Create Interactive Tour

Windows Analysis Report
SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe

Overview

General Information

Sample Name:SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Analysis ID:1309615
MD5:eafba56f876c04229c33c88a0bd964fa
SHA1:d34f886a895f190c8a2d1bf4e46cbf104358126c
SHA256:76c77a70b8ff02ec28049a28fdb538a5d663f548b48e9a449371edd4c414a15e
Tags:exe

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Multi AV Scanner detection for submitted file
Contains VNC / remote desktop functionality (version string found)
May use bcdedit to modify the Windows boot settings
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
PE file contains executable resources (Code or Archives)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeVirustotal: Detection: 8%Perma Link
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdbGCTL source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Source: _02621E4.RSAString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
Source: _02621E4.RSAString found in binary or memory: http://crl.globalsign.net/root.crl0
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: http://forum.uvnc.com
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
Source: _02621E4.RSAString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: http://www.uvnc.com
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: http://www.uvnc.comhttp://forum.uvnc.comnet
Source: _02621E4.RSAString found in binary or memory: https://www.globalsign.com/repository/0
Source: _02621E4.RSAString found in binary or memory: https://www.globalsign.com/repository/03
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: https://www.uvnc.com
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe, 00000000.00000000.304345857.00007FF6A02D0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: OriginalFilenameWinVNC.exe0 vs SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeVirustotal: Detection: 8%
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeFile created: C:\Users\user\Desktop\UltraVNC.iniJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -install
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -startservice
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -settings-uninstall-install-securityeditor-startservice
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -settings-uninstall-install-securityeditor-startservice
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -stopservice
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -stopreconnect
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -startservicehelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -installhelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: WinVNC_Win32_Instance_Mutexid:-delsoftwarecadhelper-rebootsafemodehelper-stopreconnect-autoreconnect-install-multiUTC-startservicehelpers-securityeditorhelper-openforumMVS-service-killObjectVMS-rebootsafemode-softwarecadhelperMVS-installhelper-preconnect-uninstallhelpernormal
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: WinVNC_Win32_Instance_Mutexid:-delsoftwarecadhelper-rebootsafemodehelper-stopreconnect-autoreconnect-install-multiUTC-startservicehelpers-securityeditorhelper-openforumMVS-service-killObjectVMS-rebootsafemode-softwarecadhelperMVS-installhelper-preconnect-uninstallhelpernormal
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: WinVNC_Win32_Instance_Mutexid:-delsoftwarecadhelper-rebootsafemodehelper-stopreconnect-autoreconnect-install-multiUTC-startservicehelpers-securityeditorhelper-openforumMVS-service-killObjectVMS-rebootsafemode-softwarecadhelperMVS-installhelper-preconnect-uninstallhelpernormal
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -stopservicehelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -dsmplugininstance-id:VM/CMS*.*-securityeditor-delsoftwarecad-openhomepage-stopservicehelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -settingshelper-startservice-service_run-softwarecad-run-connectstored
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -stopservice-rebootforce-service_rdp_runAmigaAtheOS
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -installdriver
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -dsmpluginhelperTheosaccess$-installdriver-inifilelocalshrunk
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: winvnc [-sc_prompt] [-sc_exit] [-id:????] [-stopreconnect][-autoreconnect[ ID:????]] [-connect host[:display]] [-connect host[::port]] [-repeater host[:port]] [-inifile ????] [-run]
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: wwinvnc [-sc_prompt] [-sc_exit] [-id:????] [-stopreconnect][-autoreconnect[ ID:????]] [-connect host[:display]] [-connect host[::port]] [-repeater host[:port]] [-inifile ????] [-run]
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -installhelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -stopservicehelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -startservicehelper
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -rebootsafemodehelper -rebootforcedehelper -uninstallhelper -installhelper -stopservicehelper -startservicehelperC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncmenu.cpp : vncMenu WM_CLOSE call - All cleanup done
