Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ScreenConnect.WindowsClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ScreenConnect.Wi_678d95b9d51074be56918e3ca898aa852cba5_00000000_b16e6a68-d273-4b22-9528-2ab1fc8b7f74\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FA8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FD8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe
|
"C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
|
dw20.exe -x -s 1232
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
ProgramId
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
FileId
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
LowerCaseLongPath
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
LongPathHash
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
Name
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
OriginalFileName
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
Publisher
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
Version
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
BinFileVersion
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
BinaryType
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
ProductName
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
ProductVersion
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
LinkDate
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
BinProductVersion
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
AppxPackageFullName
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
Size
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
Language
|
||
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
655000
|
heap
|
page read and write
|
||
7FFD9B7BA000
|
trusted library allocation
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
890000
|
remote allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
12961000
|
trusted library allocation
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
7FFD9B7A2000
|
trusted library allocation
|
page execute and read and write
|
||
854000
|
heap
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
C27000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
7FFD9B7AA000
|
trusted library allocation
|
page execute and read and write
|
||
C70000
|
heap
|
page execute and read and write
|
||
626000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
829000
|
heap
|
page read and write
|
||
890000
|
remote allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
21AB000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
||
7C2000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7FFD9B834000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
1B33E000
|
stack
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
7FFD9B7E2000
|
trusted library allocation
|
page execute and read and write
|
||
674000
|
heap
|
page read and write
|
||
146000
|
stack
|
page read and write
|
||
1B43E000
|
stack
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
7FFD9B6F2000
|
trusted library allocation
|
page execute and read and write
|
||
2630000
|
heap
|
page read and write
|
||
651000
|
heap
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
2FE7000
|
heap
|
page read and write
|
||
202000
|
unkown
|
page readonly
|
||
61B000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
12965000
|
trusted library allocation
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
7FF4B72C0000
|
trusted library allocation
|
page execute and read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7FF4B72D0000
|
trusted library allocation
|
page execute and read and write
|
||
A15000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
2EDB000
|
stack
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
3D1000
|
stack
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1B570000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
7FFD9B6E2000
|
trusted library allocation
|
page execute and read and write
|
||
628000
|
heap
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
682000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
7CD000
|
heap
|
page read and write
|
||
651000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
61C000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
890000
|
remote allocation
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
823000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
1B440000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
669000
|
heap
|
page read and write
|
||
14B000
|
stack
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
64E000
|
heap
|
page read and write
|
There are 124 hidden memdumps, click here to show them.