Source: | Binary string: fwbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5ECB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exeL.pdbpa source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exep.pdbetDeviC source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B59000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6781000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C508C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B47000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $.0x1405FE40FipleObjectsExprox.pdbe-; source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exelib.pdbm source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\JSAMSIProvider64.pdbdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A1F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msi.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5080000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ObjectsEAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\comdlg32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TpReleaseCleanupGroupMembersib.pdbO- source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C54C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C57EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: i.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6137000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B96000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\InputHost.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NtDelayExecutiontableClassesi.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C3176000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B7C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B3B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MFWMAAEC.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C610D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C57EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5ECB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E70000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50CD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C509E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6886000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5098000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exet.pdb\*2Xk source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6AF6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C611F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C60A3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5BF0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C317C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A7C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C508C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B5F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdbe.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C665B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6AF6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B3B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C59C3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C665B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbpdba source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb}6 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50CD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb 61 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MFWMAAEC.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C610D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C3176000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5098000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4896000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5964000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C58AD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5850000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B53000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6131000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C488A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6113000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exep.pdb*n source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6BB8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5964000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6787000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5092000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C317C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5080000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50BB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: avrt.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6119000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B4D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5092000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: prox.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\audioses.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc.pdbpdb\* source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdbb9 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C678D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6BB8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6787000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msctf.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C59C3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6125000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\kernel32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C678D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B65000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6B50000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E06000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5086000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C611F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B96000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\cfgmgr32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6886000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\exe\getscreen-524501439.pdb] source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C612B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\oleaut32.pdby source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\JSAMSIProvider64.pdbge.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exell32.pdb5- source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C66C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C60A3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6781000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntmarta.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5F8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B59000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6137000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exet.pdbegistr7 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\CoreUIComponents.pdbb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\JSAMSIProvider64.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6113000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.dllwsock.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntmarta.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5F8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5086000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exelc.pdb[- source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdbbg;A source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4890000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\CoreUIComponents.pdbprofapi.dll source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C30CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fastprox.pdbbe]A source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C58AD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C489C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SleepExen-524501439.exeObjectsEAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5FEC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C612B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6A99000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6A99000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C489C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\JSAMSIProvider64.pdbdb26 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48C5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5DA0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbge.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdbQ source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\bcryptprimitives.pdb3c} source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\rasadhlp.pdb.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbdb<F source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: _samlib.pdbll\samlib.pdbb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C3171000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\kernel32.pdb1 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\twinapi.appcore.pdbpdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C488A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc6.pdbbg\* source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TpReleaseCleanupGroupMembersib.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C54C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E70000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4896000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5909000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C66C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdbQ source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A7C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6125000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C30CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4890000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6131000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B53000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\kernelbase.pdbY source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\comdlg32.pdbi source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5BF0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wsock.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: BaseThreadInitThunkexeWLDP.pdbx-> source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B5F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5FEC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdb.pdbmm source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\rasadhlp.pdbdbgb56 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5DA0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6727000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E06000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdbb]a source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B4D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C509E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B65000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6892000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50BB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: avrt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6119000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4884000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdbpdb9 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6892000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\MMDevAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B47000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc6.pdbbpdbQ6 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbbg source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb64.dbg source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msctf.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5909000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\TextInputFramework.pdb\* source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exelib.pdb! source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wtsapi32.pdbXq source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: <1top\dll\fwpuclnt.pdbi.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A1F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WinTypes.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5850000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\winsta.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B76000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exet.pdb\*Q source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6727000.00000004.00000020.00020000.00000000.sdmp |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06 |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://proxy.contoso.com:3128/ |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01http://www.webrtc.org/exper |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-time |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-timeurn:3gpp:video-orientationhttp://www.we |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/color-space |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00 |
