Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
getscreen-799952897-x86.exe

Overview

General Information

Sample name:getscreen-799952897-x86.exe
Analysis ID:1627696
MD5:ee04a90b6a67eb24998dddbb3e4c586d
SHA1:83e136fda97591e66770ab25e627b4e352f627d9
SHA256:030932b22c1057e7bf88de5b55672d4bbc02df28f9777988e8c30446c9603fbe
Infos:

Detection

Score:51
Range:0 - 100
Confidence:100%

Compliance

Score:47
Range:0 - 100

Signatures

Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Keylogger Generic

Classification

  • System is w10x64native
  • getscreen-799952897-x86.exe (PID: 2000 cmdline: "C:\Users\user\Desktop\getscreen-799952897-x86.exe" MD5: EE04A90B6A67EB24998DDDBB3E4C586D)
    • getscreen-799952897-x86.exe (PID: 7000 cmdline: "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -cpipe \\.\pipe\PCommand96vnrifhzefatzjfu -cmem 0000pipe0PCommand96vnrifhzefatzjfu53fmkascu40h0uz -child MD5: EE04A90B6A67EB24998DDDBB3E4C586D)
    • getscreen-799952897-x86.exe (PID: 5884 cmdline: "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -gpipe \\.\pipe\PCommand97raczuabszfrnbdy1 -gui MD5: EE04A90B6A67EB24998DDDBB3E4C586D)
  • bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe (PID: 2528 cmdline: "C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe" -elevate \\.\pipe\elevateGS512bvsuyaubccihxlebpdetcxrlnozylqt MD5: EE04A90B6A67EB24998DDDBB3E4C586D)
  • svchost.exe (PID: 7308 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon MD5: F586835082F632DC8D9404D83BC16316)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: getscreen-799952897-x86.exe PID: 2000JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 912, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon, ProcessId: 7308, ProcessName: svchost.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    Compliance

    barindex
    Source: getscreen-799952897-x86.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: getscreen-799952897-x86.exeStatic PE information: certificate valid
    Source: getscreen-799952897-x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc.pdbiHK source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009904000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\cryptbase.pdbk source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\Kernel.Appcore.pdb}h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winsta.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009DD3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntmarta.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000097F1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernel32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007774000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: bcrypt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008E00000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc6.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemcomn.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E8F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntdsapi.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008BCF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msvcrt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007760000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: e3samlib.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000835D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wrpcrt4.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007870000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000776E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemcomn.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E8F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\fwpuclnt.pdb* source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreMessaging.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009BEF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbb;K source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000777F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsspicli.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: bcrypt.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008E00000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: usp10.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008FE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: audioses.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099CD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntmarta.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000097F1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\Amsi.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\rasadhlp.pdbdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\FWPolicyIOMgr.pdbb-h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider32.pdbdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider32.pdb2o source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dhcpcsvc.pdb;Pk source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernelbase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007779000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: shlwapi.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000803E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\winsta.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb3h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: usp10.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008FE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wbemcomn.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreMessaging.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009BEF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: gdiplus.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000833A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: samcli.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cryptbase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090BC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\cryptbase.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008B67000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreUIComponents.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D0E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\fwpuclnt.pdbdb#PS source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comdlg32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.00000000078EA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: InputHost.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009C4A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MpOAV.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009FA8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb]h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000777F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleacc.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winspool.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.000000000903B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dhcpcsvc6.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: iphlpapi.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008345000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MMDevAPI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000984D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wmswsock.pdb\*wQ source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbui source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wrpcrt4.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007870000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winmm.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F7D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: secur32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C8A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FirewallAPI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009605000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdbb2.Lh# source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wwin32u.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000795C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\CoreMessaging.pdbl source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\rasadhlp.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.UI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009A82000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb=h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FWPolicyIOMgr.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009790000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\rasadhlp.pdbi source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wmswsock.pdbdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: rasadhlp.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A116000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009904000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: combase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007945000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.Storage.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000094E2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wuser32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007956000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\InputHost.pdbbwK source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernel32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007774000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\wmswsock.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: twinapi.appcore.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009CA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\samlib.pdbGQw source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winsta.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009DD3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: secur32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C8A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: TextInputFramework.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009B3A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dhcpcsvc.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netutils.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090C2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntdsapi.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008BCF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\wmswsock.pdb\* source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: rasadhlp.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A116000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netutils.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090C2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wininet.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F14000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009542000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\rasadhlp.pdbi source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32full.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008033000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: UMPDC.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: twinapi.appcore.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009CA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\CoreMessaging.pdb6K source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WindowManagementAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009AE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mfperfhelper.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comctl32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.00000000080BB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comdlg32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.00000000078EA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\twinapi.appcore.pdbf source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\wbemcomn.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: propsys.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D69000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winmm.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F7D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: shlwapi.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000803E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider32.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000802D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000818E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleacc.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsspicli.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MMDevAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000984D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\MpOAV.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: samcli.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FirewallAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009605000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-799952897-x86.pdbS source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.0000000000778000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wimm32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008128000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wtsapi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wimm32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008128000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreUIComponents.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D0E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WindowManagementAPI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009AE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\CoreMessaging.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wwin32u.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000795C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winhttp.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008EB7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\propsys.pdbcQ source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.Storage.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000094E2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fastprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: sechost.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000780A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winhttp.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008EB7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: d3d11.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008351000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dhcpcsvc6.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A002000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: gdiplus.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000833A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: fwpuclnt.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A11C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-799952897-x86.pdb_ source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.0000000000778000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\version.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.000000000081B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdbmoB source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: combase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007945000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000776E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemprox.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E35000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: d3d11.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008351000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A002000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32full.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008033000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\rasadhlp.pdb* source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: sechost.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000780A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\fastprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\FWPolicyIOMgr.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: propsys.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D69000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: audioses.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099CD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MpOAV.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009FA8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: fastprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009EEE000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbdbbK source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\audioses.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msctf.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000942A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FWPolicyIOMgr.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009790000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\samlib.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: TextInputFramework.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009B3A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: UMPDC.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009542000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\Win32\Release\getscreen.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp
    Source: Binary string: fwpuclnt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A11C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cryptbase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090BC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008B67000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000802D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msctf.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000942A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: bcryptprimitives.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009487000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernelbase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007779000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wmswsock.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mfperfhelper.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.UI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009A82000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wtsapi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wbemsvc.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000818E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wuser32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007956000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comctl32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.00000000080BB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: InputHost.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009C4A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E35000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wininet.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F14000.00000004.00000020.00020000.00000000.sdmp
    Source: Joe Sandbox ViewIP Address: 51.89.95.37 51.89.95.37
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /signal/agent HTTP/1.1Host: getscreen.meUpgrade: websocketConnection: UpgradeSec-WebSocket-Extensions: permessage-deflate; client_max_window_bitsSec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==Origin: https://getscreen.meSec-WebSocket-Protocol: chat, superchatSec-WebSocket-Version: 13User-Agent: Getscreen.me/3.2.12 (Win, getscreen.me, 327)
    Source: global trafficDNS traffic detected: DNS query: getscreen.me
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://proxy.contoso.com:3128/
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01http://www.webrtc.org/exper
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-time
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-capture-timeurn:3gpp:video-orientationhttp://www.we
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/color-space
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/generic-frame-descriptor-00
    Source: getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/inband-cn
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/playout-delay
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/transport-wide-cc-02
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-content-type
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-frame-tracking-id
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-layers-allocation00
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.webrtc.org/experiments/rtp-hdrext/video-timing
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://docs.g
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4089809835.0000000007DDD000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4085577963.0000000007DC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.ge
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://docs.getsa
    Source: getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://docs.getsc
    Source: getscreen-799952897-x86.exe, 00000004.00000003.4145294116.0000000007DDE000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4128420216.0000000007DCB000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4145196397.0000000007DD9000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4129517858.0000000007DD8000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4126900753.0000000007DAB000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4134244952.0000000007DD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.getscr
    Source: getscreen-799952897-x86.exe, 00000004.00000003.4144674146.0000000003004000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4144279941.0000000003015000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.getscreen.me/en/rules/privacy-policy/
    Source: getscreen-799952897-x86.exe, 00000004.00000003.4144674146.0000000003004000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4144279941.0000000003015000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.getscreen.me/en/rules/terms-of-use/
    Source: getscreen-799952897-x86.exe, 00000004.00000003.4089809835.0000000007DDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.getscreen.me/user
    Source: getscreen-799952897-x86.exe, 00000004.00000003.4126900753.0000000007DAB000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4124630475.0000000005CEE000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4128580498.0000000007DB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.getscreen.me/user-guides/agent/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4107732686.0000000008544000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NtUserGetRawInputDatamemstr_2a6232d8-7
    Source: Yara matchFile source: Process Memory Space: getscreen-799952897-x86.exe PID: 2000, type: MEMORYSTR
    Source: getscreen-799952897-x86.exeStatic PE information: Resource name: RT_ICON type: x86 executable not stripped
    Source: bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe.0.drStatic PE information: Resource name: RT_ICON type: x86 executable not stripped
    Source: getscreen-799952897-x86.exe, 00000000.00000000.4043210999.0000000002CFD000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000803E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedhcpcsvc.dll.muij% vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4102901323.0000000002CFD000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSAMLib.DLLj% vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000003.00000000.4077245272.0000000002CFD000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000003.00000002.4130374650.0000000002CFD000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000004.00000002.4149860996.0000000002CFD000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exe, 00000004.00000000.4078078242.0000000002CFD000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exeBinary or memory string: OriginalFilenamegetscreen.exe: vs getscreen-799952897-x86.exe
    Source: getscreen-799952897-x86.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal51.evad.winEXE@8/11@1/1
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeFile created: C:\Users\user\AppData\Local\Getscreen.meJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeMutant created: \Sessions\1\BaseNamedObjects\Global\PCommandMutextTurbo96phqghum
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name, NumberOfCores, NumberOfLogicalProcessors, MaxClockSpeed, Caption FROM Win32_Processor
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeFile read: C:\Users\user\Desktop\getscreen-799952897-x86.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\getscreen-799952897-x86.exe "C:\Users\user\Desktop\getscreen-799952897-x86.exe"
    Source: unknownProcess created: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe "C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe" -elevate \\.\pipe\elevateGS512bvsuyaubccihxlebpdetcxrlnozylqt
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess created: C:\Users\user\Desktop\getscreen-799952897-x86.exe "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -cpipe \\.\pipe\PCommand96vnrifhzefatzjfu -cmem 0000pipe0PCommand96vnrifhzefatzjfu53fmkascu40h0uz -child
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess created: C:\Users\user\Desktop\getscreen-799952897-x86.exe "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -gpipe \\.\pipe\PCommand97raczuabszfrnbdy1 -gui
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess created: C:\Users\user\Desktop\getscreen-799952897-x86.exe "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -gpipe \\.\pipe\PCommand97raczuabszfrnbdy1 -guiJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\Desktop\getscreen-799952897-x86.exe "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -cpipe \\.\pipe\PCommand96vnrifhzefatzjfu -cmem 0000pipe0PCommand96vnrifhzefatzjfu53fmkascu40h0uz -childJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntdsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: sas.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dsparse.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mmdevapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: avrt.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mfwmaaec.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mfperfhelper.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: audioses.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: avrt.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: windows.ui.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: windowmanagementapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: samlib.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: symsrv.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: mpr.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: msi.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: ntdsapi.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: sas.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: secur32.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: userenv.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: usp10.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: version.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: wininet.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: winmm.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: samcli.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: dsparse.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: netutils.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: wldp.dllJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: seclogon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntdsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: sas.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dsparse.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntdsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: sas.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dsparse.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dataexchange.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dcomp.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: twinapi.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: directmanipulation.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: mscms.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: coloradapterclient.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: icm32.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: uiautomationcore.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{304CE942-6E39-40D8-943A-B913C40C9CD4}\InprocServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: getscreen-799952897-x86.exeStatic PE information: certificate valid
    Source: getscreen-799952897-x86.exeStatic file information: File size 7010088 > 1048576
    Source: getscreen-799952897-x86.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x6a9800