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -rebootsafemodehelper -rebootforcedehelper -uninstallhelper -installhelper -stopservicehelper -startservicehelperC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncmenu.cpp : vncMenu WM_CLOSE call - All cleanup done
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeString found in binary or memory: -rebootsafemodehelper -rebootforcedehelper -uninstallhelper -installhelper -stopservicehelper -startservicehelperC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncmenu.cpp : vncMenu WM_CLOSE call - All cleanup done
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeFile written: C:\Users\user\Desktop\UltraVNC.iniJump to behavior
Source: classification engineClassification label: sus26.troj.winEXE@1/1@0/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeFile read: C:\Users\user\Desktop\UltraVNC.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeWindow detected: Number of UI elements: 75
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic file information: File size 3011584 > 1048576
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x178c00
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: More than 200 imports for KERNEL32.dll
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdbGCTL source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: real checksum: 0x2eca70 should be: 0x2e079e
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeCode function: 0_2_00007FF69FF64566 push 60F5C5F1h; iretd 0_2_00007FF69FF6456E
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeCode function: 0_2_00007FF69FF64A14 push 6FFDC5D5h; iretd 0_2_00007FF69FF64A1A
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeCode function: 0_2_00007FF69FF64EC4 push 6FFDC5CAh; ret 0_2_00007FF69FF64ECA
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeCode function: 0_2_00007FF69FF64F10 push 6FFDC5C3h; iretd 0_2_00007FF69FF64F16
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeStatic PE information: section name: _RDATA
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: bcdedit.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: RegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -inifile -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootwinsta.dllWinStationConnectWLockWorkstation failed with error 0x%0lXWTSEnumerateSessionsAwtsapi32WTSFreeMemoryConsole -preconnect -service_rdp_run -service_run Global\SessionEventUltraGlobal\SessionEventUltraPreConnectGlobal\EndSessionEventGlobal\SessionUltraPreConnectsas.dllSendSASWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%dwinlogon.exeWTSEnumerateProcessesASeTcbPrivilegeRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe TID: 2220Thread sleep time: -40000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeProcess information queried: ProcessInformationJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: , (Hyper-V Tools)
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: , (Hyper-V Server)
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: Service Pack: 6aService Pack: 1aService Pack:%d.%dService Pack:%dService Pack:0.%d, (Storage Server Enterprise), (Storage Server Express), (Storage Server Standard), (Storage Server Workgroup), (Storage Server Essentials), (Storage Server), (Home Server Premium Edition), (Home Server Edition), (Terminal Services), (Embedded), (Terminal Services in Remote Admin Mode), (64 Bit Edition), (Media Center Edition), (Tablet PC Edition), (Compute Cluster Edition), (Foundation Edition), (MultiPoint Premium Edition), (MultiPoint Edition), (Security Appliance), (BackOffice), (N Edition), (E Edition), (Hyper-V Tools), (Hyper-V Server), (Server Core), (Uniprocessor Free), (Uniprocessor Checked), (Multiprocessor Free), (Multiprocessor Checked), (Windows Essential Business Server Manangement Server), (Windows Essential Business Server Messaging Server), (Windows Essential Business Server Security Server), (Cluster Server), (Small Business Server), (Small Business Server Premium), (Prerelease), (Evaluation), (Automotive), (China), (Single Language), (Win32s), (Education), (Industry), (Student), (Mobile), (IoT Core), (Cloud Host Infrastructure Server), (S Edition), (Cloud Storage Server), (PPI Pro), (Connected Car), (Handheld)Failed in call to GetOSVersion
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe, 00000000.00000002.572221746.00000261E6FC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: Program Manager
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: Shell_TrayWnd
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: Progman
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: UltraVNC.ini -settingshelperShell_TrayWnd%dpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-00B0D07B8C7C}
Source: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitplaceholder1placeholder2restartC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncdesktop.cpp : ~vncDesktop
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exeCode function: 0_2_00007FF6A00933A8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6A00933A8

Remote Access Functionality

barindex
Source: RfbProto.classString found in binary or memory: RFB 003.003
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
1
Bootkit
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
1
Remote Desktop Protocol
Data from Local SystemExfiltration Over Other Network Medium1