Source: getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/inband-cn |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/playout-delay |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/transport-wide-cc-02 |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-content-type |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-frame-tracking-id |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-layers-allocation00 |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-timing |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A48E1000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF7171B1000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.g |
Source: getscreen-524501439.exe, 00000005.00000003.61206664794.000001D5F5B03000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.ge |
Source: getscreen-524501439.exe, 00000004.00000002.61229233693.000002E656FF3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.ge# |
Source: getscreen-524501439.exe, 00000004.00000002.61229233693.000002E656FF3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.ge## |
Source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.getsa |
Source: getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp | String found in binary or memory: https://docs.getsc |
Source: getscreen-524501439.exe, 00000004.00000002.61229233693.000002E656FA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscre |
Source: getscreen-524501439.exe, 00000005.00000003.61206912604.000001D5F5B5A000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000005.00000002.61209086167.000001D5F5B3F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/privacy-policy/ |
Source: getscreen-524501439.exe, 00000005.00000003.61208014371.000001D5F5B1A000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000005.00000003.61207912837.000001D5F5B12000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/t |
Source: getscreen-524501439.exe, 00000005.00000003.61206912604.000001D5F5B5A000.00000004.00000020.00020000.00000000.sdmp, getscreen-524501439.exe, 00000005.00000002.61209086167.000001D5F5B3F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/en/rules/terms-of-use/ |
Source: getscreen-524501439.exe, 00000004.00000002.61232382846.000002E65D549000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://docs.getscreen.me/user-guides/agent/ |
Source: getscreen-524501439.exe, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe.0.dr | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: firewallapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: fwbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: fwpolicyiomgr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mmdevapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mfwmaaec.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: audioses.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: avrt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.ui.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windowmanagementapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winsta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samlib.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: symsrv.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\ProgramData\Getscreen.me\chskldxthycfjguemdybwvvxbuswlsw-elevate.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: seclogon.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\svchost.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: directmanipulation.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mscms.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coloradapterclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: icm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uiautomationcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dbghelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msdmo.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: msi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntdsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sas.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: dsparse.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\getscreen-524501439.exe | Section loaded: winsta.dll | Jump to behavior |
Source: | Binary string: fwbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5ECB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exeL.pdbpa source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exep.pdbetDeviC source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B59000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6781000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C508C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B47000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $.0x1405FE40FipleObjectsExprox.pdbe-; source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exelib.pdbm source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\JSAMSIProvider64.pdbdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A1F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msi.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5080000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ObjectsEAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\comdlg32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TpReleaseCleanupGroupMembersib.pdbO- source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C54C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C57EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: i.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6137000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B96000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\InputHost.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: NtDelayExecutiontableClassesi.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C3176000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ws2_32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B7C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B3B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MFWMAAEC.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C610D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winspool.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C57EB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5ECB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E70000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50CD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C509E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6886000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5098000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exet.pdb\*2Xk source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6AF6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C611F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: :samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C60A3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5BF0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C317C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A7C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C508C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ole32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B5F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdbe.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C665B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rasadhlp.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6AF6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernelbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B3B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C59C3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: twinapi.appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C665B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wininet.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbpdba source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb}6 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winmm.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50CD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb 61 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MFWMAAEC.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C610D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comdlg32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C3176000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleacc.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5098000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4896000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5964000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C58AD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5850000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B53000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6131000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C488A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6113000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exep.pdb*n source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6BB8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sspicli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5964000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6787000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5092000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: combase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C317C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5080000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50BB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: avrt.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6119000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: d3d11.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48AE000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B4D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msdmo.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5092000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: prox.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\audioses.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc.pdbpdb\* source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc.pdbb9 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C678D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samlib.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6BB8000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemsvc.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6787000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msctf.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: UMPDC.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C59C3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6125000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\kernel32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fastprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C678D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B65000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: fwpuclnt.