OnlineDestek.exe is part of UltraVncSC and developed by UltraVnc according to the OnlineDestek.exe version information.
OnlineDestek.exe's description is "UltraVnc Self-Extract Setup"
OnlineDestek.exe is digitally signed by uvnc bvba.
OnlineDestek.exe is usually located in the 'c:\downloads\' folder.
Some of the anti-virus scanners at VirusTotal detected OnlineDestek.exe.
If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.
The following is the available information on OnlineDestek.exe:
Property | Value |
---|---|
Product name | UltraVncSC |
Company name | UltraVnc |
File description | UltraVnc Self-Extract Setup |
Internal name | UltraVncSC |
Original filename | UltraVncSC |
Legal copyright | Copyright (C) UltraVnc |
Product version | 4, 10, 0, 1 |
File version | 4, 10, 0, 1 |
Here's a screenshot of the file properties when displayed by Windows Explorer:
Product name | UltraVncSC |
Company name | UltraVnc |
File description | UltraVnc Self-Extract Setup |
Internal name | UltraVncSC |
Original filename | UltraVncSC |
Legal copyright | Copyright (C) UltraVnc |
Product version | 4, 10, 0, 1 |
File version | 4, 10, 0, 1 |
OnlineDestek.exe has a valid digital signature.
Property | Value |
---|---|
Signer name | uvnc bvba |
Certificate issuer name | GlobalSign ObjectSign CA |
Certificate serial number | 0100000000012eca04f7a4 |
10 of the 68 anti-virus programs at VirusTotal detected the OnlineDestek.exe file. That's a 15% detection rate.
Scanner | Detection Name |
---|---|
Antiy-AVL | Trojan[RemoteAdmin]/Win32.WinVNC-based |
Bkav | W32.HfsAdware.E071 |
DrWeb | Program.RemoteAdmin.690 |
eGambit | not-a-virus:Generic.Malware |
Fortinet | Riskware/WinVNC_based |
Jiangmin | RemoteAdmin.WinVNC-based.dv |
Kaspersky | not-a-virus:RemoteAdmin.Win32.WinVNC-based.c |
Qihoo-360 | Win32/Virus.RemoteAdmin.52c |
Yandex | Riskware.RemoteAdmin! |
ZoneAlarm | not-a-virus:RemoteAdmin.Win32.WinVNC-based.c |
The following information was gathered by executing the file inside Cuckoo Sandbox.
Successfully executed process in sandbox.
{ "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico" ], "directory_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp" ], "dll_loaded": [ "C:\\Windows\\syswow64\\MSCTF.dll", "kernel32.dll", "UxTheme.dll", "OLEAUT32.DLL", "C:\\Windows\\system32\\ole32.dll", "dwmapi.dll", "comctl32", "C:\\Windows\\system32\\uxtheme.dll", "comctl32.dll" ], "file_opened": [ "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{8613E14C-D0C0-4161-AC0F-1DD2563286BC}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\MS Shell Dlg", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{C1EE01F2-B3B6-4A6A-9DDD-E988C088EC82}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F25E9F57-2FC8-4EB3-A41A-CCE5F08541E6}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{07EB03D6-B001-41DF-9192-BF9B841EE71F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\KnownClasses", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{AE6BE008-07FB-400D-8BEB-337A64F7051F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\CTF\\DirectSwitchHotkeys", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\Compatibility\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F89E9E58-BD2F-4008-9AC2-0F816C09F4EE}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{3697C5FA-60DD-4B56-92D4-74A569205C16}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{531FDEBF-9B4C-4A43-A2AA-960E8FCDC732}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{A028AE76-01B1-46C2-99C4-ACD9858AE02F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\Compatibility\\winvnc.exe", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{81D4E9C9-1D3B-41BC-9E6C-4B40BF79E35E}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{03B5835F-F03C-411B-9CE2-AA23E1171E36}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{78CB5B0E-26ED-4FCC-854C-77E8F3D1AA80}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico" ], "file_failed": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp" ], "command_line": [ ".