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.ui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windowmanagementapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: symsrv.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: seclogon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: directmanipulation.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: icm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uiautomationcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: qmgr.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsperf.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: esent.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: flightsettings.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netprofm.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: npmproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsigd.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: upnp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ssdpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: appxdeploymentclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmauto.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: miutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wsmsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dsrole.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: pcwum.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msv1_0.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntlmshared.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptdll.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rmclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: usermgrcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: execmodelproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vssapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: vsstrace.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: es.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: bitsproxy.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: mpr.dll | Jump to behavior |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9976000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exelib.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8C0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF20000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD015000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exec6.pdbl source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exet.pdbpdb$ source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD02D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdb.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB729000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD83A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD81C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDF40000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFF2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdb7c source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: usp10.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD02D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdb_b/D9 source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFE4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE310000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oses.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDA4D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ZwWaitForMultipleObjectssExhttp.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB723000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MFWMAAEC.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE888000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDF40000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exemsvcp_win.pdb) source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE5EA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB69E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD00F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF025000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD009000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF295000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB0E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE6A9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.dllorye.pdb, source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: <;op\symbols\dll\samlib.pdbb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE81E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE36B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD840000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD015000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6BC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdbb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FECD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF295000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB723000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD834000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD810000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FECD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE7C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB698000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD009000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD82E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD822000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ZwWaitForMultipleObjectssExhttp.pdbh source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD816000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB6D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: BaseThreadInitThunkexesExypi.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEDF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbp source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD82E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF357000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF26000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exet.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6D3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdbOb?D; source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mpr.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFF2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdbatu source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9976000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8D7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\gdi32full.pdbwbGD4 source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFFD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\gdi32full.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: propsys.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEDF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: fastprox.