    Source: getscreen-799952897-x86.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc.pdbiHK source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009904000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\cryptbase.pdbk source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\Kernel.Appcore.pdb}h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winsta.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009DD3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntmarta.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000097F1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernel32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007774000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: bcrypt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008E00000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\dhcpcsvc6.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemcomn.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E8F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntdsapi.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008BCF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msvcrt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007760000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: e3samlib.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000835D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wrpcrt4.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007870000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000776E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemcomn.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E8F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\fwpuclnt.pdb* source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreMessaging.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009BEF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbb;K source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000777F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsspicli.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ucrtbase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000794B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\WindowManagementAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\samlib.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: bcrypt.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008E00000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: usp10.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008FE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: audioses.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099CD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntmarta.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000097F1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\Amsi.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\rasadhlp.pdbdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\FWPolicyIOMgr.pdbb-h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider32.pdbdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider32.pdb2o source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dhcpcsvc.pdb;Pk source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernelbase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007779000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: shlwapi.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000803E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\winsta.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdb3h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: usp10.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008FE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wbemcomn.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreMessaging.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009BEF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: gdiplus.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000833A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: samcli.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cryptbase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090BC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\cryptbase.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008B67000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreUIComponents.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D0E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\fwpuclnt.pdbdb#PS source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comdlg32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.00000000078EA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: InputHost.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009C4A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MpOAV.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009FA8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb]h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: advapi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000777F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleacc.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winspool.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.000000000903B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dhcpcsvc6.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: iphlpapi.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008345000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MMDevAPI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000984D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wmswsock.pdb\*wQ source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbui source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wrpcrt4.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007870000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winmm.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F7D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: secur32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C8A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FirewallAPI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009605000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\CoreUIComponents.pdbb2.Lh# source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wwin32u.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000795C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\CoreMessaging.pdbl source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\rasadhlp.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.UI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009A82000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\twinapi.appcore.pdb=h source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004A27000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FWPolicyIOMgr.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009790000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\rasadhlp.pdbi source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wmswsock.pdbdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: rasadhlp.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A116000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cfgmgr32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009904000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: combase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007945000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.Storage.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000094E2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wuser32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007956000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\InputHost.pdbbwK source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernel32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007774000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\wmswsock.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: twinapi.appcore.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009CA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\samlib.pdbGQw source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winsta.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009DD3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: secur32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C8A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: TextInputFramework.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009B3A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dhcpcsvc.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netutils.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090C2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: ntdsapi.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008BCF000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\wmswsock.pdb\* source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: rasadhlp.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A116000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netutils.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090C2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wininet.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F14000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009542000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\rasadhlp.pdbi source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32full.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008033000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: UMPDC.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: twinapi.appcore.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009CA5000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\CoreMessaging.pdb6K source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WindowManagementAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009AE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mfperfhelper.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comctl32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.00000000080BB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comdlg32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.00000000078EA000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\twinapi.appcore.pdbf source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\wbemcomn.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: propsys.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D69000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winmm.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F7D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: shlwapi.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000803E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\JSAMSIProvider32.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000802D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000818E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleacc.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008C2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsspicli.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B1000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MMDevAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000984D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\MpOAV.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: samcli.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FirewallAPI.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009605000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-799952897-x86.pdbS source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.0000000000778000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wimm32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008128000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wtsapi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wimm32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008128000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: CoreUIComponents.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D0E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: WindowManagementAPI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009AE0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\CoreMessaging.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wwin32u.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000795C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winhttp.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008EB7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\propsys.pdbcQ source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.Storage.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000094E2000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fastprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: sechost.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000780A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: winhttp.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008EB7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: d3d11.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008351000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dhcpcsvc6.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A002000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: gdiplus.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000833A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: fwpuclnt.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A11C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\exe\getscreen-799952897-x86.pdb_ source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.0000000000778000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\version.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\fwpuclnt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.000000000081B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\symbols\dll\TextInputFramework.pdbmoB source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: combase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007945000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000776E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemprox.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E35000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: d3d11.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008351000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: dhcpcsvc6.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A002000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32full.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.0000000008033000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\rasadhlp.pdb* source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: sechost.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000780A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\fastprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\FWPolicyIOMgr.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: propsys.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009D69000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: audioses.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099CD000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: MpOAV.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009FA8000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: fastprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009EEE000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\fwpuclnt.pdbdbbK source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\DLL\audioses.pdbb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msctf.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000942A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: FWPolicyIOMgr.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009790000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\dll\samlib.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: TextInputFramework.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009B3A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: UMPDC.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090B7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Kernel.Appcore.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009542000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: C:\Github-runner\_work\agent-windows\agent-windows\console\Win32\Release\getscreen.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp
    Source: Binary string: fwpuclnt.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000A11C000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: cryptbase.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090BC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netapi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008B67000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wgdi32.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000802D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: msctf.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.000000000942A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: bcryptprimitives.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009487000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wkernelbase.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007779000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wmswsock.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004AA0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mfperfhelper.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.00000000099C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: Windows.UI.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009A82000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wtsapi32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.00000000090A0000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Users\user\Desktop\wbemsvc.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4103075841.0000000004ABB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: oleaut32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.000000000818E000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wuser32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4105286341.0000000007956000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: comctl32.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4106468398.00000000080BB000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: InputHost.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009C4A000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wbemprox.pdb source: getscreen-799952897-x86.exe, 00000000.00000002.4110692473.0000000009E35000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wininet.pdb( source: getscreen-799952897-x86.exe, 00000000.00000002.4108262557.0000000008F14000.00000004.00000020.00020000.00000000.sdmp
