IOC Report
ScreenConnect.WindowsClient.exe

loading gif

Files

File Path
Type
Category
Malicious
ScreenConnect.WindowsClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ScreenConnect.Wi_678d95b9d51074be56918e3ca898aa852cba5_00000000_b16e6a68-d273-4b22-9528-2ab1fc8b7f74\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FA8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FD8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe
"C:\Users\user\Desktop\ScreenConnect.WindowsClient.exe"
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
dw20.exe -x -s 1232

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
ProgramId
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
FileId
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
LowerCaseLongPath
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
LongPathHash
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
Name
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
OriginalFileName
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
Publisher
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
Version
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
BinFileVersion
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
BinaryType
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
ProductName
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
ProductVersion
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
LinkDate
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
BinProductVersion
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
AppxPackageFullName
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
AppxPackageRelativeId
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
Size
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
Language
\REGISTRY\A\{85dc2476-3c5c-7ede-66c8-a149386292a9}\Root\InventoryApplicationFile\screenconnect.wi|6c767c86d2c687d6
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
655000
heap
page read and write
7FFD9B7BA000
trusted library allocation
page execute and read and write
610000
heap
page read and write
890000
remote allocation
page read and write
98E000
stack
page read and write
2CDE000
stack
page read and write
12961000
trusted library allocation
page read and write
69F000
heap
page read and write
6CF000
heap
page read and write
C1F000
stack
page read and write
639000
heap
page read and write
800000
heap
page read and write
639000
heap
page read and write
655000
heap
page read and write
7FFD9B7A2000
trusted library allocation
page execute and read and write
854000
heap
page read and write
67A000
heap
page read and write
68D000
heap
page read and write
D73000
heap
page read and write
1C0000
heap
page read and write
C27000
trusted library allocation
page read and write
690000
heap
page read and write
7FFD9B7AA000
trusted library allocation
page execute and read and write
C70000
heap
page execute and read and write
626000
heap
page read and write
D76000
heap
page read and write
829000
heap
page read and write
890000
remote allocation
page read and write
9F0000
heap
page read and write
681000
heap
page read and write
21AB000
heap
page read and write
64E000
heap
page read and write
7C2000
heap
page read and write
D10000
heap
page read and write
261E000
stack
page read and write
A10000
heap
page read and write
7FFD9B834000
trusted library allocation
page read and write
2BDE000
stack
page read and write
1B33E000
stack
page read and write
9F5000
heap
page read and write
6D1000
heap
page read and write
68F000
heap
page read and write
820000
heap
page read and write
6D1000
heap
page read and write
64F000
heap
page read and write
7FFD9B7E2000
trusted library allocation
page execute and read and write
674000
heap
page read and write
146000
stack
page read and write
1B43E000
stack
page read and write
69A000
heap
page read and write
7FFD9B6F2000
trusted library allocation
page execute and read and write
2630000
heap
page read and write
651000
heap
page read and write
29DC000
stack
page read and write
B1E000
stack
page read and write
69A000
heap
page read and write
200000
unkown
page readonly
2FE7000
heap
page read and write
202000
unkown
page readonly
61B000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
67A000
heap
page read and write
69A000
heap
page read and write
12965000
trusted library allocation
page read and write
669000
heap
page read and write
82B000
heap
page read and write
645000
heap
page read and write
7FF4B72C0000
trusted library allocation
page execute and read and write
C20000
trusted library allocation
page read and write
5F0000
heap
page read and write
1E0000
heap
page read and write
7FF4B72D0000
trusted library allocation
page execute and read and write
A15000
heap
page read and write
6F0000
heap
page read and write
655000
heap
page read and write
2FE0000
heap
page read and write
2ADE000
stack
page read and write
7DA000
heap
page read and write
20000
trusted library allocation
page read and write
2EDB000
stack
page read and write
28DE000
stack
page read and write
3D1000
stack
page read and write
69F000
heap
page read and write
614000
heap
page read and write
2FDE000
stack
page read and write
5CE000
stack
page read and write
710000
heap
page read and write
1B570000
heap
page read and write
8A0000
heap
page read and write
61D000
heap
page read and write
6E4000
heap
page read and write
6CF000
heap
page read and write
21A0000
heap
page read and write
7FFD9B6E2000
trusted library allocation
page execute and read and write
628000
heap
page read and write
6D1000
heap
page read and write
79C000
heap
page read and write
690000
heap
page read and write
639000
heap
page read and write
1A0000
heap
page read and write
200000
unkown
page readonly
682000
heap
page read and write
D70000
heap
page read and write
5F7000
heap
page read and write
64F000
heap
page read and write
68D000
heap
page read and write
674000
heap
page read and write
190000
heap
page read and write
84D000
heap
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
7CD000
heap
page read and write
651000
heap
page read and write
27D0000
heap
page read and write
61C000
heap
page read and write
68D000
heap
page read and write
890000
remote allocation
page read and write
618000
heap
page read and write
617000
heap
page read and write
69F000
heap
page read and write
823000
heap
page read and write
760000
heap
page read and write
1B23E000
stack
page read and write
6CF000
heap
page read and write
7EE000
stack
page read and write
1B440000
heap
page read and write
8A5000
heap
page read and write
2961000
trusted library allocation
page read and write
790000
heap
page read and write
850000
heap
page read and write
669000
heap
page read and write
14B000
stack
page read and write
64F000
heap
page read and write
730000
heap
page read and write
64E000
heap
page read and write
There are 124 hidden memdumps, click here to show them.