Remote Access Software
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Bootkit
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1309615 Sample: SecuriteInfo.com.not-a-viru... Startdate: 17/09/2023 Architecture: WINDOWS Score: 26 10 Multi AV Scanner detection for submitted file 2->10 12 Contains VNC / remote desktop functionality (version string found) 2->12 5 SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe 1 2->5         started        process3 dnsIp4 8 127.0.0.1 unknown unknown 5->8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe0%ReversingLabs
SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe8%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://java.sun.com/products/plugin/index.html#download0%Avira URL Cloudsafe
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=10%Avira URL Cloudsafe
http://www.uvnc.comhttp://forum.uvnc.comnet0%Avira URL Cloudsafe
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=10%VirustotalBrowse
http://java.sun.com/products/plugin/index.html#download0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.uvnc.comSecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exefalse
    high
    http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exefalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://www.uvnc.comSecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exefalse
      high
      http://java.sun.com/products/plugin/index.html#downloadSecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://forum.uvnc.comSecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exefalse
        high
        http://www.uvnc.comhttp://forum.uvnc.comnetSecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exefalse
        • Avira URL Cloud: safe
        unknown
        IPDomainCountryFlagASNASN NameMalicious
        IP
        127.0.0.1
        Joe Sandbox Version:38.0.0 Beryl
        Analysis ID:1309615
        Start date and time:2023-09-17 17:38:12 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 4m 38s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
        Detection:SUS
        Classification:sus26.troj.winEXE@1/1@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 8.253.131.111, 8.252.238.254, 8.252.64.254, 8.250.103.254, 8.253.45.248, 209.197.3.8
        • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, dual-a-0001.a-msedge.net, www-bing-com.dual-a-0001.a-msedge.net, tse1.mm.bing.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, arc.msn.com, www-www.bing.com.trafficmanager.net, wu-bg-shim.trafficmanager.net
        • Execution Graph export aborted for target SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe, PID 1408 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        No simulations
        Process:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
        File Type:Generic INItialization configuration [admin]
        Category:dropped
        Size (bytes):1407
        Entropy (8bit):5.135364793594814
        Encrypted:false
        SSDEEP:24:fJhFXNTxYgMaIUSlAdo9g9iWLseeZJI2/rCcXUOFarxbgc8Gy9AJu5U7gyzn:fJzr8LUUAdTkeeZW2/rCUUOoxMNR9i5z
        MD5:BDB8C36B2807B9D721C271417D925F09
        SHA1:E6DD9833307357CEDF853E27ACED86E8A6C9CED3
        SHA-256:7979240101A8C6399A744855BA4DC97D426784659DF2281703F5BF9EFE389FB4
        SHA-512:6742763BCD2B3685D514801953D9324A3CA2D54FE26B2EE5CFB148A6940DA9B2A20BBBCCD3D804F79ED8080405AB87A6B1881443534035D072A1870BEC56B6CC
        Malicious:false
        Reputation:low
        Preview:[Permissions]..[admin]..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=1..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..primary=1..secondary=0..SocketConnect=1..HTTPConnect=1..AutoPortSelect=1..InputsEnabled=1..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..EnableUnicodeInput=0..EnableWin8Helper=0..QuerySetting=2..QueryTimeout=10..QueryDisableTime=0..QueryAccept=0..MaxViewerSetting=0..MaxViewers=128..Collabo=0..Frame=0..Notification=0..OSD=0..NotificationSelection=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..DebugMode=0..Avilog=0..path=C:\Users\user\Desktop..DebugLevel=0..AllowLoopback=1..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowInjection=0..AllowEditClients=1..FileTransferTimeout=30..KeepAliveInterval=5..IdleInputTimeout=0..DisableTrayIcon=0..rdpmode=0..noscreensaver=0..Secure=0..MSLogonRequired=0..NewMSLogon=0..ReverseAuthRequired=1..ConnectPriority=0..service_commandline=..accept_reject_me
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):6.568545613343524
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
        File size:3'011'584 bytes
        MD5:eafba56f876c04229c33c88a0bd964fa
        SHA1:d34f886a895f190c8a2d1bf4e46cbf104358126c
        SHA256:76c77a70b8ff02ec28049a28fdb538a5d663f548b48e9a449371edd4c414a15e
        SHA512:80e3dc784a25d86a3a63032ab6f66e39484e3c480b4cc94dba2d63f0f9897ac1fcd86482f5c8b078639aba617e35d20c0938c6f58869f4bc4402bc8229d46b21
        SSDEEP:49152:AAOdl4d7NHNUb75uEEbOyYWHxL9X5zT/dRSAUA/J:Zl8DFWH1
        TLSH:D9D55B16AA50989AD3A28474CD56CA76D7723C1D43F642F331E4BED73B3BA913A36301
        File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$...........Ad..Ad..Ad......Ld.......d......Sd..'.~.Nd......Rd......Md.......d......fd......Ld..Ad..Zd......@d..Ad..Tf......Zd.......d.