    Source: getscreen-799952897-x86.exeStatic PE information: real checksum: 0x6bdc2f should be: 0x6bc1e5
    Source: bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe.0.drStatic PE information: real checksum: 0x6bdc2f should be: 0x6bc1e5
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeFile created: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeJump to dropped file
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeFile created: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeJump to dropped file
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BankLabel, DeviceLocator, DataWidth, Manufacturer, PartNumber, SerialNumber, Capacity FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, Size FROM Win32_DiskDrive
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name, Manufacturer, MACAddress, Speed, InterfaceIndex, Index, GUID FROM Win32_NetworkAdapter WHERE PhysicalAdapter=TRUE
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 8
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 8
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 7
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DHCPServer, DNSServerSearchOrder, IPAddress FROM Win32_NetworkAdapterConfiguration WHERE InterfaceIndex = 7
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT IPAddress FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = &apos;True&apos;
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT IPAddress FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = &apos;True&apos;
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BankLabel, DeviceLocator, DataWidth, Manufacturer, PartNumber, SerialNumber, Capacity FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption, VolumeName, FileSystem, Size, FreeSpace FROM Win32_LogicalDisk
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Caption FROM Win32_SoundDevice
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeSystem information queried: FirmwareTableInformationJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exe TID: 5976Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exe TID: 6160Thread sleep count: 281 > 30Jump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT BIOSVersion, Name, ReleaseDate FROM Win32_BIOS
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model, Name, Domain, Workgroup FROM Win32_ComputerSystem
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name, NumberOfCores, NumberOfLogicalProcessors, MaxClockSpeed, Caption FROM Win32_Processor
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V console (use port 2179, disable negotiation)
    Source: getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VMnet
    Source: getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: WebRTC-AllowMACBasedIPv6WebRTC-BindUsingInterfaceNameVMnetWebRTC-UseDifferentiatedCellularCostsWebRTC-AddNetworkCostToVpnNet[:id=
    Source: getscreen-799952897-x86.exe, 00000003.00000003.4123697880.0000000002DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
    Source: getscreen-799952897-x86.exe, 00000004.00000003.4134175541.0000000003092000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4127133496.0000000003092000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4150970796.0000000003092000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4143375560.0000000003092000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4150074563.0000000002FE4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4097273383.00000000007B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4064838260.0000000002C86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~~
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Users\user\Desktop\getscreen-799952897-x86.exe "C:\Users\user\Desktop\getscreen-799952897-x86.exe" -cpipe \\.\pipe\PCommand96vnrifhzefatzjfu -cmem 0000pipe0PCommand96vnrifhzefatzjfu53fmkascu40h0uz -childJump to behavior
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4107640172.000000000849F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: getscreen-799952897-x86.exe, 00000000.00000002.4107640172.000000000849F000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000000.00000002.4105286341.000000000795C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Users\user\Desktop\getscreen-799952897-x86.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts631
    Windows Management Instrumentation
    1
    DLL Side-Loading
    12
    Process Injection
    1
    Masquerading
    11
    Input Capture
    731
    Security Software Discovery
    Remote Services11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    541
    Virtualization/Sandbox Evasion
    LSASS Memory541
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
    Process Injection
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS132
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    getscreen-799952897-x86.exe0%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://docs.getscreen.me/user0%Avira URL Cloudsafe
    https://docs.getscreen.me/user-guides/agent/0%Avira URL Cloudsafe
    https://docs.g0%Avira URL Cloudsafe
    http://proxy.contoso.com:3128/0%Avira URL Cloudsafe
    https://docs.ge0%Avira URL Cloudsafe
    https://docs.getscreen.me/en/rules/terms-of-use/0%Avira URL Cloudsafe
    https://docs.getsc0%Avira URL Cloudsafe
    https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extension0%Avira URL Cloudsafe
    https://docs.getsa0%Avira URL Cloudsafe
    https://docs.getscr0%Avira URL Cloudsafe
    https://docs.getscreen.me/en/rules/privacy-policy/0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    getscreen.me
    51.89.95.37
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://getscreen.me/signal/agentfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://docs.gegetscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4089809835.0000000007DDD000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4085577963.0000000007DC4000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://proxy.contoso.com:3128/getscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://docs.getscreen.me/user-guides/agent/getscreen-799952897-x86.exe, 00000004.00000003.4126900753.0000000007DAB000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4124630475.0000000005CEE000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4128580498.0000000007DB8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://docs.getscreen.me/usergetscreen-799952897-x86.exe, 00000004.00000003.4089809835.0000000007DDD000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.winimage.com/zLibDllgetscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpfalse
          high
          https://docs.ggetscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://docs.getscreen.me/en/rules/terms-of-use/getscreen-799952897-x86.exe, 00000004.00000003.4144674146.0000000003004000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4144279941.0000000003015000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://docs.getscgetscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://docs.getsagetscreen-799952897-x86.exe, 00000000.00000002.4098560677.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001642000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.0000000001AF2000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.0000000001AF2000.00000040.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01getscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpfalse
            high
            https://aomediacodec.github.io/av1-rtp-spec/#dependency-descriptor-rtp-header-extensiongetscreen-799952897-x86.exe, 00000000.00000002.4098560677.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe, 00000001.00000002.4060574453.0000000001231000.00000040.00000001.01000000.00000004.sdmp, getscreen-799952897-x86.exe, 00000003.00000002.4126173661.00000000016E1000.00000040.00000001.01000000.00000003.sdmp, getscreen-799952897-x86.exe, 00000004.00000002.4146033255.00000000016E1000.00000040.00000001.01000000.00000003.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://docs.getscrgetscreen-799952897-x86.exe, 00000004.00000003.4145294116.0000000007DDE000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4128420216.0000000007DCB000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4145196397.0000000007DD9000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4129517858.0000000007DD8000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4126900753.0000000007DAB000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4134244952.0000000007DD9000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://docs.getscreen.me/en/rules/privacy-policy/getscreen-799952897-x86.exe, 00000004.00000003.4144674146.0000000003004000.00000004.00000020.00020000.00000000.sdmp, getscreen-799952897-x86.exe, 00000004.00000003.4144279941.0000000003015000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            51.89.95.37
            getscreen.meFrance
            16276OVHFRfalse
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1627696
            Start date and time:2025-03-03 04:48:40 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 6m 54s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
            Run name:Suspected VM Detection
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:getscreen-799952897-x86.exe
            Detection:MAL
            Classification:mal51.evad.winEXE@8/11@1/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            TimeTypeDescription
            22:50:49API Interceptor1x Sleep call for process: getscreen-799952897-x86.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            51.89.95.37getscreen-226997704-x86.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Trojan.Siggen30.60605.21819.2259.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Trojan.Siggen30.60605.21819.2259.exeGet hashmaliciousUnknownBrowse
                  getscreen-868841125.exeGet hashmaliciousUnknownBrowse
                    getscreen-227149269.exeGet hashmaliciousUnknownBrowse
                      getscreen-669912037.exeGet hashmaliciousUnknownBrowse
                        getscreen-120727697-x86.exeGet hashmaliciousUnknownBrowse
                          getscreen-456311346-x86.exeGet hashmaliciousUnknownBrowse
                            getscreen-941605629-x86.exeGet hashmaliciousUnknownBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              getscreen.megetscreen-799952897.exeGet hashmaliciousUnknownBrowse
                              • 5.75.168.191
                              getscreen-799952897.exeGet hashmaliciousUnknownBrowse
                              • 78.47.165.25
                              getscreen-226997704-x86.exeGet hashmaliciousUnknownBrowse
                              • 51.89.95.37
                              getscreen-226997704-x86.exeGet hashmaliciousUnknownBrowse
                              • 78.47.165.25
                              SecuriteInfo.com.Trojan.Siggen30.60605.21819.2259.exeGet hashmaliciousUnknownBrowse
                              • 51.89.95.37
                              SecuriteInfo.com.Trojan.Siggen30.60605.21819.2259.exeGet hashmaliciousUnknownBrowse
                              • 51.89.95.37
                              Verify.htaGet hashmaliciousUnknownBrowse
                              • 78.47.165.25
                              Verify.htaGet hashmaliciousUnknownBrowse
                              • 5.75.168.191
                              getscreen-524501439-x86.exeGet hashmaliciousUnknownBrowse
                              • 78.47.165.25
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              OVHFRPayment_Activity_0079_2025-2-23.vbsGet hashmaliciousUnknownBrowse
                              • 51.222.241.106
                              getscreen-226997704-x86.exeGet hashmaliciousUnknownBrowse
                              • 51.89.95.37
                              Update.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 51.79.171.167
                              Update.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                              • 51.79.171.167
                              owari.mpsl.elfGet hashmaliciousUnknownBrowse
                              • 178.32.95.239
                              ggetokken.batGet hashmaliciousUnknownBrowse
                              • 142.44.215.161
                              ApexLoader.exeGet hashmaliciousUnknownBrowse
                              • 51.89.7.33
                              ApexLoader.exeGet hashmaliciousUnknownBrowse
                              • 51.89.7.33
                              Play_VM-Now(Cwoods)ATTT0003.htmlGet hashmaliciousUnknownBrowse
                              • 188.165.1.80
                              No context
                              No context
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                              Category:dropped
                              Size (bytes):7010088
                              Entropy (8bit):7.933988576244831
                              Encrypted:false
                              SSDEEP:196608:I9cjaiiSztxYnCxuP7GZyul47rNgY95dLPfHf:IaVt4P7/uW/Nj95dT3
                              MD5:EE04A90B6A67EB24998DDDBB3E4C586D
                              SHA1:83E136FDA97591E66770AB25E627B4E352F627D9
                              SHA-256:030932B22C1057E7BF88DE5B55672D4BBC02DF28F9777988E8C30446C9603FBE
                              SHA-512:32CD780EC64B02324C42321CEDF6F304EEC1A769ED5566B24D7DFB0A7C488E4493CBAC2E3D4E133084314CC5665BF832D861B3677E1E4F96811E90F656A9C8FC
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:low
                              Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......(.P.lr>Rlr>Rlr>R'.=S+r>R...Rkr>R..:Str>Rx.:S.r>Rlr>R.u>R'.9Smr>R..=Ssr>R..;S.r>R'.;S.r>R'.:S%r>R'.8Snr>R'.?S!r>Rlr?R.q>R..7SZp>R..>Smr>R...Rmr>Rlr.Rmr>R..<Smr>RRichlr>R........PE..L...M..g...............(..j..0... .......0........@................................./.k...@.........................0Y...U..<...........<#............j.(/...... ...................................................................................UPX0..... ..............................UPX1......j..0....j.................@....rsrc....0.......,....j.............@..............................................................................................................................................................................................................................................................................................................................4.22.UPX!....
