Share via

cannot get ScreenConnect.WindowsAuthenticationPackage.dll to delete

Fox Glen Gate Guard 25 Reputation points
2026-05-01T15:58:00.6033333+00:00

This is on a computer that has multiple users, most with zero net security sense, but I do run anti-virus software. This is associated with a virus (I think!) that got installed somehow and I have successfully deleted all of the other files in the directory, except this one, before, but the files were apparently reinstalled roughly a month later somehow. I can eventually get rid of of the other files, but this <expletive deleted> refuses to die. I have done all of the takeown, remove-item -force, stop-service, stop-process, etc. that everyone, i.e. the Google AI, recommends and all that I ever get is :

PS C:\Program Files (x86)\ScreenConnect Client (cae8a7eb97fb2c95)> remove-item -path ".\ScreenConnect.WindowsAuthenticationPackage.dll" -force remove-item : Cannot remove item C:\Program Files (x86)\ScreenConnect Client (cae8a7eb97fb2c95)\ScreenConnect.WindowsAuthenticationPackage.dll: Access to the path 'C:\Program Files (x86)\ScreenConnect Client (cae8a7eb97fb2c95)\ScreenConnect.WindowsAuthenticationPackage.dll' is denied. At line:1 char:1

  • remove-item -path ".\ScreenConnect.WindowsAuthenticationPackage.dll" ...
  •     + CategoryInfo          : PermissionDenied: (C:\Program File...tionPackage.dll:FileInfo) [Remove-Item], Unauthoriz
       edAccessException
        + FullyQualifiedErrorId : RemoveFileSystemItemUnAuthorizedAccess,Microsoft.PowerShell.Commands.RemoveItemCommand
    

PS C:\Program Files (x86)\ScreenConnect Client (cae8a7eb97fb2c95)>

Help!

Windows for home | Windows 11 | Files, folders, and storage
0 comments No comments

Answer accepted by question author

  1. Thomas4-N 15,705 Reputation points Microsoft External Staff Moderator
    2026-05-02T13:04:50.06+00:00

    Hello Fox Glen Gate Guard,

    I'm sorry for the headache. Based on what you've described, this looks like it could be a scammer-installed ScreenConnect (ConnectWise) rather than a traditional virus — though the effect is similar in that someone may have had remote access to the machine. The AI's subinacl suggestion was probably the wrong path; this doesn't really look like an ACL problem.

    The likely reason ScreenConnect.WindowsAuthenticationPackage.dll refuses to delete is that, judging by the name, it appears to be registered as a Windows LSA Authentication Package. If that's the case, lsass.exe loads it at every boot from HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Authentication Packages into its own (protected) process, which would hold the file open the entire session. takeown and remove-item -force can't break a live lock held by a protected SYSTEM process — Windows just reports "Access denied", which is misleading. The "reinstall a month later" behavior could be the ScreenConnect service self-healing, or possibly the attacker reconnecting.

    Here's a path that should be worth trying:

    1. Try a proper uninstall of the ScreenConnect client first

    Open Programs and Features and look for ScreenConnect Client (cae8a7eb97fb2c95). If it's there, uninstall it. If it's hidden from the list (common with scam installs), open an elevated Command Prompt and run sc delete "ScreenConnect Client (cae8a7eb97fb2c95)", then reboot.

    2. Check the LSA registration so the DLL stops loading

    Open regedit as admin and go to HKLM\SYSTEM\CurrentControlSet\Control\Lsa. In the multi-string value Authentication Packages, see if anything references ScreenConnect.WindowsAuthenticationPackage — if so, remove that line so only the defaults (e.g. msv1_0) remain. Reboot. Once lsass no longer loads it, the DLL should just be an ordinary file you can delete normally.

    3. Clean up leftovers

    Delete the folder C:\Program Files (x86)\ScreenConnect Client (cae8a7eb97fb2c95), then in regedit do Ctrl+F and search for ScreenConnect and the thumbprint cae8a7eb97fb2c95 and remove matching entries.

    However, because this is a multi-user PC, the file has been coming back for at least a month, and a remote-access tool ended up installed without consent, it's probably safer to assume the machine could be compromised beyond just this one DLL — keyloggers, stored credentials, browser sessions, and other backdoors are all possibilities. The safest course is likely to back up personal files, change important passwords from a different device, and do a Reset This PC > Remove everything (or a clean Windows install).

    Hope this helps you finally close the door on it.


    If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".  

    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread. 

    Was this answer helpful?

    2 people found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Fox Glen Gate Guard 25 Reputation points
    2026-05-01T16:26:10.4533333+00:00

    The AI gave me a long and seemingly thorough response which said to use subinacl to solve the problem (It deleted all of the response, conveniently, but I luckily had their recommended command line in my clipboard): subinacl /onlyfile "\?\C:\Program Files (x86)\ScreenConnect Client (cae8a7eb97fb2c95)\ScreenConnect.WindowsAuthenticationPackage.dll" /setowner=DOMAIN\Administrator /grant=DOMAIN\Administrator=F. The problem being, the system doesn't know what subinacl even is, so it didn't work. Plus, when I first entered the question, it sure didn't look like the format that is in now (a lesson learned). The AI took a shot and missed. Anybody else want to try,... please?

    Was this answer helpful?

    1 person found this answer helpful.
    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.