Edit tour

Windows Analysis Report
winvnc.exe

Overview

General Information

Sample Name:winvnc.exe
Analysis ID:1320270
MD5:7cd339f9be1417421acf8790c9738922
SHA1:c25eff4d9d2d5b55f1cc4ffc623354004565e8b9
SHA256:ec0ec7ce8ef71cb7e7d1c2418c47ad94cea8833db8578ccdf94271f8efed38d3
Tags:exe

Detection

Score:11
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Contains VNC / remote desktop functionality (version string found)
May use bcdedit to modify the Windows boot settings
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
PE file contains executable resources (Code or Archives)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • winvnc.exe (PID: 7004 cmdline: C:\Users\user\Desktop\winvnc.exe MD5: 7CD339F9BE1417421ACF8790C9738922)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: winvnc.exeStatic PE information: certificate valid
Source: winvnc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdbGCTL source: winvnc.exe
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb source: winvnc.exe
Source: winvnc.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: _02621E4.RSAString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
Source: _02621E4.RSAString found in binary or memory: http://crl.globalsign.net/root.crl0
Source: winvnc.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: winvnc.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: winvnc.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: winvnc.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: winvnc.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: winvnc.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: winvnc.exeString found in binary or memory: http://forum.uvnc.com
Source: winvnc.exeString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
Source: winvnc.exeString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
Source: winvnc.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: winvnc.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: _02621E4.RSAString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
Source: winvnc.exeString found in binary or memory: http://www.uvnc.com
Source: winvnc.exeString found in binary or memory: http://www.uvnc.comhttp://forum.uvnc.comnet
Source: winvnc.exeString found in binary or memory: https://sectigo.com/CPS0
Source: _02621E4.RSAString found in binary or memory: https://www.globalsign.com/repository/0
Source: _02621E4.RSAString found in binary or memory: https://www.globalsign.com/repository/03
Source: winvnc.exeString found in binary or memory: https://www.uvnc.com
Source: winvnc.exeBinary or memory string: OriginalFilename vs winvnc.exe
Source: winvnc.exeStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: winvnc.exeStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: winvnc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\winvnc.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\winvnc.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
Source: C:\Users\user\Desktop\winvnc.exeFile created: C:\Users\user\Desktop\UltraVNC.iniJump to behavior
Source: winvnc.exeString found in binary or memory: -install
Source: winvnc.exeString found in binary or memory: -startservice
Source: winvnc.exeString found in binary or memory: -settings-uninstall-install-securityeditor-startservice
Source: winvnc.exeString found in binary or memory: -settings-uninstall-install-securityeditor-startservice
Source: winvnc.exeString found in binary or memory: -stopservice
Source: winvnc.exeString found in binary or memory: -stopreconnect
Source: winvnc.exeString found in binary or memory: -startservicehelper
Source: winvnc.exeString found in binary or memory: -installhelper
Source: winvnc.exeString found in binary or memory: WinVNC_Win32_Instance_Mutexid:-delsoftwarecadhelper-rebootsafemodehelper-stopreconnect-autoreconnect-install-multiUTC-startservicehelpers-securityeditorhelper-openforumMVS-service-killObjectVMS-rebootsafemode-softwarecadhelperMVS-installhelper-preconnect-uninstallhelpernormal
Source: winvnc.exeString found in binary or memory: WinVNC_Win32_Instance_Mutexid:-delsoftwarecadhelper-rebootsafemodehelper-stopreconnect-autoreconnect-install-multiUTC-startservicehelpers-securityeditorhelper-openforumMVS-service-killObjectVMS-rebootsafemode-softwarecadhelperMVS-installhelper-preconnect-uninstallhelpernormal
Source: winvnc.exeString found in binary or memory: WinVNC_Win32_Instance_Mutexid:-delsoftwarecadhelper-rebootsafemodehelper-stopreconnect-autoreconnect-install-multiUTC-startservicehelpers-securityeditorhelper-openforumMVS-service-killObjectVMS-rebootsafemode-softwarecadhelperMVS-installhelper-preconnect-uninstallhelpernormal
Source: winvnc.exeString found in binary or memory: -stopservicehelper
Source: winvnc.exeString found in binary or memory: -dsmplugininstance-id:VM/CMS*.*-securityeditor-delsoftwarecad-openhomepage-stopservicehelper
Source: winvnc.exeString found in binary or memory: -settingshelper-startservice-service_run-softwarecad-run-connectstored
Source: winvnc.exeString found in binary or memory: -stopservice-rebootforce-service_rdp_runAmigaAtheOS
Source: winvnc.exeString found in binary or memory: -installdriver
Source: winvnc.exeString found in binary or memory: -dsmpluginhelperTheosaccess$-installdriver-inifilelocalshrunk
Source: winvnc.exeString found in binary or memory: winvnc [-sc_prompt] [-sc_exit] [-id:????] [-stopreconnect][-autoreconnect[ ID:????]] [-connect host[:display]] [-connect host[::port]] [-repeater host[:port]] [-inifile ????] [-run]
Source: winvnc.exeString found in binary or memory: wwinvnc [-sc_prompt] [-sc_exit] [-id:????] [-stopreconnect][-autoreconnect[ ID:????]] [-connect host[:display]] [-connect host[::port]] [-repeater host[:port]] [-inifile ????] [-run]
Source: winvnc.exeString found in binary or memory: -installhelper
Source: winvnc.exeString found in binary or memory: -stopservicehelper
Source: winvnc.exeString found in binary or memory: -startservicehelper