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:[ZoneTransfer]....ZoneId=0
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:ASCII text
                              Category:modified
                              Size (bytes):17427
                              Entropy (8bit):5.55786443494199
                              Encrypted:false
                              SSDEEP:384:fU/HnBIdfW5thMPfhgGJSrUzd7V7thMPfhHhMPfhvMSthMPfh0thMPfhPhMPfh36:+LHL1fDVpRb
                              MD5:BE58AFCE29F3B134BFD5F90C48817CE5
                              SHA1:F1241B69A628201B196633607E096DF9CECC83B7
                              SHA-256:35B5FDCD9A17F6443B70EE51BE8BF20C333DC872C940EB78D78D03E4DF8E6DFE
                              SHA-512:E161993313DCC26271122F7AF0FE54A0951BC624829BCA35EE4D01CB599DAAF2EA92735B748DB44BD50D3A9EABA7F51AFC621C406EC6829346B40C0527A14CDA
                              Malicious:false
                              Reputation:low
                              Preview:Filename.: getscreen-799952897-x86.exe-d148e13802780f0924b7192f71eb570dffea3bc7.crash.SHA1..: d148e13802780f0924b7192f71eb570dffea3bc7.Time..: 2025.3.3 3:51.Program..: Getscreen.me.Version..: 3.2.12.OS...: Windows 10 build 19042, x86.BIOS..: .Explorer.: 11.789.19041.0.Processors.: 0 x .Video..: .Computer.: .Memory..: 13 free of 15 Gb.Handles..: 445.Image Base.: 0x400000..Exception.: 0xC0000005 at 0x01227051 (getscreen-799952897-x86.exe.$0x547051)..Modules...: C:\Users\user\Desktop\getscreen-799952897-x86.exe (3.2.12.0)...: C:\Windows\SYSTEM32\ntdll.dll (10.0.19041.1110)...: C:\Windows\System32\KERNEL32.DLL (10.0.19041.1151)...: C:\Windows\System32\KERNELBASE.dll (10.0.19041.1151)...: C:\Windows\System32\ADVAPI32.dll (10.0.19041.1052)...: C:\Windows\System32\msvcrt.dll (7.0.19041.546)...: C:\Windows\System32\sechost.dll (10.0.19041.906)...: C:\Windows\System32\RPCRT4.dll (10.0.19041.1081)...: C:\Windows\System32\COMDLG32.dll (10.0.19041.906)...: C:\Windows\System32\combase.dll (10.0.1
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):64
                              Entropy (8bit):5.84375
                              Encrypted:false
                              SSDEEP:3:BvYmFAFr8DKTIOM+C8uzP:GmFurAIRJuj
                              MD5:FDAEEE831DF0BBAD827FD6030FD36454
                              SHA1:0F2845EBD08A4E886AEC7AF427A5DF573D83FB38
                              SHA-256:B66188E06A51509416D493AFE543517207DAA05BB6E1C7AAD6D47F016DC9B215
                              SHA-512:0DC3DEDD96028DE4A516A6846511A500D53FBB834A27211D6221906A8B4369DA4F5E5C1E56455996F3051401A4B3AAFB53F7116B1A6CF16AC8B060536F52A0EB
                              Malicious:false
                              Reputation:low
                              Preview:...J.+.q....:.O....k....,e...sg....,.6.<.....2.@\.%.+.#.K.jK..
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):913
                              Entropy (8bit):4.9741791448796855
                              Encrypted:false
                              SSDEEP:24:9ynpDE8zA71oX8zA71o1X8zA71omgAZHZcJnN2:UpJzsOszsO1szsO/Q
                              MD5:E14A510B864B16FDDF32D93BE953773B
                              SHA1:9C4C446A05ED5F01D49062D7C3B82C95AA669E17
                              SHA-256:C617B1C1FF2E0552A74BDD8298CD2F57A14B5839468FA7C97DDDD6E02952D983
                              SHA-512:C2480F194845C3DE47AA4F2A58FDFF9AFD31856A86DCDF3B0BB3202001C88DAE6A00DFBBCB983E6FCC983A5D5572170B1E04A33A08AF06C80AC49E0BF3B1F9B8
                              Malicious:false
                              Preview:00:00:00.000.INFO.Log Getscreen.me v3.2.12 build 327..03:50:49.651.WARNING.Mouse relative mode disabled..03:50:49.675.INFO.Monitor detect monitor '\\.\DISPLAY1' scale:1.000000 size: 0:1080-0:1920 desktop: 0:1080-0:1920..03:50:49.676.INFO.Monitor detect monitor '\\.\DISPLAY1' scale:1.000000 size: 0:1080-0:1920 desktop: 0:1080-0:1920..03:50:49.676.INFO.BlackScreen initialized..03:50:49.676.INFO.Monitor detect monitor '\\.\DISPLAY1' scale:1.000000 size: 0:1080-0:1920 desktop: 0:1080-0:1920..03:50:49.676.INFO.Capture select monitor '\\.\DISPLAY1'..03:50:49.733.INFO.Capture set frame rate to 30..03:50:49.733.INFO.Child frame mark off..03:50:49.733.INFO.FrameMark hide frame..03:50:54.091.INFO.Child get stop message..03:50:54.097.INFO.Opus compress stop..03:50:54.097.INFO.Capture capture stopped..
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3085
                              Entropy (8bit):4.8041916868728105
                              Encrypted:false
                              SSDEEP:24:9uBIPH+qeNC5ivWBmJdPOyytqKQJKUkJKpJK/KXVKCNK2BKnZKBKVGK2RK6JKYi9:QBI2vA5pEOJorkEV+fY7OKsRAE+o+TZ4
                              MD5:61F99A499706C6F09E2087E0A5365184
                              SHA1:A7651D9AB353CD59F10BBE161992C89F273820BB
                              SHA-256:19F6D4A441EEF51B20CB3EEAE9156799A69A0363310E0C09679A4F47E0CF0810
                              SHA-512:DA4B353E3BD679CED7E88A0044949BD84D43E4B0A628015764CDC5C8C2092DDDBBE45233AC754B8086B83ED36EEF25B2C03B2556A88FB2E10CA2C5EF8427E4E6
                              Malicious:false
                              Preview:00:00:00.000.INFO.Log Getscreen.me v3.2.12 build 327..03:50:49.718.INFO.Gui GUI started..03:50:49.975.INFO.Gui load data: 'this://app/main-turbo.htm'..03:50:50.004.INFO.Gui load data: 'this://app/common/zepto.min.js'..03:50:50.009.INFO.Gui load data: 'this://app/common/sciter.js'..03:50:50.013.INFO.Gui load data: 'this://app/ico/favicon.ico'..03:50:50.041.INFO.Gui document ready..03:50:50.059.INFO.Gui send event event-application-status: '{"value":"connecting"}'..03:50:50.059.INFO.Gui send event event-install-status: '{"value":false}'..03:50:50.071.INFO.Gui load data: 'this://app/ico/stop.ico'..03:50:50.072.INFO.Gui load data: 'this://app/lang/en.json'..03:50:50.090.INFO.Gui send event event-domain: '{"value":""}'..03:50:50.091.INFO.Gui send event event-fastaccess-url: '{"value":""}'..03:50:50.091.INFO.Gui send event eve
                              Process:C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):2621
                              Entropy (8bit):5.156326008367871
                              Encrypted:false
                              SSDEEP:48:1ysuaA9kIABPPJIfiIpJIfiH+BqcycfvhIfQcVe8xByB0BsVmc2c7cfvhIf9aGEg:Y8miIAilcywe7e8xByB0Bkmc2c7we9a6
                              MD5:E5E38C6983021D8C0127803927D33D7E
                              SHA1:ECC60D37CE8AA1BB0585E282A329D555AF6A4AD4
                              SHA-256:E7E8A41142CEE68828810E2F8D1093F02A8EC6509DDA9241BBE20559F8D70C82
                              SHA-512:B871673F2A27D98DAA14A4DB3D90001D118D3229F8DCA58B16D5B05B7127B5776C70F91519C31A6AA4D5B25DF434D0CA3EA8386DC88BC0E70EF5176978AF7E09
                              Malicious:false
                              Preview:00:00:00.000.INFO.Log Getscreen.me v3.2.12 build 327..03:50:46.423.INFO.Server start server run....03:50:46.424.INFO.Start Getscreen.me v 3.2.12 build 327 revision 0..03:50:47.141.ERROR.Service service 'GetscreenSV' not found..03:50:47.452.INFO.Service service 'GetscreenSV' installed..03:50:47.770.INFO.Service service 'GetscreenSV' start success..03:50:47.770.INFO.Service get control message 1..03:50:47.800.INFO.Capture capture stopped..03:50:47.807.INFO.FrameMark hide frame..03:50:48.339.INFO.Service service 'GetscreenSV' stop [0] (0)..03:50:48.854.INFO.Service service 'GetscreenSV' removed..03:50:48.870.INFO.Child success get system token..03:50:48.871.INFO.Child start child process simply..03:50:48.871.INFO.Shared remove shared memory 0000pipe0PCommand96vnrifhzefatzjfu53fmkascu40h0uz..03:50:48.871.INFO.Shared create shared memory 0000pipe0PCommand96vnrif
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):16777512
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3::
                              MD5:8CCA8765BA082ECC53E001B1D237A8EE