        Icon Hash:499669d8d82916a8
        Entrypoint:0x140132ebc
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x643AC151 [Sat Apr 15 15:22:57 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:310b1cc8abef97edfcabf0ed406947cf
        Signature Valid:
        Signature Issuer:
        Signature Validation Error:
        Error Number:
        Not Before, Not After
          Subject Chain
            Version:
            Thumbprint MD5:
            Thumbprint SHA-1:
            Thumbprint SHA-256:
            Serial:
            Instruction
            dec eax
            sub esp, 28h
            call 00007F1BB891FBE8h
            dec eax
            add esp, 28h
            jmp 00007F1BB891F57Fh
            int3
            int3
            dec eax
            sub esp, 28h
            dec ebp
            mov eax, dword ptr [ecx+38h]
            dec eax
            mov ecx, edx
            dec ecx
            mov edx, ecx
            call 00007F1BB891F712h
            mov eax, 00000001h
            dec eax
            add esp, 28h
            ret
            int3
            int3
            int3
            inc eax
            push ebx
            inc ebp
            mov ebx, dword ptr [eax]
            dec eax
            mov ebx, edx
            inc ecx
            and ebx, FFFFFFF8h
            dec esp
            mov ecx, ecx
            inc ecx
            test byte ptr [eax], 00000004h
            dec esp
            mov edx, ecx
            je 00007F1BB891F715h
            inc ecx
            mov eax, dword ptr [eax+08h]
            dec ebp
            arpl word ptr [eax+04h], dx
            neg eax
            dec esp
            add edx, ecx
            dec eax
            arpl ax, cx
            dec esp
            and edx, ecx
            dec ecx
            arpl bx, ax
            dec edx
            mov edx, dword ptr [eax+edx]
            dec eax
            mov eax, dword ptr [ebx+10h]
            mov ecx, dword ptr [eax+08h]
            dec eax
            mov eax, dword ptr [ebx+08h]
            test byte ptr [ecx+eax+03h], 0000000Fh
            je 00007F1BB891F70Dh
            movzx eax, byte ptr [ecx+eax+03h]
            and eax, FFFFFFF0h
            dec esp
            add ecx, eax
            dec esp
            xor ecx, edx
            dec ecx
            mov ecx, ecx
            pop ebx
            jmp 00007F1BB891ED4Ah
            int3
            dec eax
            sub esp, 48h
            dec eax
            lea ecx, dword ptr [esp+20h]
            call 00007F1BB891EA8Bh
            dec eax
            lea edx, dword ptr [000CF73Fh]
            dec eax
            lea ecx, dword ptr [esp+20h]
            call 00007F1BB89219AAh
            int3
            dec eax
            sub esp, 48h
            dec eax
            lea ecx, dword ptr [esp+20h]
            call 00007F1BB880166Bh
            dec eax
            lea edx, dword ptr [000CFA27h]
            dec eax
            lea ecx, dword ptr [eax+eax+00h]
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x202b000x4dc.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x202fdc0x118.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b20000xcabb4.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2a50000xbb98.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x2dcc000x27c8.rsrc
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x37d0000x1240.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x1eb7a00x54.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x1eb9800x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1eb8000x138.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x17a0000xfa0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x178a200x178c00False0.4302862682481752data6.547312417626284IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x17a0000x8c2da0x8c400False0.23794180314171123data5.3447528842875185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x2070000x9d5500x2200False0.20323988970588236DOS executable (block device driver \322f\324\377\3772)3.0315124359800243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x2a50000xbb980xbc00False0.4939328457446808data6.225012673580742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            _RDATA0x2b10000xf40x200False0.296875data2.416915977417612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x2b20000xcabb40xcac00False0.3262537569358816data5.944617712006417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x37d0000x12400x1400False0.3951171875data5.258512641319918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            AFX_DIALOG_LAYOUT0x2b31ec0x2dataEnglishUnited States5.0
            AFX_DIALOG_LAYOUT0x2b31f00x2dataEnglishUnited States5.0