Source: winvnc.exeString found in binary or memory: -rebootsafemodehelper -rebootforcedehelper -uninstallhelper -installhelper -stopservicehelper -startservicehelperC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncmenu.cpp : vncMenu WM_CLOSE call - All cleanup done
Source: winvnc.exeString found in binary or memory: -rebootsafemodehelper -rebootforcedehelper -uninstallhelper -installhelper -stopservicehelper -startservicehelperC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncmenu.cpp : vncMenu WM_CLOSE call - All cleanup done
Source: winvnc.exeString found in binary or memory: -rebootsafemodehelper -rebootforcedehelper -uninstallhelper -installhelper -stopservicehelper -startservicehelperC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncmenu.cpp : vncMenu WM_CLOSE call - All cleanup done
Source: C:\Users\user\Desktop\winvnc.exeFile written: C:\Users\user\Desktop\UltraVNC.iniJump to behavior
Source: classification engineClassification label: clean11.troj.winEXE@1/1@0/1
Source: C:\Users\user\Desktop\winvnc.exeFile read: C:\Users\user\Desktop\UltraVNC.iniJump to behavior
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: C:\Users\user\Desktop\winvnc.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: C:\Users\user\Desktop\winvnc.exeWindow detected: Number of UI elements: 75
Source: winvnc.exeStatic file information: File size 3011528 > 1048576
Source: winvnc.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: winvnc.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: winvnc.exeStatic PE information: certificate valid
Source: winvnc.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x178c00
Source: winvnc.exeStatic PE information: More than 200 imports for KERNEL32.dll
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: winvnc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: winvnc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdbGCTL source: winvnc.exe
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\x64\Release\winvnc.pdb source: winvnc.exe
Source: winvnc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: winvnc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: winvnc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: winvnc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: winvnc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\winvnc.exeCode function: 0_2_00007FF612164566 push 60F5C5F1h; iretd 0_2_00007FF61216456E
Source: C:\Users\user\Desktop\winvnc.exeCode function: 0_2_00007FF612164A14 push 6FFDC5D5h; iretd 0_2_00007FF612164A1A
Source: C:\Users\user\Desktop\winvnc.exeCode function: 0_2_00007FF612164EC4 push 6FFDC5CAh; ret 0_2_00007FF612164ECA
Source: C:\Users\user\Desktop\winvnc.exeCode function: 0_2_00007FF612164F10 push 6FFDC5C3h; iretd 0_2_00007FF612164F16
Source: winvnc.exeStatic PE information: section name: _RDATA
Source: winvnc.exeBinary or memory string: bcdedit.exe
Source: winvnc.exeBinary or memory string: RegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -inifile -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootwinsta.dllWinStationConnectWLockWorkstation failed with error 0x%0lXWTSEnumerateSessionsAwtsapi32WTSFreeMemoryConsole -preconnect -service_rdp_run -service_run Global\SessionEventUltraGlobal\SessionEventUltraPreConnectGlobal\EndSessionEventGlobal\SessionUltraPreConnectsas.dllSendSASWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%dwinlogon.exeWTSEnumerateProcessesASeTcbPrivilegeRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
Source: C:\Users\user\Desktop\winvnc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winvnc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\winvnc.exe TID: 560Thread sleep time: -40000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\winvnc.exeProcess information queried: ProcessInformationJump to behavior
Source: winvnc.exeBinary or memory string: , (Hyper-V Tools)
Source: winvnc.exeBinary or memory string: , (Hyper-V Server)
Source: winvnc.exeBinary or memory string: Service Pack: 6aService Pack: 1aService Pack:%d.%dService Pack:%dService Pack:0.%d, (Storage Server Enterprise), (Storage Server Express), (Storage Server Standard), (Storage Server Workgroup), (Storage Server Essentials), (Storage Server), (Home Server Premium Edition), (Home Server Edition), (Terminal Services), (Embedded), (Terminal Services in Remote Admin Mode), (64 Bit Edition), (Media Center Edition), (Tablet PC Edition), (Compute Cluster Edition), (Foundation Edition), (MultiPoint Premium Edition), (MultiPoint Edition), (Security Appliance), (BackOffice), (N Edition), (E Edition), (Hyper-V Tools), (Hyper-V Server), (Server Core), (Uniprocessor Free), (Uniprocessor Checked), (Multiprocessor Free), (Multiprocessor Checked), (Windows Essential Business Server Manangement Server), (Windows Essential Business Server Messaging Server), (Windows Essential Business Server Security Server), (Cluster Server), (Small Business Server), (Small Business Server Premium), (Prerelease), (Evaluation), (Automotive), (China), (Single Language), (Win32s), (Education), (Industry), (Student), (Mobile), (IoT Core), (Cloud Host Infrastructure Server), (S Edition), (Cloud Storage Server), (PPI Pro), (Connected Car), (Handheld)Failed in call to GetOSVersion
Source: winvnc.exe, 00000000.00000002.2026929062.0000026FC0F05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllnn
Source: winvnc.exeBinary or memory string: Program Manager
Source: winvnc.exeBinary or memory string: Shell_TrayWnd
Source: winvnc.exeBinary or memory string: Progman
Source: winvnc.exeBinary or memory string: UltraVNC.ini -settingshelperShell_TrayWnd%dpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-00B0D07B8C7C}
Source: winvnc.exeBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitplaceholder1placeholder2restartC:\Users\rudi\Desktop\git_ultravnc\winvnc\winvnc\vncdesktop.cpp : ~vncDesktop
Source: C:\Users\user\Desktop\winvnc.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winvnc.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\winvnc.exeCode function: 0_2_00007FF6122933A8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6122933A8