                              SHA1:DE616FFC2282B6E4D6D2EC1524DCBE2CD8F270F7
                              SHA-256:46D9D79B8BE089ABF16344F1E491613D6710B051EC184A69AC183C349BD71746
                              SHA-512:9D884A535930529684E88DDB3AEA26964A5CA984CC07DE6EFE2BFDA6CA5F5D437C521E61ACED07E9379A8337BB1892F13CA67592D8E1E6673CCDBBD89E17DE40
                              Malicious:false
                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7361
                              Entropy (8bit):7.909153194233483
                              Encrypted:false
                              SSDEEP:192:gkuJ6Sk9JA6yS2MTTq03eWGjZaHkBY5psDUwmR:gkc6Sk7ySV20rGlaHsiR
                              MD5:EE726993ECD269EC6F62E62D440BD881
                              SHA1:04E304A0D9E2F60BF160D877D54DDAFC348C00F0
                              SHA-256:49A4A8AB5D3ED40A6E66B1188B27D6208AC53BF9FAC0B4D02D54DF74BF36936C
                              SHA-512:738F4C608A602FE248F1F3BCCD99E80C4AF509259AB630554C33FDC162E89D6F61819D3A83A0F2D6AF7EFBDAC9A766A83A15081706CB7D02854530D923A2F03C
                              Malicious:false
                              Preview:INSC.>.....Mar222021150038.....&G~.R.].<.Y|X....u.6..9Y..O..K...................S..&j..x.c`@.....2...P.b......!P`y...`.........K. !.`...m...f.I..@j.......D......V......z..z..........U...!.......|.l.....72...pp0...kP....._..7@......P>P.,..{=#.#7..{9....f0fH`.H``..jdg.`..W.A.k.!t......./`gx..........d..wp'.?...M..p....A.y*..^B......!....Q......................].o.x..S.J.@.....Q..XA\. ..%.n...... "R.,........|..n.n.....`.....p8s.s.....[xne...> .|f.. `.z.!3.7...C.#f..`.....3.....<Ow..n...mX.|....T..?..8...IW..#]s.z....B...R............u.WS.C...=Z.K.T.W.$Y_ 'i.w.iD1.c..h..r.`N;.....'...........y}.W|HoO}J...........s.{.b...`.H.e..*(1..{....?..\....3...%.......$...Y*..P..hR.+i=..v...]e.F...^..4.....}.K{...e.....B.68.5,...R......F.."m....x).................E...x..=O.0...F...I...+!...........`.......!...C..?......Hee..2.3...K...C-E.~.;.......d|......>.=....uFUl..tl..N.r.....R...5.L....AP..C.BTW.e]{.&-d...iZF/..G?..M.Q].......7...j.G...j..p.x....D.5.\T3.H...
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):26
                              Entropy (8bit):3.873140679513132
                              Encrypted:false
                              SSDEEP:3:tAvnXVG8d:tgXVVd
                              MD5:2DE2373EF07261CAC4D4BF7D3FE31122
                              SHA1:8A5BD414AFD96AFAED4EB413D033240BC6A71C94
                              SHA-256:F6F219ED2C4029EBC3071C036B64113AA62A7A342D2FD5965FD122D5C90BC9BC
                              SHA-512:AF4CACDD0A501DCB37318FA9E5B7049AFEB8E0EE6EB0770F0B013C70E32123FA45C1508DD12921C909C0C9F88AC8A2F3041A16747E5FF145B4FB15E8509DB105
                              Malicious:false
                              Preview:INSC.>.....Mar222021150038
                              Process:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):64
                              Entropy (8bit):5.8125
                              Encrypted:false
                              SSDEEP:3:BvYmFAFr8DKTIOMpFl8g:GmFurAIROFz
                              MD5:9D2FD2B322EA337B67B4F4B6270AB4CA
                              SHA1:F8E1F481288CA7AE1583DCF0D21DD19F5656EE7D
                              SHA-256:C48495362231D14AC4CEE8C726E0EC8C7AFEB5E71D86202D57F5500797C58F0F
                              SHA-512:1666EDCA3BE48E722F20DFC4F0BFFA36FEDAC1BB78FC75A19F6663EFF3182EB1A77320FD07F44BAE68609865AA88226AC3BABFAFF3AEC4F0C034604C2586B744
                              Malicious:false
                              Preview:...J.+.q....:.O....k....,e...sg....,.6.<.....2.8UO..u.C/.A{;
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                              Entropy (8bit):7.933988576244831
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.66%
                              • UPX compressed Win32 Executable (30571/9) 0.30%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:getscreen-799952897-x86.exe
                              File size:7'010'088 bytes
                              MD5:ee04a90b6a67eb24998dddbb3e4c586d
                              SHA1:83e136fda97591e66770ab25e627b4e352f627d9
                              SHA256:030932b22c1057e7bf88de5b55672d4bbc02df28f9777988e8c30446c9603fbe
                              SHA512:32cd780ec64b02324c42321cedf6f304eec1a769ed5566b24d7dfb0a7c488e4493cbac2e3d4e133084314cc5665bf832d861b3677e1e4f96811e90f656a9c8fc
                              SSDEEP:196608:I9cjaiiSztxYnCxuP7GZyul47rNgY95dLPfHf:IaVt4P7/uW/Nj95dT3
                              TLSH:5066331538166402F3229A3DE4B79FF84157187117C0D2858B3D8B9F7ABB7008B99E77
                              File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......(.P.lr>Rlr>Rlr>R'.=S+r>R...Rkr>R..:Str>Rx.:S.r>Rlr>R.u>R'.9Smr>R..=Ssr>R..;S.r>R'.;S.r>R'.:S%r>R'.8Snr>R'.?S!r>Rlr?R.q>R..7SZp>
                              Icon Hash:418c6963696c9643
                              Entrypoint:0x241c0a0
                              Entrypoint Section:UPX1
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x67B6114D [Wed Feb 19 17:13:49 2025 UTC]
                              TLS Callbacks:0x241c29b
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:3489ede818bf2156dcaa5da003e7e8cb
                              Signature Valid:true
                              Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                              Signature Validation Error:The operation completed successfully
                              Error Number:0
                              Not Before, Not After
                              • 28/05/2024 15:50:28 28/06/2026 16:36:10
                              Subject Chain
                              • CN=POINT B LTD, O=POINT B LTD, L=Limassol, S=Limassol, C=CY, OID.1.3.6.1.4.1.311.60.2.1.3=CY, SERIALNUMBER=HE 430957, OID.2.5.4.15=Private Organization
                              Version:3
                              Thumbprint MD5:9B083870477F4699693EEECABF351BF8
                              Thumbprint SHA-1:B3C999E29AED18DEA59733F3CAA94E788B1AC3A1
                              Thumbprint SHA-256:3E73B7C28C18DC6A03B9816F200365F1DF1FF80A7BD0D55DB920F1B24BBD74E7
                              Serial:7AE0E9C1CFE2DCE0E21C4327
                              Instruction
                              pushad
                              mov esi, 01D73000h
                              lea edi, dword ptr [esi-01972000h]
                              push edi
                              or ebp, FFFFFFFFh
                              jmp 00007FB7FCCF3C32h
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              mov al, byte ptr [esi]
                              inc esi
                              mov byte ptr [edi], al
                              inc edi
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FB7FCCF3C0Fh
                              mov eax, 00000001h
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc eax, eax
                              add ebx, ebx
                              jnc 00007FB7FCCF3C2Dh
                              jne 00007FB7FCCF3C4Ah
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FB7FCCF3C41h
                              dec eax
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc eax, eax
                              jmp 00007FB7FCCF3BF6h
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc ecx, ecx
                              jmp 00007FB7FCCF3C74h
                              xor ecx, ecx
                              sub eax, 03h
                              jc 00007FB7FCCF3C33h
                              shl eax, 08h
                              mov al, byte ptr [esi]
                              inc esi
                              xor eax, FFFFFFFFh
                              je 00007FB7FCCF3C97h
                              sar eax, 1
                              mov ebp, eax
                              jmp 00007FB7FCCF3C2Dh
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FB7FCCF3BEEh
                              inc ecx
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FB7FCCF3BE0h
                              add ebx, ebx
                              jne 00007FB7FCCF3C29h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc ecx, ecx
                              add ebx, ebx
                              jnc 00007FB7FCCF3C11h
                              jne 00007FB7FCCF3C2Bh
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jnc 00007FB7FCCF3C06h
                              add ecx, 02h
                              cmp ebp, FFFFFB00h
                              adc ecx, 02h
                              lea edx, dword ptr [eax+eax]
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x10459300x5500UPX0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x201f33c0x7ac.rsrc
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x201d0000x233c.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x6ac8000x2f28UPX0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x201fae80x20.rsrc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x201c2bc0x18UPX1
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x201c5a40xc0UPX1
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              UPX00x10000x19720000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              UPX10x19730000x6aa0000x6a98003d14120afef58fee83751a20d3cb272eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x201d0000x30000x2c00425e915de783e77ba016856c235d7f2dFalse0.5712890625data6.061481598038362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              AFX_DIALOG_LAYOUT0x1eec9e00x2ISO-8859 text, with no line terminatorsRussianRussia5.0
                              INI0x1f239800xadataRussianRussia1.8
                              LANG0x1eef9200x2ddfdataRussianRussia0.9854381333560419
                              LANG0x1ef27000x48b6dataRussianRussia0.989792629203825
                              LANG0x1ef6fb80x3181dataRussianRussia0.9228280596543833
                              LANG0x1efa1400x33addataRussianRussia0.984806107793484
                              LANG0x1efd4f00x317adataRussianRussia0.9890257381967472
                              LANG0x1f006700x389bdataRussianRussia0.985853288247878
                              LANG0x1f03f100x32f1dataRussianRussia0.9683306494900698
                              LANG0x1f072080x2a16dataRussianRussia0.9747540374976796
                              LANG0x1f09c200x3160dataRussianRussia0.9899525316455696
                              LANG0x1f0cd800x3170dataRussianRussia0.9902812895069533
                              LANG0x1f249680x31e4dataEnglishUnited States0.9870028186658315
                              OPUS0x1f0fef00xa5e5dataRussianRussia0.9833525630459865
                              OPUS0x1f1a4d80x94a4dataRussianRussia0.9858088930936613
                              RT_ICON0x1eec9e80x139dataRussianRussia1.035143769968051
                              RT_ICON0x1eecb280x1efdataRussianRussia1.0222222222222221
                              RT_ICON0x1eecd180x225dataRussianRussia1.0200364298724955
                              RT_ICON0x1eecf400x26bx86 executable not strippedRussianRussia1.0177705977382876
                              RT_ICON0x1eed1b00x326dataRussianRussia1.0136476426799008
                              RT_ICON0x1eed4d80x402dataRussianRussia1.0019493177387915
                              RT_ICON0x201d9e00x13bPNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedRussianRussia1.034920634920635
                              RT_ICON0x201db200x1c5PNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedRussianRussia1.0242825607064017
                              RT_ICON0x201dcec0x1eePNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedRussianRussia1.0222672064777327
                              RT_ICON0x201dee00x253PNG image data, 40 x 40, 8-bit/color RGBA, non-interlacedRussianRussia1.0184873949579831
                              RT_ICON0x201e1380x2e7PNG image data, 48 x 48, 8-bit/color RGBA, non-interlacedRussianRussia1.0148048452220726
                              RT_ICON0x201e4240x3adPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedRussianRussia1.0116896918172158
                              RT_ICON0x1eee7880x159dataRussianRussia1.0318840579710145
                              RT_ICON0x1eee8e80x1e6dataRussianRussia1.022633744855967
                              RT_ICON0x1eeead00x1f6OpenPGP Secret Key Version 7RussianRussia1.0219123505976095
                              RT_ICON0x1eeecc80x26ddataRussianRussia1.0177133655394526
                              RT_ICON0x1eeef380x31bdataRussianRussia1.0138364779874214
                              RT_ICON0x1eef2580x3e7dataRussianRussia1.011011011011011
                              RT_ICON0x1f239900x163data1.0309859154929577
                              RT_ICON0x1f23af80x20ddata1.020952380952381
                              RT_ICON0x1f23d080x21bdata1.0204081632653061
                              RT_ICON0x1f23f280x282data1.017133956386293
                              RT_ICON0x1f241b00x33cdata1.0132850241545894
                              RT_ICON0x1f244f00x413data1.0105465004793863
                              RT_STRING0x1f27b500x38dataRussianRussia1.1964285714285714
                              RT_GROUP_ICON0x201e7d80x5adataRussianRussia0.8
                              RT_GROUP_ICON0x1eed8e00x5adataRussianRussia1.1222222222222222
                              RT_GROUP_ICON0x1f249080x5adata1.1222222222222222
                              RT_GROUP_ICON0x1eef6400x5adataRussianRussia1.1222222222222222
                              RT_VERSION0x201e8380x280dataRussianRussia0.49375
                              RT_MANIFEST0x201eabc0x87fXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (2115), with CRLF line terminatorsEnglishUnited States0.31264367816091954
                              DLLImport
                              ADVAPI32.dllFreeSid
                              COMCTL32.dllImageList_DrawEx
                              COMDLG32.dllPrintDlgW
                              d3d11.dllD3D11CreateDevice
                              dbghelp.dllStackWalk
                              dxgi.dllCreateDXGIFactory1
                              GDI32.dllLineTo
                              gdiplus.dllGdipFree
                              IMM32.dllImmIsIME
                              IPHLPAPI.DLLGetIfEntry2
                              KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                              MPR.dllWNetGetConnectionW
                              msdmo.dllMoInitMediaType
                              msi.dll
                              NETAPI32.dllNetUserGetInfo
                              ntdll.dllRtlGetVersion
                              NTDSAPI.dllDsMakeSpnW
                              ole32.dllDoDragDrop
                              OLEACC.dllLresultFromObject
                              OLEAUT32.dllSafeArrayDestroy
                              POWRPROF.dllPowerGetActiveScheme
                              RPCRT4.dllUuidEqual
                              SAS.dllSendSAS
                              Secur32.dllDeleteSecurityContext
                              SHELL32.dll
                              SHLWAPI.dllPathIsRelativeA
                              USER32.dllGetDC
                              USERENV.dllCreateEnvironmentBlock
                              USP10.dllScriptShape
                              VERSION.dllVerQueryValueW
                              WINHTTP.dllWinHttpOpen
                              WININET.dllInternetOpenA
                              WINMM.dllwaveInOpen
                              WINSPOOL.DRV