\\winvnc.exe " ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin" ], "regkey_read": [ "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Language Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\CTF\\EnableAnchorContext", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\TurnOffSPIAnimations", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes\\Segoe UI", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Hotkey", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Layout Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}\\Enable", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes\\MS Sans Serif", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\UseDoubleClickTimer" ], "directory_enumerated": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "C:\\Users\\cuck\\AppData", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "C:\\Users", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "C:\\Users\\cuck\\AppData\\Local", "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico" ] }
[ { "yara": [], "sha1": "287b840f6bd10a05922d9ded005eda53128efe12", "name": "5ffb6b4b753e5915_winvnc.exe", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "sha256": "5ffb6b4b753e5915516c03f91e6cd09dcfdc87004ce3ecdd2e3e8d51bc0bea72", "urls": [ "http:\/\/secure.globalsign.net\/cacert\/ObjectSign.crt09", "http:\/\/www.globalsign.net\/repository09", "http:\/\/crl.globalsign.net\/Root.crl0", "http:\/\/www.globalsign.net\/repository\/0", "http:\/\/crl.globalsign.net\/Timestamping1.crl0", "http:\/\/crl.globalsign.net\/ObjectSign.crl0", "http:\/\/www.globalsign.net\/repository\/03", "http:\/\/crl.globalsign.net\/root.crl0", "http:\/\/crl.globalsign.net\/primobject.crl0N", "http:\/\/secure.globalsign.net\/cacert\/PrimObject.crt0" ], "crc32": "AB854CC5", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/5ffb6b4b753e5915_winvnc.exe", "ssdeep": null, "size": 257784, "sha512": "19a1052731f8780dac7855454d38685a0e11a898c98c0138c8dcad722f34f9e50f34bbcad5915bf62886942934795d5907e2be081ce84639d415f14aa368db28", "pids": [ 2740 ], "md5": "40a21759f5ad164f5c58e3c4c1a30ede" }, { "yara": [], "sha1": "0ed2b1511139a649b11d8d9217f7b6eb930018df", "name": "30544004aa76c16b_background.bmp", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "type": "PC bitmap, Windows 3.x format, 1 x 283 x 24", "sha256": "30544004aa76c16bd88e4674c0826a1beb37c5baccfb4a8b2aa7f6e7400296e6", "urls": [], "crc32": "EC4921D7", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/30544004aa76c16b_background.bmp", "ssdeep": null, "size": 1188, "sha512": "b607157522721a9f94d896457d4fc00c313e35e210d3f3d61caa42f508f419d76bfc3c050fa0ea94597e37bc9ccf6c7ed38cb0b10ad801ae4fb6d378fc91c47c", "pids": [ 2740 ], "md5": "93f636c3397ca48faf5fcac334c6d528" }, { "yara": [], "sha1": "ce13a5c6e04671fc89338f22e945ab3bbdb194dd", "name": "1bc006753c808422_vnchooks.dll", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "type": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "sha256": "1bc006753c808422dfe1ac61c834d7ecb14c2a981c4cfef33f52ffe5965558e5", "urls": [], "crc32": "EED3A4BA", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/1bc006753c808422_vnchooks.dll", "ssdeep": null, "size": 53248, "sha512": "75cb50ed1e17818f36f45d8bb2431a43bb2ad95ccca5a58152c25e579aa99174d6461c88627006a5788b39f595e83ef647b092759f464b29ecdb09440b097061", "pids": [ 2740 ], "md5": "aa5174fdf8dede1a7a51e87f0d923d37" }, { "yara": [], "sha1": "28d830831ac4276b63bda468339c519eab19a755", "name": "200ccda0c4b1cefe_icon2.ico", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "type": "MS Windows icon resource - 1 icon, 32x25", "sha256": "200ccda0c4b1cefeca05e7930a884b2a2066087772bcfc0d044012884ca1b15e", "urls": [], "crc32": "AF399C73", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/200ccda0c4b1cefe_icon2.ico", "ssdeep": null, "size": 2562, "sha512": "45faeaa0086c64a4b76bb9faa0a569202f76e113fdcc84fd8fd7daee109afd684882d196cfece5c56418d16525b75bdda81242266c32b8ba2a2d063a47044e33", "pids": [ 2740 ], "md5": "52428b0c3b17b4a1806c9d9db2f1d5ae" }, { "yara": [], "sha1": "29ffbb4dc8d9133d06304dc1f08a7df30e7c2163", "name": "508e41cbaf5e5c85_enter.bmp", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "type": "PC bitmap, Windows 3.x format, 235 x 213 x 4", "sha256": "508e41cbaf5e5c853daaa522349a12e090e0fc3b1b9955c554452898521f9eea", "urls": [], "crc32": "31DDF917", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/508e41cbaf5e5c85_enter.bmp", "ssdeep": null, "size": 25678, "sha512": "7ac735ff1775a7af85f522449f3d8152d3208acda23e933384e38c36a61b104151c539443fc1f54290d4d2ff885542dc9573019138bcea90fe39901f30d480ba", "pids": [ 2740 ], "md5": "3e5826ae1c7e2c98d1e716781556fa38" }, { "yara": [], "sha1": "7bfd1407b6778abcb8e8388f60da83959cbf4ab8", "name": "1fef605307dd83ee_msrc4plugin.dsm", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "type": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "sha256": "1fef605307dd83ee2757c9840eeba432e993c556350ba546f77fb67c47d4a4ff", "urls": [], "crc32": "7B7E04C7", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/1fef605307dd83ee_msrc4plugin.dsm", "ssdeep": null, "size": 61440, "sha512": "8721150d95615b84863f926affeccfc2f200b402d34a23e72e3e35a83a7bf4889c0a7fdeb953a978744dd6983016e9367d8d4c41e1357448cdfa58e4f7f92927", "pids": [ 2740 ], "md5": "14a5b8e321193ceb6afac399e6102a11" }, { "yara": [], "sha1": "25318f84512d35a3efcc1c95281fc81f4af13a1d", "name": "8118e0ecd7fd7912_helpdesk.txt", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "type": "ISO-8859 text, with CRLF line terminators", "sha256": "8118e0ecd7fd7912bd8bcc3a9ec2e81628a05a621afa28e5ee285e2f82b38f59", "urls": [ "http:\/\/www.zirveyazilim.net" ], "crc32": "E3304E81", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/8118e0ecd7fd7912_helpdesk.txt", "ssdeep": null, "size": 3664, "sha512": "e5e08df0355d7cf0b9b29e94def9e28c6dfaf4c94ae15ed99a1ed0b97dfbb26551465fb1eebcc6b76e4e016530f1e88919daf6b8ec180f41cc87a2551d5e6fc5", "pids": [ 2740 ], "md5": "13ac6267ff929f9735ab71a5f4d51d83" }, { "yara": [], "sha1": "76227d64e77915a9e4784eb0e72b506508217384", "name": "1c2278fcc94937d8_rc4.key", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "type": "data", "sha256": "1c2278fcc94937d8da144aa3755f377669b68994606779ba7bfea13aeaf4bbb4", "urls": [], "crc32": "87CFF497", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/1c2278fcc94937d8_rc4.key", "ssdeep": null, "size": 87, "sha512": "be15b097f10f55e95d0e0ea21d5803fbc46a63c30b4d011b4d4a7d725dec2cf8ad7fb3656e458abbda7cc0ec740641f9ad3fe3b094997ca16d0309b831e8e3b9", "pids": [ 2740 ], "md5": "2d8c13f3a2a64be257131796e9a63156" }, { "yara": [], "sha1": "b3f4420308a2df51666e7742df42679f6fbe41d1", "name": "256f4231d4de6106_schook.dll", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "type": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "sha256": "256f4231d4de6106a8c20c46bcb25f02f4cfccf49e855b770568da450b3bb73b", "urls": [], "crc32": "DF00CD13", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/256f4231d4de6106_schook.dll", "ssdeep": null, "size": 32768, "sha512": "0a853f38343bec54002048c0d39123211d836b6037103b851b71f32cedf76b1c0107f0187fae03e8004e8db35684c5b86f7e55c20b5b91d556d012014d4b3634", "pids": [ 2740 ], "md5": "93b72ddd73f9a7dc8d3dd9e0e54a3701" }, { "yara": [], "sha1": "151b9d1b711a31c2446d364b900bef69b5810e28", "name": "6285f1e7a7ca0447_logo.bmp", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "type": "PC bitmap, Windows 3.x format, 196 x 181 x 8", "sha256": "6285f1e7a7ca04479737c25dafd987d8a5c9d8b4ed29c0cb3d51603055453de0", "urls": [], "crc32": "1F68905E", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/6285f1e7a7ca0447_logo.bmp", "ssdeep": null, "size": 36556, "sha512": "c1fe19764a91991bf4af3a60ffa529f45628f9404e4467de5d0353bc2b01ae858a3973743f3ae4e385791146a27c80f3e6622deff1b6c89ad1310c8e6fa01c10", "pids": [ 2740 ], "md5": "04e5513a3bfa62f6076e28241f17f9d2" }, { "yara": [], "sha1": "34f60803f1f99746ad8f7898c62638b950d2478e", "name": "686c858c2231d207_icon1.ico", "filepath": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico", "type": "MS Windows icon resource - 1 icon, 32x25", "sha256": "686c858c2231d207321ae8053e4e2c23c1ef4909e670239a60dc637684b227fc", "urls": [], "crc32": "8A27C43D", "path": "\/home\/hpuser\/.cuckoo\/storage\/analyses\/6305\/files\/686c858c2231d207_icon1.ico", "ssdeep": null, "size": 2562, "sha512": "83faa52536f2b08d3c0aba583c935721ade60f93fd23013e1053d8899ef0fdadca66158e898927ea5f33c9952f062265f8ada5309fc7577d929db40a2a00465e", "pids": [ 2740 ], "md5": "208de4e633193e83a5c49eafa13f1434" } ]
[ { "process_path": "C:\\Windows\\System32\\lsass.exe", "process_name": "lsass.exe", "pid": 476, "summary": {}, "first_seen": 1585000386.328125, "ppid": 376 }, { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "process_name": "5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "pid": 2740, "summary": { "file_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico" ], "directory_created": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp" ], "dll_loaded": [ "C:\\Windows\\syswow64\\MSCTF.dll", "kernel32.dll", "OLEAUT32.DLL", "C:\\Windows\\system32\\ole32.dll", "dwmapi.dll", "C:\\Windows\\system32\\uxtheme.dll", "comctl32.dll" ], "file_opened": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{8613E14C-D0C0-4161-AC0F-1DD2563286BC}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F25E9F57-2FC8-4EB3-A41A-CCE5F08541E6}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{07EB03D6-B001-41DF-9192-BF9B841EE71F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\KnownClasses", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{AE6BE008-07FB-400D-8BEB-337A64F7051F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{C1EE01F2-B3B6-4A6A-9DDD-E988C088EC82}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\Compatibility\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F89E9E58-BD2F-4008-9AC2-0F816C09F4EE}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{3697C5FA-60DD-4B56-92D4-74A569205C16}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{531FDEBF-9B4C-4A43-A2AA-960E8FCDC732}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{A028AE76-01B1-46C2-99C4-ACD9858AE02F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\CTF\\DirectSwitchHotkeys", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{81D4E9C9-1D3B-41BC-9E6C-4B40BF79E35E}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{03B5835F-F03C-411B-9CE2-AA23E1171E36}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback\\MS Shell Dlg", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{78CB5B0E-26ED-4FCC-854C-77E8F3D1AA80}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}" ], "file_written": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico" ], "file_failed": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp" ], "command_line": [ ".\\winvnc.exe " ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin" ], "regkey_read": [ "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Language Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\CTF\\EnableAnchorContext", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Hotkey", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Layout Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}\\Enable", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1" ], "directory_enumerated": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\enter.bmp", "C:\\Users\\cuck\\AppData", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\rc4.key", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon2.ico", "C:\\Users", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "C:\\Users\\cuck\\AppData\\Local", "C:\\Users\\cuck\\AppData\\Local\\Temp\\5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7.bin", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\icon1.ico" ] }, "first_seen": 1585000386.671875, "ppid": 1664 }, { "process_path": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "process_name": "winvnc.exe", "pid": 2204, "summary": { "file_opened": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\logo.bmp", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt", "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\background.bmp", "C:\\Windows\\Globalization\\Sorting\\sortdefault.nls" ], "file_read": [ "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\helpdesk.txt" ], "regkey_opened": [ "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{8613E14C-D0C0-4161-AC0F-1DD2563286BC}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{C1EE01F2-B3B6-4A6A-9DDD-E988C088EC82}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F25E9F57-2FC8-4EB3-A41A-CCE5F08541E6}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{07EB03D6-B001-41DF-9192-BF9B841EE71F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\KnownClasses", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{AE6BE008-07FB-400D-8BEB-337A64F7051F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{E429B25A-E5D3-4D1F-9BE3-0C608477E3A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_CURRENT_USER\\Software\\Microsoft\\CTF\\DirectSwitchHotkeys", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{F89E9E58-BD2F-4008-9AC2-0F816C09F4EE}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{DCBD6FA8-032F-11D3-B5B1-00C04FC324A1}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{3697C5FA-60DD-4B56-92D4-74A569205C16}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{531FDEBF-9B4C-4A43-A2AA-960E8FCDC732}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{A028AE76-01B1-46C2-99C4-ACD9858AE02F}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\Compatibility\\winvnc.exe", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{81D4E9C9-1D3B-41BC-9E6C-4B40BF79E35E}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{03B5835F-F03C-411B-9CE2-AA23E1171E36}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}", "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{78CB5B0E-26ED-4FCC-854C-77E8F3D1AA80}\\Category\\Category\\{534C48C1-0607-4098-A521-4FC899C73E90}" ], "regkey_read": [ "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Language Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\CTF\\EnableAnchorContext", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\TurnOffSPIAnimations", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Locale\\00000409", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes\\Segoe UI", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Hotkey", "HKEY_CURRENT_USER\\Keyboard Layout\\Toggle\\Layout Hotkey", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\CTF\\TIP\\{0000897b-83df-4b96-be07-0fb58b01c4a4}\\LanguageProfile\\0x00000000\\{0001bea3-ed56-483d-a2e2-aeae25577436}\\Enable", "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes\\MS Sans Serif", "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Control\\Nls\\Language Groups\\1", "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\UseDoubleClickTimer" ], "dll_loaded": [ "C:\\Windows\\syswow64\\MSCTF.dll", "kernel32.dll", "UxTheme.dll", "OLEAUT32.DLL", "C:\\Windows\\system32\\ole32.dll", "dwmapi.dll", "comctl32", "C:\\Windows\\system32\\uxtheme.dll", "comctl32.dll" ] }, "first_seen": 1585000387.25, "ppid": 2740 } ]
[ { "markcount": 2, "families": [], "description": "Checks if process is being debugged by a debugger", "severity": 1, "marks": [ { "call": { "category": "system", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741771, "api": "IsDebuggerPresent", "return_value": 0, "arguments": {}, "time": 1585000386.780875, "tid": 2436, "flags": {} }, "pid": 2740, "type": "call", "cid": 196 }, { "call": { "category": "system", "status": 0, "stacktrace": [], "last_error": 0, "nt_status": -1073741515, "api": "IsDebuggerPresent", "return_value": 0, "arguments": {}, "time": 1585000387.375, "tid": 2096, "flags": {} }, "pid": 2204, "type": "call", "cid": 70 } ], "references": [], "name": "checks_debugger" }, { "markcount": 1, "families": [], "description": "The executable uses a known packer", "severity": 1, "marks": [ { "category": "packer", "ioc": "Armadillo v1.71", "type": "ioc", "description": null } ], "references": [], "name": "peid_packer" }, { "markcount": 1, "families": [], "description": "Allocates read-write-execute memory (usually to unpack itself)", "severity": 2, "marks": [ { "call": { "category": "process", "status": 