Remote Access Functionality

barindex
Source: RfbProto.classString found in binary or memory: RFB 003.003
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
1
Bootkit
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
1
Remote Desktop Protocol
Data from Local SystemExfiltration Over Other Network Medium1
Remote Access Software
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Bootkit
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1320270 Sample: winvnc.exe Startdate: 05/10/2023 Architecture: WINDOWS Score: 11 10 Contains VNC / remote desktop functionality (version string found) 2->10 5 winvnc.exe 1 2->5         started        process3 dnsIp4 8 127.0.0.1 unknown unknown 5->8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
winvnc.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://www.uvnc.comhttp://forum.uvnc.comnet0%Avira URL Cloudsafe
http://java.sun.com/products/plugin/index.html#download0%Avira URL Cloudsafe
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=10%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.uvnc.comwinvnc.exefalse
    high
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0twinvnc.exefalse
    • URL Reputation: safe
    unknown
    http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1winvnc.exefalse
    • Avira URL Cloud: safe
    unknown
    https://sectigo.com/CPS0winvnc.exefalse
    • URL Reputation: safe
    unknown
    http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ywinvnc.exefalse
    • URL Reputation: safe
    unknown
    http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0winvnc.exefalse
    • URL Reputation: safe
    unknown
    http://ocsp.sectigo.com0winvnc.exefalse
    • URL Reputation: safe
    unknown
    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#winvnc.exefalse
    • URL Reputation: safe
    unknown
    http://www.uvnc.comhttp://forum.uvnc.comnetwinvnc.exefalse
    • Avira URL Cloud: safe
    unknown
    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#winvnc.exefalse
    • URL Reputation: safe
    unknown
    https://www.uvnc.comwinvnc.exefalse
      high
      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#winvnc.exefalse
      • URL Reputation: safe
      unknown
      http://java.sun.com/products/plugin/index.html#downloadwinvnc.exefalse
      • Avira URL Cloud: safe
      unknown
      http://forum.uvnc.comwinvnc.exefalse
        high
        IPDomainCountryFlagASNASN NameMalicious
        IP
        127.0.0.1
        Joe Sandbox Version:38.0.0 Ammolite
        Analysis ID:1320270
        Start date and time:2023-10-05 14:58:31 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 4m 28s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:26
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:winvnc.exe
        Detection:CLEAN
        Classification:clean11.troj.winEXE@1/1@0/1
        EGA Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, Sgrmuserer.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe, UsoClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com
        • Execution Graph export aborted for target winvnc.exe, PID 7004 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • VT rate limit hit for: winvnc.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\winvnc.exe
        File Type:Generic INItialization configuration [admin]
        Category:dropped
        Size (bytes):1405
        Entropy (8bit):5.136971285956235
        Encrypted:false
        SSDEEP:24:fJhFXNTxYgMaIUSlAdo9g9iWLseeiI2/rCcXUOFarxbgc8Gy9AJu5U7gyzn:fJzr8LUUAdTkee72/rCUUOoxMNR9i5z
        MD5:6DC1F86CBAB037EAB31C5AC9B08B7E50
        SHA1:DAEFDF1CCB059D4BCC9B553012E2E3AE989E98AB
        SHA-256:CF12B4142FAE32ABE24B8D17169F1A506669161D57C6569CE5817037F10926A4
        SHA-512:2703DDA4F77E57BBBA5C9E98D2BC0D74B49D7AC24EA6E6B172CB8FF8B500FB57D3C31ED3BAD868A88BEBC1FB9ECEC4E31102D9411F296B7279B9D744830F4154
        Malicious:false
        Reputation:low
        Preview:[Permissions]..[admin]..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=1..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..primary=1..secondary=0..SocketConnect=1..HTTPConnect=1..AutoPortSelect=1..InputsEnabled=1..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..EnableUnicodeInput=0..EnableWin8Helper=0..QuerySetting=2..QueryTimeout=10..QueryDisableTime=0..QueryAccept=0..MaxViewerSetting=0..MaxViewers=128..Collabo=0..Frame=0..Notification=0..OSD=0..NotificationSelection=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..DebugMode=0..Avilog=0..path=C:\Users\user\Desktop..DebugLevel=0..AllowLoopback=1..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowInjection=0..AllowEditClients=1..FileTransferTimeout=30..KeepAliveInterval=5..IdleInputTimeout=0..DisableTrayIcon=0..rdpmode=0..noscreensaver=0..Secure=0..MSLogonRequired=0..NewMSLogon=0..ReverseAuthRequired=1..ConnectPriority=0..service_commandline=..accept_reject_mesg