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF2C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF357000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD74D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF26000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD834000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEBC7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF2C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: (26FWPolicyIOMgr.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FDAB2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF2EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nt.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE582000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB0E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exet.pdbuiF source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE310000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF025000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFEA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ypi.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEE62000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD003000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE4C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEF20000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE81E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE456000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD027000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8C0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\FirewallAPI.pdbpdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8D7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\cryptbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdbdb?b source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FWPolicyIOMgr.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE6A9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CLBCatQ.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE4C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD021000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6AA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB71D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: win32u.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8D1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD822000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE767000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF238000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED9C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdblbWc'E source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF238000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFEA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB729000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE51D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: putHost.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD01B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEC7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: msvcp_win.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdbJ source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ox.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD81C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: version.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD7FF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE45C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD828000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6B0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE5EA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SAS.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD01B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD840000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEE62000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB71D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEBC7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6AA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WinTypes.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEC7D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdbOS source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9976000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEB6D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE36B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: BaseThreadInitThunkexelox.pdbw source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE767000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE51D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE582000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD027000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FED9C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FD00F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF031000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF2EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB69E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: devobj.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE7C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdiplus.pdb source: getscreen-524501439.exe, 00000000.00000002.1713093595.000001E0FCFE4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NtDelayExecution439.exellnt.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FF031000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE456000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume3\Users\user\Desktop\getscreen-524501439.exelib.pdbbX source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE3FB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB8A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD828000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: version.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD7FF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\Windows.Storage.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\msvcp_win.pdb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9962000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exemswsock.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.1714912988.000001E0FE45C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: orye.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD83A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $.0x1405FE40F2.dllputHost.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB717000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.1713806657.000001E0FD816000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB6C2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB698000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdbb source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb source: getscreen-524501439.exe, 00000000.00000002.1717779464.000001E0FEEC6000.00000004.00000020.00020000.00000000.sdmp |
