File name:

ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe

Full analysis: https://app.any.run/tasks/e881b386-9eae-47d8-9e7b-6d896c1c4a0c
Verdict: Malicious activity
Analysis date: July 25, 2024, 09:59:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

64144CD4E445770DF0527DF4751AC9CF

SHA1:

2E47459DA1B927C808EBCFA3C7C3ABC65543FCDC

SHA256:

BF75920EBA6F67C90648FADE6D28B8EDDF8A4318F35B79647496E23AA5FEA6DB

SSDEEP:

12288:uhaV71OQNqxRtEX75r43/0pcCGkvwVixNVFVv+P:uhG60XdYyGk4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
      • ScreenPal.exe (PID: 4216)
      • somCCD.tmp.exe (PID: 4880)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • somCCD.tmp.exe (PID: 4880)
    • Executable content was dropped or overwritten

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
      • somCCD.tmp.exe (PID: 4880)
    • The process drops C-runtime libraries

      • somCCD.tmp.exe (PID: 4880)
    • The process creates files with name similar to system file names

      • somCCD.tmp.exe (PID: 4880)
    • Creates a software uninstall entry

      • somCCD.tmp.exe (PID: 4880)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • somCCD.tmp.exe (PID: 4880)
    • Reads the date of Windows installation

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
    • Reads security settings of Internet Explorer

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
    • Application launched itself

      • ScreenPal.exe (PID: 3060)
  • INFO

    • Create files in a temporary directory

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
      • somCCD.tmp.exe (PID: 4880)
      • ScreenPal.exe (PID: 4216)
    • Reads the computer name

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
      • somCCD.tmp.exe (PID: 4880)
      • ScreenPal.exe (PID: 4216)
    • Checks supported languages

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
      • somCCD.tmp.exe (PID: 4880)
      • ScreenPal.exe (PID: 4216)
      • ScreenPal.exe (PID: 3060)
    • Creates files or folders in the user directory

      • somCCD.tmp.exe (PID: 4880)
      • ScreenPal.exe (PID: 4216)
    • Reads Microsoft Office registry keys

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
    • Process checks computer location settings

      • ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe (PID: 2668)
      • ScreenPal.exe (PID: 4216)
    • Reads CPU info

      • ScreenPal.exe (PID: 4216)
    • Reads the machine GUID from the registry

      • ScreenPal.exe (PID: 4216)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:12 21:34:08+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 252928
InitializedDataSize: 175104
UninitializedDataSize: -
EntryPoint: 0x28706
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.0.0.0
ProductVersionNumber: 3.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Big Nerd Software, LLC
FileDescription: Web Launch Application
FileVersion: 3.0.0.0
InternalName: WebLauncher.exe
LegalCopyright: Copyright (C) 2023
OriginalFileName: WebLauncher.exe
ProductName: ScreenPal
ProductVersion: 3.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
13
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start screenpalsetup_de469694-f3a3-4c89-9cc8-31687366c105.exe slui.exe no specs somccd.tmp.exe screenpal.exe no specs screenpal.exe reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1508reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductNameC:\Windows\System32\reg.exeScreenPal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
2668"C:\Users\admin\AppData\Local\Temp\ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe" C:\Users\admin\AppData\Local\Temp\ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe
explorer.exe
User:
admin
Company:
Big Nerd Software, LLC
Integrity Level:
MEDIUM
Description:
Web Launch Application
Exit code:
0
Version:
3.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\screenpalsetup_de469694-f3a3-4c89-9cc8-31687366c105.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3060"C:\Users\admin\AppData\Local\ScreenPal\ScreenPal.exe" "screenpal-launcher://s/screenpal.com/launcher/args?al=true&exetime=1721901576&id=ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105-exe"C:\Users\admin\AppData\Local\ScreenPal\ScreenPal.exeScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\screenpal\screenpal.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3572reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuildC:\Windows\System32\reg.exeScreenPal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
4216"C:\Users\admin\AppData\Local\ScreenPal\ScreenPal.exe" "screenpal-launcher://s/screenpal.com/launcher/args?al=true&exetime=1721901576&id=ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105-exe"C:\Users\admin\AppData\Local\ScreenPal\ScreenPal.exe
ScreenPal.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\screenpal\screenpal.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4220\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
4432\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4880"C:\Users\admin\AppData\Local\Temp\somCCD.tmp.exe"C:\Users\admin\AppData\Local\Temp\somCCD.tmp.exe
ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Install ScreenPal Web Launcher v3.0.2.0
Exit code:
0
Version:
3.0.2.0
Modules
Images
c:\users\admin\appdata\local\temp\somccd.tmp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6396\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6432reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductNameC:\Windows\System32\reg.exeScreenPal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
Total events
5 329
Read events
5 321
Write events
8
Delete events
0

Modification events

(PID) Process:(4880) somCCD.tmp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
88
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts
Operation:writeName:screenpal-launcher_screenpal-launcher
Value:
0
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Users\admin\AppData\Local\ScreenPal\ScreenPal.exe.FriendlyAppName
Value:
Screen Recorder/Editor
(PID) Process:(2668) ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Users\admin\AppData\Local\ScreenPal\ScreenPal.exe.ApplicationCompany
Value:
ScreenPal
Executable files
171
Suspicious files
54
Text files
285
Unknown types
0

Dropped files

PID
Process
Filename
Type
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\AppMain-3.0.2.jarcompressed
MD5:EB3A13DEA9EA7C68C0F456A673207107
SHA256:0D9C8C7A80368096B0249246D6C51013FF48BB06CEE3CF39021A0AEF785FC1F8
2668ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exeC:\Users\admin\AppData\Local\Temp\somCCD.tmp.exeexecutable
MD5:5C7194E3B686FCBDBE8255E4B22FE376
SHA256:B070E151B5DCA6C765AAD8F2CD9D4DE98C0AABC005C892E4F8C81284E51A8746
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\ScreenPal.cfgtext
MD5:0965C30794DD13CA1A05C4A5F956D0C2
SHA256:CE5EB4EFAE23AEE1C89DE143E7359A654B4206B93F8F17F5DD5C1264ABB8B070
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\ScreenPalSplashScreen@150pct.pngimage
MD5:439CB76D81E892810EB7E3B812874779
SHA256:0BCCB849DA240F80745A71DD7D48ED5FE7D4C5920A31C441FFBE63D598080D3B
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\.jpackage.xmlxml
MD5:10ADEA65A14B852158255481F360AD0D
SHA256:3BCDBF38A5633F145BCA1538D370EC6B1B074CB12BA3AE60626499458EB8DA06
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\screenpal.icoimage
MD5:43FD6E90FFDC55A6FFC52E123737E50A
SHA256:52D230C0552BAAB6D3CBF761B0AB6539A627C7EB4723F22BC3AD5695322538D2
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\rhino-1.7.14.jarcompressed
MD5:8EC105B05497D4963CE7BC6DE37EF8BA
SHA256:016917895A75D36EB22E3B21F6E08F266662A4DF70E0BC731E5DE81550AFD39D
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\app\partner_app.propertiestext
MD5:B76A447F08B8FF5C84C2A609C414DC14
SHA256:2B356746F347B6DBCB8C36D2BA27DC04C28BDC34DD35D3B80408951B44DEB52F
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\runtime\bin\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:DF1541F461F49DA270B7E06F8B443695
SHA256:754975D9F355C0E9337E053F5381F1C0C4762358E53DC5C01371B29E4E9CC70D
4880somCCD.tmp.exeC:\Users\admin\AppData\Local\ScreenPal\runtime\bin\api-ms-win-core-console-l1-2-0.dllexecutable
MD5:B7CC0AF3A9781049A32BDA6E19A1F7C1
SHA256:C6126921745800AB15C905B0D363262226A2380E7ECEB56EFA78B538AD0A25EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
59
DNS requests
24
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
760
lsass.exe
GET
200
18.245.39.64:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkpLy9ROx7U76vGUhC06D6E%3D
unknown
unknown
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
760
lsass.exe
GET
200
13.224.191.223:80
http://ocsp.r2m02.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRmbQtwnInkvkvr7BNFR%2BS2lTYPjAQUwDFSzVpQw4J8dHHOy%2Bmc%2BXrrguICEAEgzj0uEwz6KzhuXyWHhes%3D
unknown
whitelisted
5272
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5960
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4856
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4216
ScreenPal.exe
GET
200
52.0.43.5:80
http://screencast-o-matic.com/checkproxy
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
6012
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4216
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3908
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4204
svchost.exe
4.209.32.198:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2668
ScreenPalSetup_de469694-f3a3-4c89-9cc8-31687366c105.exe
54.237.186.11:443
screenpal.com
AMAZON-AES
US
unknown
760
lsass.exe
18.245.39.64:80
ocsp.rootca1.amazontrust.com
US
unknown
760
lsass.exe
13.224.191.223:80
ocsp.r2m02.amazontrust.com
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
screenpal.com
  • 54.237.186.11
  • 52.0.43.5
  • 35.153.128.140
unknown
ocsp.rootca1.amazontrust.com
  • 18.245.39.64
shared
ocsp.r2m02.amazontrust.com
  • 13.224.191.223
whitelisted
files2.screencast-o-matic.com
  • 52.222.214.47
  • 52.222.214.74
  • 52.222.214.54
  • 52.222.214.52
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 184.86.251.7
  • 184.86.251.5
  • 184.86.251.30
  • 184.86.251.29
  • 184.86.251.4
  • 184.86.251.8
  • 184.86.251.9
  • 184.86.251.6
  • 184.86.251.10
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.76
  • 40.126.32.138
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.14
  • 40.126.32.74
  • 40.126.32.140
whitelisted

Threats

PID
Process
Class
Message
4216
ScreenPal.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 19.0.x Detected
No debug info