            AFX_DIALOG_LAYOUT0x2b31f40x2dataEnglishUnited States5.0
            AFX_DIALOG_LAYOUT0x2b31f80x2dataEnglishUnited States5.0
            AFX_DIALOG_LAYOUT0x2b31fc0x2dataEnglishUnited States5.0
            AFX_DIALOG_LAYOUT0x2b32000x2dataEnglishUnited States5.0
            JAVAARCHIVE0x2b32040x120edZip archive data, at least v2.0 to extract, compression method=deflateEnglishUnited States0.9881836003515176
            JAVAARCHIVE0x2c52f40x120bfZip archive data, at least v2.0 to extract, compression method=deflateDutchBelgium0.9881897752945792
            RT_CURSOR0x2d73b40x134dataEnglishUnited States0.3961038961038961
            RT_CURSOR0x2d74e80x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2d761c0xcacdataEnglishUnited States0.016029593094944512
            RT_CURSOR0x2d82c80x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2d83fc0xcacdataEnglishUnited States0.07860665844636251
            RT_CURSOR0x2d90a80x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2d91dc0xcacdataEnglishUnited States0.07860665844636251
            RT_CURSOR0x2d9e880x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2d9fbc0xcacdataEnglishUnited States0.06966707768187423
            RT_CURSOR0x2dac680x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2dad9c0xcacdataEnglishUnited States0.07644882860665844
            RT_CURSOR0x2dba480x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2dbb7c0xcacdataEnglishUnited States0.07644882860665844
            RT_CURSOR0x2dc8280x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2dc95c0xcacdataEnglishUnited States0.07706535141800247
            RT_CURSOR0x2dd6080x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2dd73c0xcacdataEnglishUnited States0.07274969173859433
            RT_CURSOR0x2de3e80x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
            RT_CURSOR0x2de51c0xcacdataEnglishUnited States0.0752157829839704
            RT_BITMAP0x2df1c80x3028Device independent bitmap graphic, 64 x 64 x 24, image size 12288, resolution 2835 x 2835 px/mDutchBelgium0.004299156391953277
            RT_BITMAP0x2e21f00x328Device independent bitmap graphic, 16 x 16 x 24, image size 0, resolution 3779 x 3779 px/mEnglishUnited States0.11386138613861387
            RT_BITMAP0x2e25180x328Device independent bitmap graphic, 16 x 16 x 24, image size 0, resolution 3779 x 3779 px/mEnglishUnited States0.1150990099009901
            RT_BITMAP0x2e28400x328Device independent bitmap graphic, 16 x 16 x 24, image size 0, resolution 3779 x 3779 px/mEnglishUnited States0.11262376237623763
            RT_BITMAP0x2e2b680x39cDevice independent bitmap graphic, 17 x 17 x 24, image size 0, resolution 3780 x 3780 px/mDutchBelgium0.724025974025974
            RT_BITMAP0x2e2f040x39cDevice independent bitmap graphic, 17 x 17 x 24, image size 0, resolution 3780 x 3780 px/m0.7207792207792207
            RT_ICON0x2e32a00x1b8ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9167848029486816
            RT_ICON0x2e4e300x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.299390243902439
            RT_ICON0x2e54980x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.478494623655914
            RT_ICON0x2e57800x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 00.48155737704918034
            RT_ICON0x2e59680x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.597972972972973
            RT_ICON0x2e5a900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsDutchBelgium0.6095415778251599
            RT_ICON0x2e69380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsDutchBelgium0.7540613718411552
            RT_ICON0x2e71e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsDutchBelgium0.7292626728110599
            RT_ICON0x2e78a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsDutchBelgium0.5267341040462428
            RT_ICON0x2e7e100x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336DutchBelgium0.13207533213007072
            RT_ICON0x329e380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600DutchBelgium0.5340248962655602
            RT_ICON0x32c3e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224DutchBelgium0.649859287054409
            RT_ICON0x32d4880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400DutchBelgium0.7213114754098361
            RT_ICON0x32de100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088DutchBelgium0.8147163120567376
            RT_ICON0x32e2780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsDutchBelgium0.6010127931769723
            RT_ICON0x32f1200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsDutchBelgium0.759927797833935
            RT_ICON0x32f9c80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsDutchBelgium0.7695852534562212
            RT_ICON0x3300900x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsDutchBelgium0.5397398843930635
            RT_ICON0x3305f80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336DutchBelgium0.13159082167056246
            RT_ICON0x3726200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600DutchBelgium0.5381742738589211
            RT_ICON0x374bc80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224DutchBelgium0.6515009380863039
            RT_ICON0x375c700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400DutchBelgium0.7295081967213115
            RT_ICON0x3765f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088DutchBelgium0.8138297872340425
            RT_MENU0x376a600x296Matlab v4 mat-file (little endian) &, numeric, rows 7602320, columns 6357106, imaginaryEnglishUnited States0.44108761329305135
            RT_MENU0x376cf80x68Matlab v4 mat-file (little endian) &, numeric, rows 7602320, columns 6357106, imaginaryEnglishUnited States0.8173076923076923
            RT_DIALOG0x376d600x2b4dataEnglishUnited States0.49710982658959535
            RT_DIALOG0x3770140x608dataEnglishUnited States0.4378238341968912
            RT_DIALOG0x37761c0x636dataEnglishUnited States0.39119496855345914
            RT_DIALOG0x377c540x194dataEnglishUnited States0.5767326732673267
            RT_DIALOG0x377de80x26adataEnglishUnited States0.4854368932038835
            RT_DIALOG0x3780540x174dataEnglishUnited States0.5860215053763441
            RT_DIALOG0x3781c80x22cdataEnglishUnited States0.48381294964028776
            RT_DIALOG0x3783f40x532dataDutchBelgium0.37819548872180453
            RT_DIALOG0x3789280x19aedataEnglishUnited States0.33799817462731974
            RT_DIALOG0x37a2d80x28adataEnglishUnited States0.44153846153846155
            RT_STRING0x37a5640x174dataEnglishUnited States0.5080645161290323
            RT_STRING0x37a6d80x2a2Matlab v4 mat-file (little endian) a, numeric, rows 0, columns 0EnglishUnited States0.35756676557863504
            RT_STRING0x37a97c0x8d6dataEnglishUnited States0.268788682581786
            RT_STRING0x37b2540x8c4dataEnglishUnited States0.3270944741532977
            RT_STRING0x37bb180x6fcdataEnglishUnited States0.3529082774049217
            RT_GROUP_CURSOR0x37c2140x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c2380x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c25c0x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c2800x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States0.9411764705882353
            RT_GROUP_CURSOR0x37c2a40x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c2c80x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c2ec0x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c3100x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c3340x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
            RT_GROUP_CURSOR0x37c3580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
            RT_GROUP_ICON0x37c36c0x4cdata0.75
            RT_GROUP_ICON0x37c3b80x84dataDutchBelgium0.6818181818181818
            RT_GROUP_ICON0x37c43c0x84dataDutchBelgium0.6742424242424242
            RT_VERSION0x37c4c00x36cdataEnglishUnited States0.4417808219178082
            RT_MANIFEST0x37c82c0x387XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.40420819490586934
            DLLImport
            WS2_32.dllsetsockopt, getsockopt, WSAGetLastError, gethostbyname, inet_ntoa, htons, htonl, WSACleanup, __WSAFDIsSet, accept, bind, WSAIoctl, closesocket, select, shutdown, listen, WSAStartup, getpeername, inet_addr, getsockname, send, socket, connect, recv, ntohl, WSASendTo, gethostname
            VERSION.dllGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
            USERENV.dllExpandEnvironmentStringsForUserA, DestroyEnvironmentBlock, CreateEnvironmentBlock
            KERNEL32.dllWritePrivateProfileStringA, GetPrivateProfileStructA, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileSectionA, CreateFileMappingA, Sleep, CreateThread, MulDiv, VerSetConditionMask, VerifyVersionInfoW, ReadFile, WriteFile, OutputDebugStringA, WaitForMultipleObjects, GetEnvironmentVariableA, WaitForSingleObject, CreateFileW, GetSystemDirectoryW, SetCurrentDirectoryA, lstrcatW, LoadLibraryW, SetFileAttributesA, CreateEventA, WaitNamedPipeW, GetExitCodeProcess, ResumeThread, ResetEvent, CompareFileTime, CreateFileA, GetFileSize, GetFileTime, GetStdHandle, WriteConsoleA, FreeConsole, FormatMessageA, AllocConsole, GetExitCodeThread, MoveFileA, GetDriveTypeA, SetFileTime, SetErrorMode, SetFilePointer, SetEndOfFile, GetFileAttributesA, MoveFileExA, FileTimeToSystemTime, GetLogicalDriveStringsA, SystemTimeToFileTime, CreateDirectoryA, GetSystemTime, FlushFileBuffers, TerminateProcess, VirtualAllocEx, ReadProcessMemory, SetThreadExecutionState, VirtualFreeEx, TerminateThread, SizeofResource, FindResourceA, LockResource, LoadResource, CreateMutexA, ReleaseMutex, GlobalGetAtomNameA, GlobalDeleteAtom, GetModuleHandleW, SetProcessShutdownParameters, WinExec, WritePrivateProfileStructA, HeapReAlloc, RaiseException, FreeLibraryAndExitThread, ExitThread, GetFullPathNameW, GetCurrentDirectoryW, SetCurrentDirectoryW, SetEnvironmentVariableW, GetCPInfo, SetStdHandle, SetFilePointerEx, ReadConsoleW, GetTimeZoneInformation, GetConsoleMode, GetConsoleOutputCP, GetModuleHandleExW, ExitProcess, SystemTimeToTzSpecificLocalTime, PeekNamedPipe, GetFileInformationByHandle, GetDriveTypeW, LoadLibraryExW, RtlUnwind, EncodePointer, RtlPcToFileHeader, RtlUnwindEx, OutputDebugStringW, InitializeSListHead, QueryPerformanceCounter, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, CreateSemaphoreA, TlsFree, TlsGetValue, TlsAlloc, GetCurrentThread, DuplicateHandle, SetThreadPriority, ReleaseSemaphore, TlsSetValue, InitializeConditionVariable, WakeConditionVariable, WakeAllConditionVariable, SleepConditionVariableCS, SwitchToThread, GetFileType, lstrcatA, lstrcmpiA, lstrcpynA, DosDateTimeToFileTime, GetLocalTime, FileTimeToLocalFileTime, SetVolumeLabelA, LocalFileTimeToFileTime, GetVersion, GetLocaleInfoA, GetFullPathNameA, lstrcpyA, CompareStringW, LCMapStringW, GetLocaleInfoW, OpenProcess, FlsAlloc, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, DecodePointer, GetModuleFileNameW, GetStringTypeW, CreateDirectoryW, GetFileSizeEx, DeleteFileW, GetCurrentProcessId, WTSGetActiveConsoleSessionId, Process32FirstW, Process32Next, Process32NextW, GlobalAddAtomA, ProcessIdToSessionId, CreateToolhelp32Snapshot, Process32First, GetComputerNameA, GetSystemInfo, GetSystemDirectoryA, MapViewOfFile, OpenFileMappingA, UnmapViewOfFile, DeleteFileA, GetTempPathA, FindClose, FindNextFileA, FindFirstFileA, GetProcessTimes, GetSystemTimeAsFileTime, DeleteCriticalSection, GetModuleHandleA, InitializeCriticalSection, LeaveCriticalSection, GetCurrentProcess, EnterCriticalSection, CloseHandle, GetVersionExA, SetEvent, GetLastError, GetCurrentThreadId, OpenEventA, GetModuleFileNameA, GetTickCount, FreeLibrary, GetProcessHeap, GetProcAddress, HeapAlloc, InitializeCriticalSectionAndSpinCount, LoadLibraryA, lstrlenA, SetLastError, HeapFree, GlobalUnlock, WideCharToMultiByte, GlobalLock, GlobalFree, GetFileAttributesExW, GlobalAlloc, GlobalSize, MultiByteToWideChar, SetFileAttributesW, MoveFileExW, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, RemoveDirectoryW, HeapSize, WriteConsoleW, FlsGetValue, FlsSetValue, FlsFree, OpenThread, QueryPerformanceFrequency, LocalFree, SetThreadAffinityMask, InitializeCriticalSectionEx, GetVolumeInformationA
            USER32.dllGetSubMenu, SetMenuDefaultItem, DestroyMenu, TrackPopupMenuEx, RemoveMenu, EnableMenuItem, EnableWindow, GetWindow, VkKeyScanA, IsWindow, GetAsyncKeyState, MapVirtualKeyA, ToAscii, SendInput, SetClipboardViewer, GetClipboardOwner, WaitMessage, PostThreadMessageA, ChangeClipboardChain, SendNotifyMessageA, PeekMessageA, IsWindowVisible, LoadMenuA, GetIconInfo, GetClassNameA, WindowFromPoint, ChangeWindowMessageFilter, EnumDesktopWindows, SetRect, DrawIconEx, DestroyIcon, GetKeyboardState, mouse_event, PtInRect, MessageBeep, FlashWindow, EnumDisplaySettingsExA, EnumDisplayDevicesA, ChangeDisplaySettingsExA, GetKeyState, keybd_event, EnumDisplaySettingsA, EnumWindows, GetWindowLongA, SetWindowLongA, RedrawWindow, SetDlgItemInt, CheckDlgButton, GetDlgItemInt, IntersectRect, GetWindowRect, LoadStringA, ScreenToClient, GetScrollInfo, IsDlgButtonChecked, FillRect, MoveWindow, SetFocus, SendDlgItemMessageA, GetCursorPos, ExitWindowsEx, LockWorkStation, DrawIcon, SetLayeredWindowAttributes, UpdateWindow, InvalidateRect, GetMessageA, LoadImageA, DispatchMessageA, LoadCursorA, DestroyWindow, SetWindowPos, DrawTextA, SetWindowDisplayAffinity, AdjustWindowRect, DefWindowProcA, IsRectEmpty, CreateWindowExA, TranslateMessage, LoadIconA, GetClientRect, PostQuitMessage, RegisterClassExA, BeginPaint, EndPaint, wsprintfA, SystemParametersInfoA, GetWindowThreadProcessId, GetUserObjectInformationA, PostMessageA, RegisterWindowMessageA, FindWindowExA, OpenDesktopA, MessageBoxA, GetProcessWindowStation, FindWindowA, GetSystemMetrics, EndDialog, DialogBoxParamA, ShowWindow, GetDlgItemTextA, SetTimer, SetDlgItemTextA, SendMessageA, GetDlgItem, GetWindowLongPtrA, KillTimer, SetWindowLongPtrA, SetForegroundWindow, SetThreadDesktop, GetThreadDesktop, CloseDesktop, GetForegroundWindow, OpenInputDesktop, GetDesktopWindow, GetDC, ReleaseDC, OpenClipboard, CloseClipboard, EmptyClipboard, GetClipboardData, SetClipboardData, IsClipboardFormatAvailable, RegisterClipboardFormatA, GetTopWindow, OemToCharA, CharToOemA, wvsprintfA, SetWindowTextA
            GDI32.dllGetBitmapBits, SetDIBColorTable, GdiFlush, RealizePalette, SelectPalette, SetBkColor, CreateFontIndirectA, GetObjectA, ExtEscape, GetSystemPaletteEntries, DeleteObject, DeleteDC, GetPixel, GetDeviceCaps, GetDIBits, CreateCompatibleDC, CreateDIBSection, SelectObject, CreateCompatibleBitmap, BitBlt, CreateFontA, CreateDCA, CreateSolidBrush, Rectangle, CreatePen, SetBkMode, SetTextColor, GetClipBox, GetStockObject, StretchBlt, PatBlt, GetRgnBox, CombineRgn, PtInRegion, GetRegionData, CreateRectRgn, OffsetRgn, CreatePalette, SetRectRgn
            ADVAPI32.dllSetSecurityInfo, RegCreateKeyA, GetSecurityDescriptorSacl, SetSecurityDescriptorDacl, ConvertStringSecurityDescriptorToSecurityDescriptorA, SetSecurityDescriptorSacl, InitializeSecurityDescriptor, CreateServiceA, GetSecurityDescriptorLength, GetSecurityDescriptorDacl, GetSecurityDescriptorGroup, GetSecurityDescriptorControl, GetSecurityDescriptorOwner, IsValidSid, IsValidSecurityDescriptor, GetKernelObjectSecurity, SetKernelObjectSecurity, IsValidAcl, AdjustTokenPrivileges, StartServiceCtrlDispatcherA, QueryServiceStatus, RegDeleteKeyA, SetTokenInformation, LookupPrivilegeValueA, SetServiceStatus, RegisterServiceCtrlHandlerA, DeleteService, DuplicateTokenEx, ImpersonateLoggedOnUser, EqualSid, AllocateAndInitializeSid, FreeSid, OpenProcessToken, RevertToSelf, CloseServiceHandle, OpenSCManagerA, GetUserNameA, LookupAccountSidA, OpenServiceA, GetTokenInformation, CreateProcessAsUserA, RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, RegDeleteValueA
            SHELL32.dllShellExecuteA, SHGetMalloc, Shell_NotifyIconA, SHGetPathFromIDListA, SHGetSpecialFolderLocation, SHFileOperationA, ShellExecuteExA
            ole32.dllCoInitialize, CoCreateInstance, CoUninitialize
            SHLWAPI.dllPathStripPathA
            IMM32.dllImmGetDefaultIMEWnd
            dwmapi.dllDwmIsCompositionEnabled
            IPHLPAPI.DLLGetAdaptersInfo
            NameOrdinalAddress
            adler3210x1400d3270
            adler32_combine20x1400d3360
            adler32_z30x1400d3030
            compress40x1400d3490
            compress250x1400d3370
            compressBound60x1400d34b0
            crc3270x1400cc320
            crc32_combine80x1400cc6b0
            crc32_final90x1400cc820
            crc32_init100x1400cc7b0
            crc32_update110x1400cc7f0
            crc32_z120x1400cc260
            deflate130x1400cfe30
            deflateBound140x1400cfc50
            deflateCopy150x1400d0ab0
            deflateEnd160x1400d09a0
            deflateGetDictionary170x1400cf4e0
            deflateInit2_180x1400ceec0
            deflateInit_190x1400cee80
            deflateParams200x1400cfa00
            deflatePending210x1400cf870
            deflatePrime220x1400cf8f0
            deflateReset230x1400cf720
            deflateResetKeep240x1400cf5b0
            deflateSetDictionary250x1400cf210
            deflateSetHeader260x1400cf810
            deflateTune270x1400cfbd0
            get_crc_table280x1400cc250
            inflate290x1400ccdc0
            inflateCodesUsed300x1400cedb0
            inflateCopy310x1400ceab0
            inflateEnd320x1400ce5d0
            inflateGetDictionary330x1400ce650
            inflateGetHeader340x1400ce7e0
            inflateInit2_350x1400ccb20
            inflateInit_360x1400ccc20
            inflateMark370x1400ced30
            inflatePrime380x1400ccc30
            inflateReset390x1400cc9c0
            inflateReset2400x1400cca10
            inflateResetKeep410x1400cc910
            inflateSetDictionary420x1400ce700
            inflateSync430x1400ce8a0
            inflateSyncPoint440x1400cea60
            inflateUndermine450x1400cec90
            inflateValidate460x1400cece0
            uncompress470x1400d3010
            uncompress2480x1400d2e70
            zError490x1400d3b90
            zlibCompileFlags500x1400d3b80
            zlibVersion510x1400d3b70
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            DutchBelgium
            No network behavior found
            • File
            • Registry
            • Network

            Click to dive into process behavior distribution

            Target ID:0
            Start time:17:39:05
            Start date:17/09/2023
            Path:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win32.UltraVNC.gen.27745.639.exe
            Imagebase:0x7ff69ff60000
            File size:3'011'584 bytes
            MD5 hash:EAFBA56F876C04229C33C88A0BD964FA
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:false
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

            No disassembly