Source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB608000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: $VMware Virtual RAM |
Source: getscreen-524501439.exe, 00000000.00000002.1719569531.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671493539.00007FF6522DC000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000003.00000002.1775411935.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0F7C000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: Hyper-V console (use port 2179, disable negotiation) |
Source: getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: VMnet |
Source: getscreen-524501439.exe, 00000000.00000002.1711329169.000001E0FB608000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Win32_PhysicalMemoryRAM slot #0RAM slot #0VMware Virtual RAMVMW-4096MB00000001 |
Source: getscreen-524501439.exe, 00000004.00000002.1731677236.00007FF7F0AE1000.00000040.00000001.01000000.00000003.sdmp | Binary or memory string: WebRTC-AllowMACBasedIPv6WebRTC-BindUsingInterfaceNameVMnetWebRTC-UseDifferentiatedCellularCostsWebRTC-AddNetworkCostToVpnNet[:id= |
Source: getscreen-524501439.exe, 00000000.00000002.1707959869.00000014831F0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: RAM slot #0RAM slot #0@VMware Virtual RAMVMW-4096MB00000001 |
Source: getscreen-524501439.exe, 00000000.00000002.1707959869.00000014831F0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: {"token":"","uid":"71434D56-1548-ED3D-AEE6-C75AECD93BF0","turbo":"2203681736138584UtEFjbrdjMX3qgoXgI9f","turbo_old":"","invite":"","brand":"","install":false,"admin":true,"isadmin":true,"onetime":true,"file_download":true,"name":"226533","nonadmin":true,"islock":false,"blackscreen_available":true,"hibernate":true,"power_supply":true,"silent":false,"start_time":1736138697,"os":"win","rdp":false,"os_user":"user","os_username":"","build":228,"version":"3.1.5","hardware":"{\"CPU\":\"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\",\"CPUSpeed\":2000,\"CPUCores\":4,\"CPUCoresLogical\":1,\"CPUFamily\":\"Intel64 Family 6 Model 143 Stepping 8\",\"BIOS\":\"MW67HU34P8\",\"BIOSVersion\":\"20221121\",\"BIOSDate\":\"\",\"RAMPhys\":8191,\"RAMPhysAvail\":2242,\"RAMVirt\":134217727,\"RAMVirtAvail\":134213408,\"RAMPageFile\":8191,\"RAMBanks\":[{\"Bank\":\"RAM slot #0\",\"Locator\":\"RAM slot #0\",\"DataWidth\":64,\"Manufacturer\":\"VMware Virtual RAM\",\"PartNumber\":\"VMW-4096MB\",\"SerialNumber\":\"00000001\",\"Capacity\":4096}],\" |
Source: getscreen-524501439.exe, 00000003.00000002.1772273057.00000224D69DB000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000003.00000003.1769504902.00000224D69DA000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000003.00000002.1771883306.00000224D6964000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2924623659.0000018C79058000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2923453260.0000018C73A2B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: getscreen-524501439.exe, 00000000.00000002.1712166440.000001E0FB6E0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: {"token":"","uid":"71434D56-1548-ED3D-AEE6-C75AECD93BF0","turbo":"2203681736138584UtEFjbrdjMX3qgoXgI9f","turbo_old":"","invite":"","brand":"","install":false,"admin":true,"isadmin":true,"onetime":true,"file_download":true,"name":"226533","nonadmin":true,"islock":false,"blackscreen_available":true,"hibernate":true,"power_supply":true,"silent":false,"start_time":1736138697,"os":"win","rdp":false,"os_user":"user","os_username":"","build":228,"version":"3.1.5","hardware":"{\"CPU\":\"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\",\"CPUSpeed\":2000,\"CPUCores\":4,\"CPUCoresLogical\":1,\"CPUFamily\":\"Intel64 Family 6 Model 143 Stepping 8\",\"BIOS\":\"MW67HU34P8\",\"BIOSVersion\":\"20221121\",\"BIOSDate\":\"\",\"RAMPhys\":8191,\"RAMPhysAvail\":2242,\"RAMVirt\":134217727,\"RAMVirtAvail\":134213408,\"RAMPageFile\":8191,\"RAMBanks\":[{\"Bank\":\"RAM slot #0\",\"Locator\":\"RAM slot #0\",\"DataWidth\":64,\"Manufacturer\":\"VMware Virtual RAM\",\"PartNumber\":\"VMW-4096MB\",\"SerialNumber\":\"00000001\",\"Capacity\":4096}],\"VideoName\":\"K8U1W1\",\"VideoRAM\":1024,\"VideoCards\":[{\"Name\":\"K8U1W1\",\"RAM\":1024,\"Integrated\":false}],\"Locale\":\"0809\",\"LocaleOemPage\":\"1252\",\"LocaleCountry\":\"Switzerland\",\"LocaleCurrency\":\"CHF\",\"LocaleTimezone\":60,\"LocaleFormatTime\":\"HH:mm:ss\",\"LocaleFormatDate\":\"dd\\\/MM\\\/yyyy\",\"ComputerModel\":\"uyyWpgYW\",\"ComputerDomain\":\"9aSbS\",\"ComputerWorkgroup\":\"WORKGROUP\",\"ComputerName\":\"user-PC\",\"ComputerIP\":[\"192.168.2.4\",\"fe80::29b9:a951:1791:4eb3\"],\"OSName\":\"Microsoft Windows 10 Pro\",\"OSVersion\":\"10.0.19045\",\"HDD\":[{\"Model\":\"17RGZVOD SCSI Disk Device\",\"Size\":393199}],\"LogicalDisks\":[{\"Disk\":\"C:\",\"Name\":\"\",\"FileSystem\":\"NTFS\",\"Size\":213143,\"FreeSpace\":19035}],\"SoundDevices\":[],\"NetAdapters\":[{\"Name\":\"Intel(R) 82574L Gigabit Network Connection\",\"Manufacturer\":\"Intel Corporation\",\"MACAddress\":\"EC:F4:BB:EA:15:88\",\"Speed\":953,\"Addresses\":\"192.168.2.4, fe80::29b9:a951:1791:4eb3\",\"DNS\":\"1.1.1.1\",\"DCHP\":\"\",\"Cable\":true,\"WoL\":false}],\"Monitors\":[]}"} |
Source: getscreen-524501439.exe, 00000000.00000002.1707959869.00000014831F0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: {"CPU":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","CPUSpeed":2000,"CPUCores":4,"CPUCoresLogical":1,"CPUFamily":"Intel64 Family 6 Model 143 Stepping 8","BIOS":"MW67HU34P8","BIOSVersion":"20221121","BIOSDate":"","RAMPhys":8191,"RAMPhysAvail":2242,"RAMVirt":134217727,"RAMVirtAvail":134213408,"RAMPageFile":8191,"RAMBanks":[{"Bank":"RAM slot #0","Locator":"RAM slot #0","DataWidth":64,"Manufacturer":"VMware Virtual RAM","PartNumber":"VMW-4096MB","SerialNumber":"00000001","Capacity":4096}],"VideoName":"K8U1W1","VideoRAM":1024,"VideoCards":[{"Name":"K8U1W1","RAM":1024,"Integrated":false}],"Locale":"0809","LocaleOemPage":"1252","LocaleCountry":"Switzerland","LocaleCurrency":"CHF","LocaleTimezone":60,"LocaleFormatTime":"HH:mm:ss","LocaleFormatDate":"dd\/MM\/yyyy","ComputerModel":"uyyWpgYW","ComputerDomain":"9aSbS","ComputerWorkgroup":"WORKGROUP","ComputerName":"user-PC","ComputerIP":["192.168.2.4","fe80::29b9:a951:1791:4eb3"],"OSName":"Microsoft Windows 10 Pro","OSVersion":"10.0.19045","HDD":[{"Model":"17RGZVOD SCSI Dis |
Source: getscreen-524501439.exe, 00000000.00000002.1707959869.00000014831F0000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: VMware Virtual RAM |
Source: getscreen-524501439.exe, 00000000.00000002.1710523356.000001E0F9904000.00000004.00000020.00020000.00000000.sdmp, mjzdpzvkpojpjfpkrhiihaxlnhqtrbo-elevate.exe, 00000001.00000002.1671253971.0000012A2F191000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000004.00000003.1728547126.000001EA725E2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |