DFIR Next Steps: Suspicious LogMeIn Use

Welcome back to the next post in our DFIR Next Steps series on remote monitoring and management (RMM) tools. This post will focus on LogMeIn products.

Check out our previous posts in the series:

Now, let’s get into LogMeIn!

Jump to…

LogMeIn Overview
LogMeIn Indicators of Existence
Exe names
Domains
Folders
Windows events
Registry keys
Log files
DFIR Next Steps: How to Investigate Suspicious LogMeIn Use
How to Investigate Suspicious LogMeIn Use with Cyber Triage

LogMeIn Overview

LogMeIn is more than just the name of a tool. It’s a brand with many different cloud-based IT solutions. The LogMeIn brand is part of the larger GoTo company that includes the suite of GoTo applications (GoTo Meeting, GoTo Webinar, GoTo Training, etc.).

For the purpose of this post we will focus on the traditional LogMeIn tools that provide remote access and management capabilities.

These include: 

Notes

RemotelyAnywhere is not covered in this post. While GoTo continues to provide support for RemotelyAnywhere, licensing for the tool does not appear to be available to new customers. It has been replaced by the other LogMeIn products
The GoTo based tools will be left for future blog posts: GoToMyPC, LogMeIn Resolve (formerly known as GoTo Resolve), and GoToAssist. We chose to group Resolve with the other GoTo products instead of LogMeIn because it was historically a GoTo product that still uses the GoTo infrastructure and naming. And while GoTo continues to provide support for GoToAssist, the tool is no longer available to new customers. It has been replaced by LogMeIn Resolve.

LogMeIn Rescue

Target Use Case What Can It Do How It Can Be Abused

Ad-hoc remote support sessions for helpdesk teams, MSPs, and customer support.

Provides simple on-demand remote support with little to no setup for clients. Remote screen share can be done through a browser while remote control requires the execution of a single exe provided by the support interface. It allows screen sharing, remote control, bidirectional file transfer, and unattended access.

Rescue is more likely to be abused by tech support scammers due to its ease of use in setting up on-demand remote sessions via URLs. However, the unattended access feature can be abused by threat actors to provide persistent remote access to compromised systems.

LogMeIn Pro

Target Use Case What Can It Do How It Can Be Abused

Persistent remote access to systems for individuals or small teams.

Provides a streamlined process of obtaining persistent remote access to systems without the need of user intervention. Remote sessions provide the ability to screen share, remote control, file transfer, and console-based access.

Threat actors can either install LogMeIn on compromised systems to provide backdoor access or compromise a LogMeIn cloud account to gain access to all remote systems and abuse the currently deployed infrastructure.

LogMeIn Central

Target Use Case What Can It Do How It Can Be Abused

Remote monitoring and management of large fleets of endpoints with automation and policy control. Generally geared towards IT administrators and large MSPs.

Central uses the same technology as Pro with additional features such as scripting automation, device patching, monitoring and alerting, additional deployment methods, and is optimized for managing large fleets of devices.

Threat actors can either install LogMeIn on compromised systems to provide backdoor access or compromise a LogMeIn cloud account to gain access to all remote systems and abuse the currently deployed infrastructure.

LogMeIn Indicators of Existence

This section provides key indicators used to identify the existence of LogMeIn activity on both systems being remote controlled as well as systems initiating remote access activity.

Exe Names

Knowing the various exe names and when they are used can help identify what LogMeIn product is in use as well as the specific usage scenario.

For example: 

If we see “LMIRTechConsole.exe,” we know that LogMeIn Rescue is used on the system and that the system is being used to remote into other devices as opposed to the device being remoted into.