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):6.591355888492954
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:winvnc.exe
        File size:3'011'528 bytes
        MD5:7cd339f9be1417421acf8790c9738922
        SHA1:c25eff4d9d2d5b55f1cc4ffc623354004565e8b9
        SHA256:ec0ec7ce8ef71cb7e7d1c2418c47ad94cea8833db8578ccdf94271f8efed38d3
        SHA512:f118ea660a51ff38abc20a9ad16f6505cf8a862df1b564829d9af06710e0c4b91d0abbedc4b852696acf0e807a25138d82c2fc518cd54c32dba92f513467b411
        SSDEEP:49152:vAOdl4d7NHNUb75uEEbOyYWHxL9X5zT/dPUAUA/JH:El8DFWHTN
        TLSH:1AD55A16AA50989AD3A28474CD56CA76D7723C1D43F642F331E4BED73B3BA913A36301
        File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$...........Ad..Ad..Ad......Ld.......d......Sd..'.~.Nd......Rd......Md.......d......fd......Ld..Ad..Zd......@d..Ad..Tf......Zd.......d.
        Icon Hash:51ce8ecccc8ef045
        Entrypoint:0x140132ebc
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x643AC151 [Sat Apr 15 15:22:57 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:310b1cc8abef97edfcabf0ed406947cf
        Signature Valid:true
        Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 23/09/2022 02:00:00 23/09/2025 01:59:59
        Subject Chain
        • CN=uvnc bvba, O=uvnc bvba, S=Antwerpen, C=BE
        Version:3
        Thumbprint MD5:9DD4D820F2BD4C1E19D0B58E87D2E5E8
        Thumbprint SHA-1:ADC749D2F75F158C8218857FF187F81B97B3872A
        Thumbprint SHA-256:CAB069B8C7CB68F49FA0E8DCF3BECFDE320F4A241E571C2741B701EB0EC1B833
        Serial:4C03670A31E62B9FACB9D2D37039BD07
        Instruction
        dec eax
        sub esp, 28h
        call 00007F17848B6D18h
        dec eax
        add esp, 28h
        jmp 00007F17848B66AFh
        int3
        int3
        dec eax
        sub esp, 28h
        dec ebp
        mov eax, dword ptr [ecx+38h]
        dec eax
        mov ecx, edx
        dec ecx
        mov edx, ecx
        call 00007F17848B6842h
        mov eax, 00000001h
        dec eax
        add esp, 28h
        ret
        int3
        int3
        int3
        inc eax
        push ebx
        inc ebp
        mov ebx, dword ptr [eax]
        dec eax
        mov ebx, edx
        inc ecx
        and ebx, FFFFFFF8h
        dec esp
        mov ecx, ecx
        inc ecx
        test byte ptr [eax], 00000004h
        dec esp
        mov edx, ecx
        je 00007F17848B6845h
        inc ecx
        mov eax, dword ptr [eax+08h]
        dec ebp
        arpl word ptr [eax+04h], dx
        neg eax
        dec esp
        add edx, ecx
        dec eax
        arpl ax, cx
        dec esp
        and edx, ecx
        dec ecx
        arpl bx, ax
        dec edx
        mov edx, dword ptr [eax+edx]
        dec eax
        mov eax, dword ptr [ebx+10h]
        mov ecx, dword ptr [eax+08h]
        dec eax
        mov eax, dword ptr [ebx+08h]
        test byte ptr [ecx+eax+03h], 0000000Fh
        je 00007F17848B683Dh
        movzx eax, byte ptr [ecx+eax+03h]
        and eax, FFFFFFF0h
        dec esp
        add ecx, eax
        dec esp
        xor ecx, edx
        dec ecx
        mov ecx, ecx
        pop ebx
        jmp 00007F17848B5E7Ah
        int3
        dec eax
        sub esp, 48h
        dec eax
        lea ecx, dword ptr [esp+20h]
        call 00007F17848B5BBBh
        dec eax
        lea edx, dword ptr [000CF73Fh]
        dec eax
        lea ecx, dword ptr [esp+20h]
        call 00007F17848B8ADAh
        int3
        dec eax
        sub esp, 48h
        dec eax
        lea ecx, dword ptr [esp+20h]
        call 00007F178479879Bh
        dec eax
        lea edx, dword ptr [000CFA27h]
        dec eax
        lea ecx, dword ptr [eax+eax+00h]
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x202b000x4dc.rdata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x202fdc0x118.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b20000xc8328.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2a50000xbb98.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x2dcc000x27c8.rsrc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x37b0000x1240.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x1eb7a00x54.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x1eb9800x28.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1eb8000x138.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x17a0000xfa0.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x178a200x178c00False0.4302862682481752data6.547312417626284IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x17a0000x8c2da0x8c400False0.23794180314171123data5.3447528842875185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x2070000x9d5500x2200False0.20323988970588236DOS executable (block device driver \322f\324\377\3772)3.0315124359800243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x2a50000xbb980xbc00False0.4939328457446808data6.225012673580742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        _RDATA0x2b10000xf40x200False0.296875data2.416915977417612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x2b20000xc83280xc8400False0.3305182486735331data5.996399704511186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x37b0000x12400x1400False0.3951171875data5.258512641319918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        AFX_DIALOG_LAYOUT0x2d18300x2dataEnglishUnited States5.0
        AFX_DIALOG_LAYOUT0x2d18100x2dataEnglishUnited States5.0
        AFX_DIALOG_LAYOUT0x2d18280x2dataEnglishUnited States5.0
        AFX_DIALOG_LAYOUT0x2d18200x2dataEnglishUnited States5.0
        AFX_DIALOG_LAYOUT0x2d18180x2dataEnglishUnited States5.0
        AFX_DIALOG_LAYOUT0x2d18380x2dataEnglishUnited States5.0
        JAVAARCHIVE0x2bf7200x120edZip archive data, at least v2.0 to extract, compression method=deflateEnglishUnited States0.9881836003515176
        JAVAARCHIVE0x2d51400x120bfZip archive data, at least v2.0 to extract, compression method=deflateDutchBelgium0.9881897752945792
        RT_CURSOR0x2b70d00x134dataEnglishUnited States0.3961038961038961
        RT_CURSOR0x2b72200x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2b73580xcacdataEnglishUnited States0.016029593094944512
        RT_CURSOR0x2b80300x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2b81680xcacdataEnglishUnited States0.07860665844636251
        RT_CURSOR0x2b8e400x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2b8f780xcacdataEnglishUnited States0.07860665844636251
        RT_CURSOR0x2b9c500x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2b9d880xcacdataEnglishUnited States0.06966707768187423
        RT_CURSOR0x2baa600x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2bab980xcacdataEnglishUnited States0.07644882860665844
        RT_CURSOR0x2bb8700x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2bb9a80xcacdataEnglishUnited States0.07644882860665844
        RT_CURSOR0x2bc6800x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2bc7b80xcacdataEnglishUnited States0.07706535141800247
        RT_CURSOR0x2bd4900x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2bd5c80xcacdataEnglishUnited States0.07274969173859433
        RT_CURSOR0x2be2a00x134Targa image data - Map - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.13636363636363635
        RT_CURSOR0x2be3d80xcacdataEnglishUnited States0.0752157829839704
        RT_BITMAP0x2d18400x3028Device independent bitmap graphic, 64 x 64 x 24, image size 12288, resolution 2835 x 2835 px/mDutchBelgium0.4681213497728748
        RT_BITMAP0x2b34700x328Device independent bitmap graphic, 16 x 16 x 24, image size 0, resolution 3779 x 3779 px/mEnglishUnited States0.11386138613861387
        RT_BITMAP0x2b37980x328Device independent bitmap graphic, 16 x 16 x 24, image size 0, resolution 3779 x 3779 px/mEnglishUnited States0.1150990099009901
        RT_BITMAP0x2b3ac00x328Device independent bitmap graphic, 16 x 16 x 24, image size 0, resolution 3779 x 3779 px/mEnglishUnited States0.11262376237623763
        RT_BITMAP0x2d48680x39cDevice independent bitmap graphic, 17 x 17 x 24, image size 0, resolution 3780 x 3780 px/mDutchBelgium0.724025974025974
        RT_BITMAP0x2b30d00x39cDevice independent bitmap graphic, 17 x 17 x 24, image size 0, resolution 3780 x 3780 px/m0.7207792207792207
        RT_ICON0x2e72000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsDutchBelgium0.6095415778251599
        RT_ICON0x2e80a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsDutchBelgium0.7540613718411552
        RT_ICON0x2e89500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsDutchBelgium0.7292626728110599
        RT_ICON0x2e90180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsDutchBelgium0.5267341040462428
        RT_ICON0x2e95800x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336DutchBelgium0.13207533213007072
        RT_ICON0x32b5a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600DutchBelgium0.5340248962655602
        RT_ICON0x32db500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224DutchBelgium0.649859287054409
        RT_ICON0x32ebf80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400DutchBelgium0.7213114754098361
        RT_ICON0x32f5800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088DutchBelgium0.8147163120567376
        RT_ICON0x32fa700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsDutchBelgium0.6010127931769723
        RT_ICON0x3309180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsDutchBelgium0.759927797833935
        RT_ICON0x3311c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsDutchBelgium0.7695852534562212
        RT_ICON0x3318880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsDutchBelgium0.5397398843930635
        RT_ICON0x331df00x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336DutchBelgium0.13159082167056246
        RT_ICON0x373e180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600DutchBelgium0.5381742738589211
        RT_ICON0x3763c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224DutchBelgium0.6515009380863039
        RT_ICON0x3774680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400DutchBelgium0.7295081967213115
        RT_ICON0x377df00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088DutchBelgium0.8138297872340425
        RT_MENU0x2bf4200x296Matlab v4 mat-file (little endian) &, numeric, rows 7602320, columns 6357106, imaginaryEnglishUnited States0.44108761329305135
        RT_MENU0x2bf6b80x68Matlab v4 mat-file (little endian) &, numeric, rows 7602320, columns 6357106, imaginaryEnglishUnited States0.8173076923076923
        RT_DIALOG0x2b6e180x2b4dataEnglishUnited States0.49710982658959535
        RT_DIALOG0x2b4bd00x608dataEnglishUnited States0.4378238341968912
        RT_DIALOG0x2b41900x636dataEnglishUnited States0.39119496855345914
        RT_DIALOG0x2b47c80x194dataEnglishUnited States0.5767326732673267
        RT_DIALOG0x2b49600x26adataEnglishUnited States0.4854368932038835
        RT_DIALOG0x2b3de80x174dataEnglishUnited States0.5860215053763441
        RT_DIALOG0x2b3f600x22cdataEnglishUnited States0.48381294964028776
        RT_DIALOG0x2d4c080x532dataDutchBelgium0.37819548872180453
        RT_DIALOG0x2b51d80x19aedataEnglishUnited States0.33799817462731974
        RT_DIALOG0x2b6b880x28adataEnglishUnited States0.44153846153846155
        RT_STRING0x3782e00x174dataEnglishUnited States0.5080645161290323
        RT_STRING0x3784580x2a2Matlab v4 mat-file (little endian) a, numeric, rows 0, columns 0EnglishUnited States0.35756676557863504
        RT_STRING0x3787000x8d6dataEnglishUnited States0.268788682581786
        RT_STRING0x378fd80x8c4dataEnglishUnited States0.3270944741532977
        RT_STRING0x3798a00x6fcdataEnglishUnited States0.3529082774049217
        RT_GROUP_CURSOR0x2be2780x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2bd4680x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2bc6580x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2b80080x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States0.9411764705882353
        RT_GROUP_CURSOR0x2bb8480x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2baa380x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2b9c280x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2b8e180x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2bf0880x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States1.0
        RT_GROUP_CURSOR0x2b72080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
        RT_GROUP_ICON0x32f9e80x84dataDutchBelgium0.6818181818181818
        RT_GROUP_ICON0x3782580x84dataDutchBelgium0.6742424242424242
        RT_VERSION0x2bf0b00x36cdataEnglishUnited States0.4417808219178082
        RT_MANIFEST0x379fa00x387XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.40420819490586934
        DLLImport
        WS2_32.dllsetsockopt, getsockopt, WSAGetLastError, gethostbyname, inet_ntoa, htons, htonl, WSACleanup, __WSAFDIsSet, accept, bind, WSAIoctl, closesocket, select, shutdown, listen, WSAStartup, getpeername, inet_addr, getsockname, send, socket, connect, recv, ntohl, WSASendTo, gethostname
        VERSION.dllGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
        USERENV.dllExpandEnvironmentStringsForUserA, DestroyEnvironmentBlock, CreateEnvironmentBlock
        KERNEL32.dllWritePrivateProfileStringA, GetPrivateProfileStructA, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileSectionA, CreateFileMappingA, Sleep, CreateThread, MulDiv, VerSetConditionMask, VerifyVersionInfoW, ReadFile, WriteFile, OutputDebugStringA, WaitForMultipleObjects, GetEnvironmentVariableA, WaitForSingleObject, CreateFileW, GetSystemDirectoryW, SetCurrentDirectoryA, lstrcatW, LoadLibraryW, SetFileAttributesA, CreateEventA, WaitNamedPipeW, GetExitCodeProcess, ResumeThread, ResetEvent, CompareFileTime, CreateFileA, GetFileSize, GetFileTime, GetStdHandle, WriteConsoleA, FreeConsole, FormatMessageA, AllocConsole, GetExitCodeThread, MoveFileA, GetDriveTypeA, SetFileTime, SetErrorMode, SetFilePointer, SetEndOfFile, GetFileAttributesA, MoveFileExA, FileTimeToSystemTime, GetLogicalDriveStringsA, SystemTimeToFileTime, CreateDirectoryA, GetSystemTime, FlushFileBuffers, TerminateProcess, VirtualAllocEx, ReadProcessMemory, SetThreadExecutionState, VirtualFreeEx, TerminateThread, SizeofResource, FindResourceA, LockResource, LoadResource, CreateMutexA, ReleaseMutex, GlobalGetAtomNameA, GlobalDeleteAtom, GetModuleHandleW, SetProcessShutdownParameters, WinExec, WritePrivateProfileStructA, HeapReAlloc, RaiseException, FreeLibraryAndExitThread, ExitThread, GetFullPathNameW, GetCurrentDirectoryW, SetCurrentDirectoryW, SetEnvironmentVariableW, GetCPInfo, SetStdHandle, SetFilePointerEx, ReadConsoleW, GetTimeZoneInformation, GetConsoleMode, GetConsoleOutputCP, GetModuleHandleExW, ExitProcess, SystemTimeToTzSpecificLocalTime, PeekNamedPipe, GetFileInformationByHandle, GetDriveTypeW, LoadLibraryExW, RtlUnwind, EncodePointer, RtlPcToFileHeader, RtlUnwindEx, OutputDebugStringW, InitializeSListHead, QueryPerformanceCounter, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, CreateSemaphoreA, TlsFree, TlsGetValue, TlsAlloc, GetCurrentThread, DuplicateHandle, SetThreadPriority, ReleaseSemaphore, TlsSetValue, InitializeConditionVariable, WakeConditionVariable, WakeAllConditionVariable, SleepConditionVariableCS, SwitchToThread, GetFileType, lstrcatA, lstrcmpiA, lstrcpynA, DosDateTimeToFileTime, GetLocalTime, FileTimeToLocalFileTime, SetVolumeLabelA, LocalFileTimeToFileTime, GetVersion, GetLocaleInfoA, GetFullPathNameA, lstrcpyA, CompareStringW, LCMapStringW, GetLocaleInfoW, OpenProcess, FlsAlloc, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, DecodePointer, GetModuleFileNameW, GetStringTypeW, CreateDirectoryW, GetFileSizeEx, DeleteFileW, GetCurrentProcessId, WTSGetActiveConsoleSessionId, Process32FirstW, Process32Next, Process32NextW, GlobalAddAtomA, ProcessIdToSessionId, CreateToolhelp32Snapshot, Process32First, GetComputerNameA, GetSystemInfo, GetSystemDirectoryA, MapViewOfFile, OpenFileMappingA, UnmapViewOfFile, DeleteFileA, GetTempPathA, FindClose, FindNextFileA, FindFirstFileA, GetProcessTimes, GetSystemTimeAsFileTime, DeleteCriticalSection, GetModuleHandleA, InitializeCriticalSection, LeaveCriticalSection, GetCurrentProcess, EnterCriticalSection, CloseHandle, GetVersionExA, SetEvent, GetLastError, GetCurrentThreadId, OpenEventA, GetModuleFileNameA, GetTickCount, FreeLibrary, GetProcessHeap, GetProcAddress, HeapAlloc, InitializeCriticalSectionAndSpinCount, LoadLibraryA, lstrlenA, SetLastError, HeapFree, GlobalUnlock, WideCharToMultiByte, GlobalLock, GlobalFree, GetFileAttributesExW, GlobalAlloc, GlobalSize, MultiByteToWideChar, SetFileAttributesW, MoveFileExW, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, RemoveDirectoryW, HeapSize, WriteConsoleW, FlsGetValue, FlsSetValue, FlsFree, OpenThread, QueryPerformanceFrequency, LocalFree, SetThreadAffinityMask, InitializeCriticalSectionEx, GetVolumeInformationA
        USER32.dllGetSubMenu, SetMenuDefaultItem, DestroyMenu, TrackPopupMenuEx, RemoveMenu, EnableMenuItem, EnableWindow, GetWindow, VkKeyScanA, IsWindow, GetAsyncKeyState, MapVirtualKeyA, ToAscii, SendInput, SetClipboardViewer, GetClipboardOwner, WaitMessage, PostThreadMessageA, ChangeClipboardChain, SendNotifyMessageA, PeekMessageA, IsWindowVisible, LoadMenuA, GetIconInfo, GetClassNameA, WindowFromPoint, ChangeWindowMessageFilter, EnumDesktopWindows, SetRect, DrawIconEx, DestroyIcon, GetKeyboardState, mouse_event, PtInRect, MessageBeep, FlashWindow, EnumDisplaySettingsExA, EnumDisplayDevicesA, ChangeDisplaySettingsExA, GetKeyState, keybd_event, EnumDisplaySettingsA, EnumWindows, GetWindowLongA, SetWindowLongA, RedrawWindow, SetDlgItemInt, CheckDlgButton, GetDlgItemInt, IntersectRect, GetWindowRect, LoadStringA, ScreenToClient, GetScrollInfo, IsDlgButtonChecked, FillRect, MoveWindow, SetFocus, SendDlgItemMessageA, GetCursorPos, ExitWindowsEx, LockWorkStation, DrawIcon, SetLayeredWindowAttributes, UpdateWindow, InvalidateRect, GetMessageA, LoadImageA, DispatchMessageA, LoadCursorA, DestroyWindow, SetWindowPos, DrawTextA, SetWindowDisplayAffinity, AdjustWindowRect, DefWindowProcA, IsRectEmpty, CreateWindowExA, TranslateMessage, LoadIconA, GetClientRect, PostQuitMessage, RegisterClassExA, BeginPaint, EndPaint, wsprintfA, SystemParametersInfoA, GetWindowThreadProcessId, GetUserObjectInformationA, PostMessageA, RegisterWindowMessageA, FindWindowExA, OpenDesktopA, MessageBoxA, GetProcessWindowStation, FindWindowA, GetSystemMetrics, EndDialog, DialogBoxParamA, ShowWindow, GetDlgItemTextA, SetTimer, SetDlgItemTextA, SendMessageA, GetDlgItem, GetWindowLongPtrA, KillTimer, SetWindowLongPtrA, SetForegroundWindow, SetThreadDesktop, GetThreadDesktop, CloseDesktop, GetForegroundWindow, OpenInputDesktop, GetDesktopWindow, GetDC, ReleaseDC, OpenClipboard, CloseClipboard, EmptyClipboard, GetClipboardData, SetClipboardData, IsClipboardFormatAvailable, RegisterClipboardFormatA, GetTopWindow, OemToCharA, CharToOemA, wvsprintfA, SetWindowTextA
        GDI32.dllGetBitmapBits, SetDIBColorTable, GdiFlush, RealizePalette, SelectPalette, SetBkColor, CreateFontIndirectA, GetObjectA, ExtEscape, GetSystemPaletteEntries, DeleteObject, DeleteDC, GetPixel, GetDeviceCaps, GetDIBits, CreateCompatibleDC, CreateDIBSection, SelectObject, CreateCompatibleBitmap, BitBlt, CreateFontA, CreateDCA, CreateSolidBrush, Rectangle, CreatePen, SetBkMode, SetTextColor, GetClipBox, GetStockObject, StretchBlt, PatBlt, GetRgnBox, CombineRgn, PtInRegion, GetRegionData, CreateRectRgn, OffsetRgn, CreatePalette, SetRectRgn
        ADVAPI32.dllSetSecurityInfo, RegCreateKeyA, GetSecurityDescriptorSacl, SetSecurityDescriptorDacl, ConvertStringSecurityDescriptorToSecurityDescriptorA, SetSecurityDescriptorSacl, InitializeSecurityDescriptor, CreateServiceA, GetSecurityDescriptorLength, GetSecurityDescriptorDacl, GetSecurityDescriptorGroup, GetSecurityDescriptorControl, GetSecurityDescriptorOwner, IsValidSid, IsValidSecurityDescriptor, GetKernelObjectSecurity, SetKernelObjectSecurity, IsValidAcl, AdjustTokenPrivileges, StartServiceCtrlDispatcherA, QueryServiceStatus, RegDeleteKeyA, SetTokenInformation, LookupPrivilegeValueA, SetServiceStatus, RegisterServiceCtrlHandlerA, DeleteService, DuplicateTokenEx, ImpersonateLoggedOnUser, EqualSid, AllocateAndInitializeSid, FreeSid, OpenProcessToken, RevertToSelf, CloseServiceHandle, OpenSCManagerA, GetUserNameA, LookupAccountSidA, OpenServiceA, GetTokenInformation, CreateProcessAsUserA, RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, RegDeleteValueA
        SHELL32.dllShellExecuteA, SHGetMalloc, Shell_NotifyIconA, SHGetPathFromIDListA, SHGetSpecialFolderLocation, SHFileOperationA, ShellExecuteExA
        ole32.dllCoInitialize, CoCreateInstance, CoUninitialize
        SHLWAPI.dllPathStripPathA
        IMM32.dllImmGetDefaultIMEWnd
        dwmapi.dllDwmIsCompositionEnabled
        IPHLPAPI.DLLGetAdaptersInfo
        NameOrdinalAddress
        adler3210x1400d3270
        adler32_combine20x1400d3360
        adler32_z30x1400d3030
        compress40x1400d3490
        compress250x1400d3370
        compressBound60x1400d34b0
        crc3270x1400cc320
        crc32_combine80x1400cc6b0
        crc32_final90x1400cc820
        crc32_init100x1400cc7b0
        crc32_update110x1400cc7f0
        crc32_z120x1400cc260
        deflate130x1400cfe30
        deflateBound140x1400cfc50
        deflateCopy150x1400d0ab0
        deflateEnd160x1400d09a0
        deflateGetDictionary170x1400cf4e0
        deflateInit2_180x1400ceec0
        deflateInit_190x1400cee80
        deflateParams200x1400cfa00
        deflatePending210x1400cf870
        deflatePrime220x1400cf8f0
        deflateReset230x1400cf720
        deflateResetKeep240x1400cf5b0
        deflateSetDictionary250x1400cf210
        deflateSetHeader260x1400cf810
        deflateTune270x1400cfbd0
        get_crc_table280x1400cc250
        inflate290x1400ccdc0
        inflateCodesUsed300x1400cedb0
        inflateCopy310x1400ceab0
        inflateEnd320x1400ce5d0
        inflateGetDictionary330x1400ce650
        inflateGetHeader340x1400ce7e0
        inflateInit2_350x1400ccb20
        inflateInit_360x1400ccc20
        inflateMark370x1400ced30
        inflatePrime380x1400ccc30
        inflateReset390x1400cc9c0
        inflateReset2400x1400cca10
        inflateResetKeep410x1400cc910
        inflateSetDictionary420x1400ce700
        inflateSync430x1400ce8a0
        inflateSyncPoint440x1400cea60
        inflateUndermine450x1400cec90
        inflateValidate460x1400cece0
        uncompress470x1400d3010
        uncompress2480x1400d2e70
        zError490x1400d3b90
        zlibCompileFlags500x1400d3b80
        zlibVersion510x1400d3b70
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        DutchBelgium
        No network behavior found
        050100s020406080100

        Click to jump to process

        050100s0.0051015MB

        Click to jump to process

        • File
        • Registry
        • Network

        Click to dive into process behavior distribution

        Target ID:0
        Start time:14:59:18
        Start date:05/10/2023
        Path:C:\Users\user\Desktop\winvnc.exe
        Wow64 process (32bit):false
        Commandline:C:\Users\user\Desktop\winvnc.exe
        Imagebase:0x7ff612160000
        File size:3'011'528 bytes
        MD5 hash:7CD339F9BE1417421ACF8790C9738922
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

        No disassembly