                              WS2_32.dllioctlsocket
                              WTSAPI32.dllWTSFreeMemory
                              DescriptionData
                              CompanyNamePoint B Ltd
                              InternalNameGetscreen.me
                              OriginalFilenamegetscreen.exe
                              ProductNameGetscreen.me
                              FileVersion3.2.12
                              LegalCopyrightCopyright (C) 2025
                              ProductVersion3.2.12
                              Translation0x0009 0x04b0
                              Language of compilation systemCountry where language is spokenMap
                              RussianRussia
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 3, 2025 04:50:51.052119970 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.052166939 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.052366018 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.052651882 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.052670002 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.706918001 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.707401037 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.707427025 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.710032940 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.710237026 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.711489916 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.711673975 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.711908102 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:51.711935997 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:51.761096954 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:52.381357908 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:52.381712914 CET4434974951.89.95.37192.168.11.20
                              Mar 3, 2025 04:50:52.381902933 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:52.385329962 CET49749443192.168.11.2051.89.95.37
                              Mar 3, 2025 04:50:52.385354042 CET4434974951.89.95.37192.168.11.20
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 3, 2025 04:50:50.880413055 CET6471153192.168.11.201.1.1.1
                              Mar 3, 2025 04:50:51.050792933 CET53647111.1.1.1192.168.11.20
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Mar 3, 2025 04:50:50.880413055 CET192.168.11.201.1.1.10x2b0Standard query (0)getscreen.meA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Mar 3, 2025 04:50:51.050792933 CET1.1.1.1192.168.11.200x2b0No error (0)getscreen.me51.89.95.37A (IP address)IN (0x0001)false
                              Mar 3, 2025 04:50:51.050792933 CET1.1.1.1192.168.11.200x2b0No error (0)getscreen.me5.75.168.191A (IP address)IN (0x0001)false
                              Mar 3, 2025 04:50:51.050792933 CET1.1.1.1192.168.11.200x2b0No error (0)getscreen.me78.47.165.25A (IP address)IN (0x0001)false
                              • getscreen.me
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.11.204974951.89.95.374432000C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              TimestampBytes transferredDirectionData
                              2025-03-03 03:50:51 UTC362OUTGET /signal/agent HTTP/1.1
                              Host: getscreen.me
                              Upgrade: websocket
                              Connection: Upgrade
                              Sec-WebSocket-Extensions: permessage-deflate; client_max_window_bits
                              Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
                              Origin: https://getscreen.me
                              Sec-WebSocket-Protocol: chat, superchat
                              Sec-WebSocket-Version: 13
                              User-Agent: Getscreen.me/3.2.12 (Win, getscreen.me, 327)
                              2025-03-03 03:50:52 UTC810INHTTP/1.1 400 Bad Request
                              access-control-expose-headers: X-Js-Cache
                              content-type: text/plain; charset=utf-8
                              sec-websocket-version: 13
                              set-cookie: llu=FuZdPhWTPSScRO0k2OHAt4VISHedAtLD92QN42qFDzM2MfGjy6fitmiHegYA6xA8cdf30e82f0c39d6b95ba5250e289d6ea1740973852; Path=/; Domain=getscreen.me; Expires=Sat, 03 Mar 2125 03:50:52 GMT; Max-Age=3153600000; HttpOnly; Secure; SameSite=None
                              set-cookie: lang=en; Path=/; Domain=getscreen.me; Expires=Sun, 03 Mar 2030 03:50:52 GMT; Max-Age=157680000; HttpOnly
                              strict-transport-security: max-age=31536000; includeSubDomains
                              x-content-type-options: nosniff
                              x-frame-options: SAMEORIGIN
                              x-js-cache: 3230e8363d3a4cb1c13455a648f3b4aa
                              date: Mon, 03 Mar 2025 03:50:52 GMT
                              content-length: 12
                              x-envoy-upstream-service-time: 7
                              server: ov1.getscreen.me
                              connection: close
                              2025-03-03 03:50:52 UTC12INData Raw: 42 61 64 20 52 65 71 75 65 73 74 0a
                              Data Ascii: Bad Request


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:22:50:45
                              Start date:02/03/2025
                              Path:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\getscreen-799952897-x86.exe"
                              Imagebase:0xce0000
                              File size:7'010'088 bytes
                              MD5 hash:EE04A90B6A67EB24998DDDBB3E4C586D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:22:50:47
                              Start date:02/03/2025
                              Path:C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\ProgramData\Getscreen.me\bvsuyaubccihxlebpdetcxrlnozylqt-elevate.exe" -elevate \\.\pipe\elevateGS512bvsuyaubccihxlebpdetcxrlnozylqt
                              Imagebase:0x830000
                              File size:7'010'088 bytes
                              MD5 hash:EE04A90B6A67EB24998DDDBB3E4C586D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Antivirus matches:
                              • Detection: 0%, ReversingLabs
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:22:50:49
                              Start date:02/03/2025
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
                              Imagebase:0x7ff75a320000
                              File size:57'360 bytes
                              MD5 hash:F586835082F632DC8D9404D83BC16316
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:false

                              Target ID:3
                              Start time:22:50:49
                              Start date:02/03/2025
                              Path:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\getscreen-799952897-x86.exe" -cpipe \\.\pipe\PCommand96vnrifhzefatzjfu -cmem 0000pipe0PCommand96vnrifhzefatzjfu53fmkascu40h0uz -child
                              Imagebase:0xce0000
                              File size:7'010'088 bytes
                              MD5 hash:EE04A90B6A67EB24998DDDBB3E4C586D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:4
                              Start time:22:50:49
                              Start date:02/03/2025
                              Path:C:\Users\user\Desktop\getscreen-799952897-x86.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\getscreen-799952897-x86.exe" -gpipe \\.\pipe\PCommand97raczuabszfrnbdy1 -gui
                              Imagebase:0xce0000
                              File size:7'010'088 bytes
                              MD5 hash:EE04A90B6A67EB24998DDDBB3E4C586D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              No disassembly