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6B50000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E06000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5086000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.UI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C611F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcryptprimitives.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B96000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\cfgmgr32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Amsi.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6886000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\exe\getscreen-524501439.pdb] source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C612B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\oleaut32.pdby source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\JSAMSIProvider64.pdbge.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: 32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exell32.pdb5- source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C66C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: bcrypt.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50C1000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cfgmgr32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C60A3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemcomn.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6781000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntmarta.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5F8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ucrtbase.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B59000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6137000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exet.pdbegistr7 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dbghelp.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48B4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\CoreUIComponents.pdbb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreMessaging.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\JSAMSIProvider64.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: audioses.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6113000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.dllwsock.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntmarta.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5F8F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C5086000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: getscreen-524501439.exelc.pdb[- source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdbbg;A source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\dhcpcsvc6.pdbb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4890000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\CoreUIComponents.pdbprofapi.dll source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C30CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fastprox.pdbbe]A source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: samcli.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C58AD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C489C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: SleepExen-524501439.exeObjectsEAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5FEC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: InputHost.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C612B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6A99000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mswsock.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6A99000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: imm32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C489C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\JSAMSIProvider64.pdbdb26 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: iphlpapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48C5000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: advapi32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B41000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5DA0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdbge.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdbQ source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\bcryptprimitives.pdb3c} source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\rasadhlp.pdb.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbdb<F source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: _samlib.pdbll\samlib.pdbb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C3171000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\DLL\kernel32.pdb1 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\x64\Release\getscreen.pdb source: getscreen-524501439.exe, 00000000.00000002.61196890401.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, chskldxthycfjguemdybwvvxbuswlsw-elevate.exe, 00000002.00000002.61157232270.00007FF7A4D7C000.00000040.00000001.01000000.00000004.sdmp, getscreen-524501439.exe, 00000004.00000002.61234730167.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp, getscreen-524501439.exe, 00000005.00000002.61209788099.00007FF71764C000.00000040.00000001.01000000.00000003.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\twinapi.appcore.pdbpdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcp_win.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C488A000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc6.pdbbg\* source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: c.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TpReleaseCleanupGroupMembersib.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: secur32.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C54C6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: nsi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E70000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shell32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4896000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5909000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winsta.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C66C4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdbQ source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: netutils.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A7C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: TextInputFramework.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6125000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: kernel32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C30CC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shlwapi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4890000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WindowManagementAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6131000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: rpcrt4.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B53000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\kernelbase.pdbY source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\comdlg32.pdbi source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Windows.Storage.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5BF0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wsock.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: BaseThreadInitThunkexeWLDP.pdbx-> source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: shcore.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B5F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: MMDevAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5FEC000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemprox.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wbemcomn.pdb.pdbmm source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\rasadhlp.pdbdbgb56 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: FirewallAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5DA0000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6727000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dxgi.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48BA000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dnsapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5E06000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: userenv.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50A4000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdbb]a source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CoreUIComponents.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6600000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: sechost.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B4D000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: powrprof.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C509E000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: user32.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B65000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6892000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: winhttp.pdb source: getscreen-524501439.exe, 00000000.00000002.61189299603.00000281C50BB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: avrt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C6119000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: gdi32full.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C4884000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\dll\WindowManagementAPI.pdbpdb9 source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: profapi.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CD7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dhcpcsvc6.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6892000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\MMDevAPI.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: WLDP.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msvcrt.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B47000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc6.pdbbpdbQ6 source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider64.pdbbg source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2F80000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb64.dbg source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: msctf.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5B38000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: dsparse.pdb0 source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5909000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: Kernel.Appcore.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5CDD000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\TextInputFramework.pdb\* source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exelib.pdb! source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\wtsapi32.pdbXq source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: <1top\dll\fwpuclnt.pdbi.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: cryptbase.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5A1F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\WinTypes.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FA7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: ntdll.pdb source: getscreen-524501439.exe, 00000000.00000002.61187362196.00000281C2FF7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wtsapi32.pdb source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5850000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Users\user\Desktop\symbols\dll\winsta.pdb source: getscreen-524501439.exe, 00000000.00000002.61185675526.00000281C0ED3000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: oleaut32.pdb source: getscreen-524501439.exe, 00000000.00000002.61186440792.00000281C2B76000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Device\HarddiskVolume4\Users\user\Desktop\getscreen-524501439.exet.pdb\*Q source: getscreen-524501439.exe, 00000000.00000002.61190973701.00000281C5520000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: comctl32.pdb source: getscreen-524501439.exe, 00000000.00000002.61188246785.00000281C48A2000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: wbemprox.pdb source: getscreen-524501439.exe, 00000000.00000002.61194551991.00000281C6727000.00000004.00000020.00020000.00000000.sdmp |