LogMeIn Rescue

Source*
LogMeInRescueTechnicianConsoleApp.msi

  • Description: Windows installer to install the desktop app (LMIRTechConsole.exe).
  • Known path(s): N/A
  • PE header info: N/A
LMIRTechConsole.exe

  • Description: Desktop application that provides users an interface to create and initiate outgoing connections. Alternatively one could use the web console.
  • Known path(s): C:\Program Files (x86)\LogMeIn Rescue Technician Console\LogMeInRescueTechnicianConsole_x64\
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue Technician Console
    • FileVersion: 7.50.0.3580
    • ProductVersion:  7.50.0.3580
    • InternalName: LMIRTechConsole
    • OriginalFileName: N/A
    • ProductName: LogMeIn Rescue Technician Console 7.50.0.3580
LMIGuardianSvc.exe

  • Description: Support process used to gather diagnostic information to improve the product.
  • Known path(s): C:\Program Files (x86)\LogMeIn Rescue Technician Console\LogMeInRescueTechnicianConsole_x64
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LMIGuardianSvc
    • FileVersion: 10.1.1744
    • ProductVersion: 10.1.1744
    • InternalName: LMIGuardianSvc
    • OriginalFileName: LMIGuardianSvc.exe
    • ProductName: LMIGuardianSvc
Destination**
Support-LogMeInRescue.exe

  • Description: Wrapper exe used to temporarily download and set up folder structure and needed binaries to provide remote access to the system. The exe is unique to the support session. As a result, it will not work once a support session has closed or expired. Once complete, it runs LMI_Rescue.exe and exits.
  • Known path(s): Default browser download location (ex: C:\users\*\downloads).
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue
    • FileVersion: 7.54.1313
    • ProductVersion: 7.54.1313
    • InternalName: Rescue
    • OriginalFileName: LMIRescue.exe
    • ProductName: LogMeIn Rescue
LMI_Rescue.exe

  • Description: Main interfacing exe on endpoint. Provides GUI for clients to chat with support and runs LMI_Rescue_Srv.exe.
  • Known path(s):
    • %localappdata%\LogMeIn Rescue Applet\LMIR11F70001.tmp
      Note: “11F70001” portion of the folder is randomly generated and changes for each session.
    • C:\Program Files (x86)\LogMeIn Rescue Unattended\3446163\RescueApplet7541313
      Note: “3446163” and “7541313” portions of the folder are unique and require pattern matching.
    • C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR0C4E5001.tmp
      Note: “0C4E5001” portion of the folder is randomly generated and changes for each session.
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue
    • FileVersion: 7.54.1313
    • ProductVersion: 7.54.1313
    • InternalName: Rescue
    • OriginalFileName: LMI_Rescue.exe
    • ProductName: LogMeIn Rescue
LMI_Rescue_Srv.exe

  • Description: Supporting exe that makes connections to the LogMeIn cloud infrastructure to facilitate remote sessions. It also acts as the service executable when elevating to system privileges within a session.
  • Known path(s): 
    • %localappdata%\LogMeIn Rescue Applet\LMIR11F70001.tmp
      Note: “11F70001” portion of the folder is randomly generated and changes for each session.
    • C:\Program Files (x86)\LogMeIn Rescue Unattended\3446163\RescueApplet7541313
      Note: “3446163” and “7541313” portions of the folder are unique and require pattern matching.
    • C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR0C4E5001.tmp
      Note: “0C4E5001” portion of the folder is randomly generated and changes for each session.
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue
    • FileVersion: 7.54.1313
    • ProductVersion: 7.54.1313
    • InternalName: Rescue
    • OriginalFileName: LMI_Rescue_srv.exe
    • ProductName: LogMeIn Rescue
LMI_RescueRC.exe

  • Description: A key exe to the remote support session process.
  • Known path(s):
    • %localappdata%\LogMeIn Rescue Applet\LMIR11F70001.tmp
      Note: “11F70001” portion of the folder is randomly generated and changes for each session.
    • C:\Program Files (x86)\LogMeIn Rescue Unattended\3446163\RescueApplet7541313
      Note: “3446163” and “7541313” portions of the folder are unique and require pattern matching.
    • C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR0C4E5001.tmp
      Note: “0C4E5001” portion of the folder is randomly generated and changes for each session.
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue
    • FileVersion: 7.54.1313
    • ProductVersion: 7.54.1313
    • InternalName: Rescue
    • OriginalFileName: LMI_RescueRC.exe
    • ProductName: LogMeIn Rescue
Unattended_srv.exe

  • Description: Service binary that provides persistent unattended access.
  • Known path(s):
    • C:\Program Files (x86)\LogMeIn Rescue Unattended\3446163
      Note: “3446163” portion of the folder is unique and requires pattern matching.
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue
    • FileVersion: 7.54.1313
    • ProductVersion: 7.54.1313
    • InternalName: Rescue
    • OriginalFileName: unattended.exe
    • ProductName: LogMeIn Rescue
Unattended.exe

  • Description: Service binary that provides persistent unattended access.
  • Known path(s):  
    • C:\Program Files (x86)\LogMeIn Rescue Unattended\3446163
      Note: “3446163” portion of the folder is unique and requires pattern matching.
    • %localappdata%\LogMeIn Rescue Applet\LMIR11F70001.tmp
      Note: “11F70001” portion of the folder is randomly generated and changes for each session.
    • C:\Program Files (x86)\LogMeIn Rescue Unattended\3446163\RescueApplet7541313
      Note: “3446163” and “7541313” portions of the folder are unique and require pattern matching.
    • C:\Program Files (x86)\LogMeIn Rescue Applet\LMIR0C4E5001.tmp
      Note: “0C4E5001” portion of the folder is randomly generated and changes for each session.
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Rescue
    • FileVersion: 7.54.1313
    • ProductVersion: 7.54.1313
    • InternalName: Rescue
    • OriginalFileName: unattended.exe
    • ProductName: LogMeIn Rescue

LogMeIn Pro and LogMeIn Central

Source*
LogMeInClientApp.msi

  • Description: Windows installer to install the desktop app (LMIIgnition.exe).
  • Known path(s): N/A
  • PE header info: N/A
LMIIgnition.exe

  • Description: Desktop application that provides users an interface to initiate outgoing connections. Alternatively, one could use the web console.
  • Known path(s): C:\Program Files (x86)\LogMeIn Ignition
  • PE Header Info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Client
    • FileVersion: 1.3.0.5653
    • ProductVersion: 1.3.0.5653
    • InternalName: LogMeIn Client
    • OriginalFileName: LMIIgnition.exe
    • ProductName: LogMeIn Client
LMIGuardianSvc.exe

  • Description: Non-critical support process used to gather diagnostic information to improve the product.
  • Known path(s): C:\Program Files (x86)\LogMeIn Ignition
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LMIGuardianSvc
    • FileVersion: 10.1.0.1748
    • ProductVersion: 10.1.0.1748
    • InternalName: LMIGuardianSvc
    • OriginalFileName: LMIGuardianSvc.exe
    • ProductName: LMIGuardianSvc
Destination**
LogMeIn.msi

  • Description: Windows installer to install the remote access hosting software LogMeIn.exe and its supporting binaries along with the remoting client “LMIIgnition.exe” and its supporting binaries.
  • Known path(s): N/A
  • PE header info: N/A
LogMeIn.exe

  • Description: Main exe installed on the client to allow remote access. It’s set up as a Windows service named “LogMeIn.”
  • Known path(s): 
    • C:\Program Files (x86)\LogMeIn\x64
    • C:\Program Files (x86)\LogMeIn\x86
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn
    • FileVersion: 4.1.0.1560
    • ProductVersion: 4.1.0.1560
    • InternalName: LogMeIn
    • OriginalFileName: LogMeIn.exe
    • ProductName: LogMeIn
LogMeInRC.exe

  • Description: Helps handle the remote connections. Is created by LogMeIn.exe when remote connections are incoming.
  • Known path(s): 
    • C:\Program Files (x86)\LogMeIn\x64
    • C:\Program Files (x86)\LogMeIn\x86
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Remote Control Application
    • FileVersion: 4.1.0.6884
    • ProductVersion: 4.1.0.6884
    • InternalName: LogMeIn
    • OriginalFileName: LogMeInRC.exe
    • ProductName: LogMeIn
LogMeInSystray.exe

  • Description: System tray icon with various options (connect to computer, share file, share desktop, control panel, exit).
  • Known path(s):
    • C:\Program Files (x86)\LogMeIn\x64
    • C:\Program Files (x86)\LogMeIn\x86
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Control Panel
    • FileVersion: 4.1.0.16128
    • ProductVersion: 4.1.0.16128
    • InternalName: LogMeInSystray
    • OriginalFileName: LogMeInSystray.exe
    • ProductName: LogMeIn
LogMeInToolkit.exe

  • Description: LogMeIn Control panel with options to share desktop, share file, and config options.
  • Known path(s): 
    • C:\Program Files (x86)\LogMeIn\x64
    • C:\Program Files (x86)\LogMeIn\x86
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Control Panel
    • FileVersion: 4.1.0.16128
    • ProductVersion: 4.1.0.16128
    • InternalName: LogMeInToolkit
    • OriginalFileName: LogMeInToolkit.exe
    • ProductName: LogMeIn
LMIGuardianSvc.exe

  • Description: Support process used to gather diagnostic information to improve the product and ensure it’s operating as expected. It’s set up as a service named “LMIGuardianSvc.”
  • Known path(s):
    • C:\Program Files (x86)\LogMeIn\x64
    • C:\Program Files (x86)\LogMeIn\x86
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LMIGuardianSvc
    • FileVersion: 10.1.0.1748
    • ProductVersion: 10.1.0.1748
    • InternalName: LMIGuardianSvc
    • OriginalFileName: LMIGuardianSvc.exe
    • ProductName: LMIGuardianSvc
RaMaint.exe

  • Description: Setup as a service (“LMIMaint”), unknown what it’s used for beyond some sort of maintenance activity.
  • Known path(s): 
    • C:\Program Files (x86)\LogMeIn\x64
    • C:\Program Files (x86)\LogMeIn\x86
  • PE header info:
    • CompanyName: LogMeIn, Inc.
    • FileDescription: LogMeIn Maintenance Service
    • FileVersion: 4.1.0.16128
    • ProductVersion: 4.1.0.16128
    • InternalName: LMIMaint
    • OriginalFileName: ramaint.exe
    • ProductName: LogMeIn
Notes
* Source is the machine initiating remote session.
** Destination is the machine being remote controlled.

Domains

Knowing what domains are related to LogMeIn activity enables users to determine the LogMeIn product in use and in certain scenarios the activity at hand.

For example: 

  • Some URLs are used to download setup exes onto remote endpoints to provide support.
  • Some can be used to identify when a remote session has begun.
  • Others are used for management of remote endpoints.

LogMeIn Rescue

logmeinrescue.com
Subdomain https://secure.logmeinrescue.com/Account/Login 
Details LogMeIn Rescue account logon page. Indicates that someone is attempting to log into a LogMeIn Rescue cloud account.
Subdomain https://secure.logmeinrescue.com/webtc/
Details Web console. Indicates someone has access to a LogMeIn Rescue account and is looking to access a system remotely.
Subdomain https://secure.logmeinrescue.com/TechConsole/DesktopApp/Download.aspx
Details Main download link for Rescue desktop app. It downloads LogMeInRescueTechnicianConsoleApp.msi used to remote into devices similar to the web console.
Subdomain https://secure.logmeinrescue.com/customer/code.aspx
Details Web client used to join a session. User needs to enter a support code to join the support session. If valid, leads to https://console.logmeinrescue.com/chat.
Subdomain https://console.logmeinrescue.com/connect/502050387
Details Direct link to access a support session. Number on the end is unique to each support session created. If valid, user is redirected to https://console.logmeinrescue.com/chat.
Subdomain https://console.logmeinrescue.com/chat/633941077
Details Web client in a support session.
Subdomain https://secure.logmeinrescue.com/Customer/Download.aspx?PrivateCode=269601&CompanyID=5546223&URLReferrer=https%3a%2f%2fconsole.logmeinrescue.com%2f&ClickOnceBOFlag=False
Details URL to download remote access client (Support-LogMeInRescue.exe). Users are generally prompted to click a download button to get the remote access support client when prompted by the support technician.
Subdomain https://secure.logmeinrescue.com/UnattendedAccess/Generator.aspx
Details URL to download custom-made unattended access installer made from the web console
Subdomain rsc-*****-**.logmeinrescue.com 
Details LogMeIn cloud infrastructure to handle remote sessions. Ex: rsc-www26-03.logmeinrescue.com or rsc-app26-03.logmeinrescue.com
logmeinrescue.eu
Details Same examples as logmeinrescue.com except the new domain.
logmeinrescue-enterprise.com
Details Same examples as logmeinrescue.com except the new domain.
logmein123.com 
Details Old URL that redirects to https://secure.logmeinrescue.com/Customer/Code.aspx
logmein123.eu 
Details Old URL that redirects to https://secure.logmeinrescue.eu/Customer/Code.aspx
logmein.com
Subdomain rsc-*****-**.logmeinrescue.com
Details LogMeIn cloud infrastructure. Ex: rsc-app26-04.logmein.com

LogMeIn Pro and LogMeIn Central

logmein.com
Subdomain https://secure.logmein.com/central/Central.aspx
Details Tech/IT web management console.
Subdomain https://secure.logmein.com/LogMeInClientApp.msi
Details Windows installer to make remote connections.
Subdomain https://secure.logmein.com/Logmein.msi
Details Windows installer to allow remote access to the system.
Subdomain https://secure.logmein.com/addacomputer3_msi.aspx
Details Download link for custom-configured LogMeIn.msi via the web management console.
Subdomain lmi-*****-**.logmein.com
Details LogMeIn cloud infrastructure. Ex: lmi-www26-04.logmein.com or lmi-app26-04.logmein.com.

Folders

Knowing what folders exist on a system related to LogMeIn activity can shed light on some of the following activity:

  • When the tool was first used.
  • When a remote session was initiated.
  • When a user associated an account with a management app.
  • When an app was first closed.

LogMeIn Rescue

Source*
Folder C:\Program Files*\LogMeIn Rescue Technician Console
Details Default installation location for the desktop app “LMIRTechConsole.exe” that is created by LogMeInRescueTechnicianConsoleApp.msi.
Folder C:\Users\*\AppData\LocalLow\LogMeIn Rescue
Details Created on startup of the desktop app “LMIRTechConsole.exe,” if it doesn’t already exist. Contains web app-related files and data. The .log files that do exist in the folder are not plain text.
Folder %localappdata%\LogMeIn Rescue\update
Details Created when a valid account is signed into the desktop app “LMIRTechConsole.exe,” if it doesn’t already exist. Appears to be a staging location for updates, but did not see files during testing.
Folder %localappdata%l\LogMeIn\Dumps
Details Created on exit of “LMIGuardianSvc.exe” that exits when the desktop app “LMIRTechConsole.exe” is closed, if it doesn’t already exist. Appears to be a staging location for crash dump and debug info, but did not see files during testing.
Folder C:\ProgramData\LogMeIn\Dumps
Details Created on exit of “LMIGuardianSvc.exe” that exits when the desktop app “LMIRTechConsole.exe” is closed, if it doesn’t already exist. Appears to be a staging location for crash dump and debug info, but did not see files during testing.
Destination**
Folder %localappdata%l\LogMeIn Rescue Applet\
Details Created on start of the client downloader “Support-LogMeInRescue.exe.” Used for temporary support sessions and not “unattended access” sessions. Contains subfolders (ex: LMIR0B345001.tmp), each representing a support session. Subfolders are normally cleaned up when the session is closed via bat files placed in %localappdata%. Ex: LMIR0B345001.tmp.bat and LMIR0B345001.tmp_r.bat. Subfolders contain all the relevant exes/DLLs and logs related to the session.
Folder C:\Program Files*\LogMeIn Rescue Applet\
Details Created when a support technician requests system-level access. Clients are prompted to confirm a UAC prompt to elevate privileges. Same content as the %localappdata% version. Also used when unattended access is set up. Creates a new subfolder session each time there is a connection.
Folder C:\ProgramData\LogMeIn Rescue Applet\
Details Contains temp session folders that appear to be cleaned up. Generated when unattended access is used.
Folder %localappdata%\LogMeIn Rescue Unattended\
Details Same idea as %localappdata%l\LogMeIn Rescue Applet\ except this folder is used for “unattended access” sessions. Content is not. The bat files to clean up folders are also put into C:\Program Files (x86).
Folder C:\Program Files*\LogMeIn Rescue Unattended\
Details Used when unattended access is set up.
Folder C:\ProgramData\LogMeIn Rescue Unattended\
Details Used when unattended access is set up.

LogMeIn Pro and LogMeIn Central

Source*
Folder C:\Program Files (x86)\LogMeIn Ignition
Details Default installation location for the desktop client “LMIIgnition” and its supporting binaries.
Folder %localappdata%\LogMeInIgnition
Details Created on startup of the desktop app “LMIIgnition.exe,” if the folder does not already exist.
Folder %localappdata%\LogMeInIgnition\Update
Details Created when a valid account is signed into the desktop app “LMIIgnition.exe,” if the folder does not already exist.
Folder %localappdata%l\LogMeIn\Dumps
Details Created on exit of “LMIGuardianSvc.exe” that exits when the desktop app “LMIIgnition.exe” is closed, if it doesn’t already exist. Appears to be a staging location for crash dump and debug info, but did not see files during testing.
Folder C:\ProgramData\LogMeIn\Dumps
Details Created on exit of “LMIGuardianSvc.exe” which exits when the desktop app “LMIIgnition.exe” is closed, if it doesn’t already exist. Appears to be a staging location for crash dump and debug info, but did not see files during testing.
Destination**
Folder C:\Program Files (x86)\LogMeIn
Details Default installation location for the host exe “LogMeIn.exe and its supporting binaries.
Folder C:\ProgramData\LogMeIn
Details Created when LogMeIn service first runs. This is where the service logs its activity “LogMeIn.log.”
Folder C:\Program Files (x86)\LogMeIn Ignition
Details Default installation location for the desktop client “LMIIgnition” and its supporting binaries.
Folder %localappdata%\LogMeInIgnition
Details Created on startup of the desktop app “LMIIgnition.exe,” if the folder does not already exist.
Folder %localappdata%\LogMeInIgnition\Update
Details Created when a valid account is signed into the desktop app “LMIIgnition.exe,” if the folder does not already exist.
Folder %localappdata%l\LogMeIn\Dumps
Details Created on exit of “LMIGuardianSvc.exe” that exits when the desktop app “LMIIgnition.exe” is closed, if it doesn’t already exist. Appears to be a staging location for crash dump and debug info, but did not see files during testing.
Folder C:\ProgramData\LogMeIn\Dumps
Details Created on exit of “LMIGuardianSvc.exe” which exits when the desktop app “LMIIgnition.exe” is closed, if it doesn’t already exist. Appears to be a staging location for crash dump and debug info, but did not see files during testing.

Windows Events

LogMeIn Rescue

Security Event Log
Events 4624/4625 successful/failed logon.
Details Look for logon events with a process of “LMI_Rescue_Srv.exe” or “unattended_Srv.exe” for when a user had to enter credentials to logon or requested system privilege elevation on the remote system. Logons are type 2 “local interactive,” so there will be no remote host information.

Application Event Log

Source = MSIInstaller

Event

1040/1042 installer transaction start/stop.

Details

Provides the path and name of the MSI. Search for “LogMeInRescueTechnicianConsoleApp.msi”.

Event 1033 installation status.
Details Provides product name regarding the MSI being installed and the status, if it was successful or not. Look for product name containing “LogMeIn Rescue.”
System Event Log
Events 7045 (service installed).
Details Look for services that start with “LogMeIn Rescue” that indicates either unattended access or elevation to system privileges for a temporary session.

LogMeIn Pro and LogMeIn Central

Security Event Log
Events 4624/4625 successful/failed logon.
Details Look for logon events with a process of “LogMeIn.exe” for when a user had to enter credentials to authenticate to a remote system. Logons are type 2 “local interactive,” so there will be no remote host information.

Application Event Log

Source = MSIInstaller

Event

1040/1042 installer transaction start/stop.

Details

Provides the path and name of the MSI. Search for “LogMeInClientApp.msi” or “LogMeIn.msi”.

Event 1033 installation status.
Details Provides product name regarding the MSI being installed and the status, if it was successful or not. Look for product name containing “LogMeIn.”
Source = LogMeIn
Event 104 Unsuccessful logon attempt.
Details Contains public IP that initiated the attempt.
Event 102/105 Successful logon/logoff.
Details Contains the public IP that initiated the connection and user logged on.
Event 202/205 Start/end of remote session.
Details Contains the public IP that initiated the connection and user logged on.
System Event Log
Events 7045 (service installed).
Details
  • Service Name = LMIGuardianSvc and path = C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe
  • Service Name = LogMeIn Engine Maintenance Service and path = C:\Program Files (x86)\LogMeIn\x64\ramaint.exe
  • Service Name = LogMeIn and path = C:\Program Files (x86)\LogMeIn\x64\LogMeIn.exe
  • Service Name = LogMeIn Maintenance Service and path = C:\Program Files (x86)\LogMeIn\x64\RaMaint.exe
  • Service Name = LogMeIn Kernel Information Provider and path = C:\Windows\system32\drivers\LMIInfo.sys
  • Service Name = LogMeIn Remote File System Driver and path = C:\Windows\system32\drivers\LMIRfsDriver.sys

Registry Keys

LogMeIn Rescue

Source*
HKU\Software\LogMeInRescue

  • Created on startup of “LMIRTechConsole.exe,” if it doesn’t already exist.
  • Key last write time can be used to get first run date.
HKLM\SOFTWARE\WOW6432Node\LogMeInRescue

  • Created on install of “LogMeInRescueTechnicianConsoleApp.msi,” if it doesn’t already exist (which it shouldn’t since it appears to be removed during uninstall).
  • Key last write time can be used to get install date.
Destination**
N/A

LogMeIn Pro and LogMeIn Central

Source*
HKLM\SOFTWARE\WOW6432Node\LogMeIn Ignition

  • Created on startup of “LMIIgnition.exe,” if it doesn’t already exist.
  • Contains subkeys that contain information about the linked accounts (emails).
  • Contains subkeys that can include information about remote hosts that could have been accessed).
HKU\Software\LogMeIn Ignition

  • Created on startup of “LMIIgnition.exe,” if it doesn’t already exist.
  • Key last write time can be used to get first run date.
Destination**
HKLM\SOFTWARE\LogMeIn
HKLM\SOFTWARE\LogMeIn, Inc.
HKU\Software\LogMeIn

Log files

LogMeIn Rescue

Source*
N/A
Destination**
Session.log

  • Normally, these files are cleaned up for a temporary session. But if the session folder is not cleaned up, this will contain the start and stop time of the session.
  • Found in all variations for sessions:
    • Ex: %localappdata%\LogMeIn Rescue Applet\LMIR11799001.tmp\session.log
    • Ex: C:\ProgramData\LogMeIn Rescue Applet\LMIR11799001.tmp\session.log

LogMeIn Pro and LogMeIn Central

Source*
C:\ProgramData\LogMeIn\LogMeInBrowserPlugin.log

  • Contains user running “LMIIgnition.exe”, connection time, and remote host name for remote connections.
  • Current active log.
C:\ProgramData\LogMeIn\PluginYYYYMMDD.log

  • Ex: Plugin20250827.log.
  • Older saved log for LogMeInBrowserPlugin.log.
%localappdata%\LogMeInIgnition\LogMeInIgnition.log

  • Current active log for LMIIgnition.exe. Mostly uninteresting logging info, but contains the associated email account.
%localappdata%\LogMeInIgnition\LogMeInIgnitionYYYYMMDD.log

  • Older saved log for LogMeInIgnition.log.
Destination **
C:\ProgramData\LogMeIn\LogMeIn.log

  • Current active log contains general logging info for the hosting app.
C:\ProgramData\LogMeIn\LMIYYYYMMDD.log

  • Ex: LMI20250827.log
  • Older saved log for LogMeIn.log

DFIR Next Steps: How to Investigate Suspicious LogMeIn Use

The goal of this section is to provide some investigative questions that should be answered to help determine if the LogMeIn activity on the system is expected.

4 we’ll review: 

  1. What LogMeIn product is being used?
  2. Does the organization use that LogMeIn product?
  3. Is it expected on that endpoint?
  4. Is the activity expected?

Now, let’s dig into each: 

#1 What LogMeIn product is being used?
For example, Rescue, Pro/Central, or Resolve. Various indicators previously discussed can help to identify which LogMeIn product is being used. Exe names, folder paths, installers, and web activity can be used to distinguish between Rescue and Pro/Central.
#2 Does the Organization Use that LogMeIn Product?
Yes Go to question 3
No Unauthorized LogMeIn tool found and should most likely be removed. Proceed to question 4 to determine the impact. Ex: Did a threat actor bring it in, did a disgruntled IT administrator use it for nefarious activity, or was it an employee using it without bad intentions?
#3 Is It Expected on that Endpoint?
Yes Depending on the context of the alert that triggered the investigation, you can stop here or proceed to question 4. If the alert was that an RMM tool was found running on a system, you can probably stop and tune your alerting. However, if there is other suspicious activity around the LogMeIn activity, further analysis should be performed.
No LogMeIn should be removed from the device, and proceed to question 4 to determine the impact.
#4 Is the activity expected?
There are a lot of subquestions that need to be answered to answer the bigger question of if the activity is expected.

Questions like:

  • Has LogMeIn been on the system for a long time, or is it new?
  • Are the users associated with LogMeIn activity expected?
  • Are there new or suspicious outgoing connections from the device in question?
  • Are there new or suspicious incoming connections to the device in question?
  • Is there other suspicious activity that happened before?
  • Is there other suspicious activity that happened after?

How to Investigate Suspicious LogMeIn Use with Cyber Triage

Cyber Triage can be used to find RMM tools like LogMeIn on systems without the need for analysts or responders to remember all of the various file names, folder paths, web artifacts, log files, or registry keys. That detection logic is built into Cyber Triage to automate this process so defenders can spend more time determining if the RMM tool activity is expected or not.

Cyber Triage will:

  • Detect if an RMM tool exists on the system (over 40 products).
  • Provide insight into how long the RMM tool has been on the system based on the various indicators of existence previously been mentioned.

From there, analysts can follow the next steps outlined above to determine if the activity is expected or not.

We have had engagements where Cyber Triage has flagged 3 or 4 different tools on a single endpoint. Even if these are not a result of malicious activity it can help to root out poor security practices and act as a preventative measure to better secure access to such devices.

Example of Cyber Triage detecting LogMeIn Rescue activity new to a system.
Example of Cyber Triage detecting LogMeIn Rescue activity new to a system.

Example of Cyber Triage detecting LogMeIn Rescue activity new to a system.

If you’d like to try Cyber Triage on an RMM investigation — or just to see if it speeds up your process in general — you can free for 7 days.