1, "stacktrace": [], "api": "NtProtectVirtualMemory", "return_value": 0, "arguments": { "process_identifier": 2204, "stack_dep_bypass": 0, "stack_pivoted": 0, "heap_dep_bypass": 0, "length": 4096, "protection": 64, "process_handle": "0xffffffff", "base_address": "0x74ad1000" }, "time": 1585000387.406, "tid": 2096, "flags": { "protection": "PAGE_EXECUTE_READWRITE" } }, "pid": 2204, "type": "call", "cid": 317 } ], "references": [], "name": "allocates_rwx" }, { "markcount": 4, "families": [], "description": "Drops an executable to the user AppData folder", "severity": 2, "marks": [ { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\winvnc.exe", "type": "ioc", "description": null }, { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\vnchooks.dll", "type": "ioc", "description": null }, { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\MSRC4Plugin.dsm", "type": "ioc", "description": null }, { "category": "file", "ioc": "C:\\Users\\cuck\\AppData\\Local\\Temp\\7zS573C.tmp\\SCHook.dll", "type": "ioc", "description": null } ], "references": [], "name": "exe_appdata" } ]
The Yara rules did not detect anything in the file.
{ "tls": [], "udp": [ { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 546, "time": 3.078503131866455, "dport": 137, "sport": 137 }, { "src": "192.168.56.101", "dst": "192.168.56.255", "offset": 5226, "time": 9.078723192214966, "dport": 138, "sport": 138 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 7070, "time": 3.018226146697998, "dport": 5355, "sport": 51001 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 7398, "time": 1.0776491165161133, "dport": 5355, "sport": 53595 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 7726, "time": 3.0259921550750732, "dport": 5355, "sport": 53848 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 8054, "time": 1.5812170505523682, "dport": 5355, "sport": 54255 }, { "src": "192.168.56.101", "dst": "224.0.0.252", "offset": 8382, "time": -0.08776092529296875, "dport": 5355, "sport": 55314 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 8710, "time": 1.612403154373169, "dport": 1900, "sport": 1900 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 28120, "time": 1.1127891540527344, "dport": 3702, "sport": 49152 }, { "src": "192.168.56.101", "dst": "239.255.255.250", "offset": 36504, "time": 3.1257731914520264, "dport": 1900, "sport": 53598 } ], "dns_servers": [], "http": [], "icmp": [], "smtp": [], "tcp": [], "smtp_ex": [], "mitm": [], "hosts": [], "pcap_sha256": "a6154c6736779361ae92c807be82ae10d698d6e42a756b7754b6562035907c5c", "dns": [], "http_ex": [], "domains": [], "dead_hosts": [], "sorted_pcap_sha256": "5610fe256a385844d62b5d220afbdf32d24be458749ee8cf61a657a76e59e2ee", "irc": [], "https_ex": [] }
The instructions below shows how to remove OnlineDestek.exe with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the OnlineDestek.exe file for removal, restart your computer and scan it again to verify that OnlineDestek.exe has been successfully removed. Here are the removal instructions in more detail:
Property | Value |
---|---|
MD5 | 8b29e40c1b77bab49396e14b31afc7d9 |
SHA256 | 5be3526754960a32eb70918cb90ae6bce350d8c21b2304aaff3b27c889530fa7 |
These are some of the error messages that can appear related to onlinedestek.exe:
onlinedestek.exe has encountered a problem and needs to close. We are sorry for the inconvenience.
onlinedestek.exe - Application Error. The instruction at "0xXXXXXXXX" referenced memory at "0xXXXXXXXX". The memory could not be "read/written". Click on OK to terminate the program.
UltraVnc Self-Extract Setup has stopped working.
End Program - onlinedestek.exe. This program is not responding.
onlinedestek.exe is not a valid Win32 application.
onlinedestek.exe - Application Error. The application failed to initialize properly (0xXXXXXXXX). Click OK to terminate the application.
To help other users, please let us know what you will do with the file:
Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.
I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.
No comments posted yet.