Static | ZeroBOX

PE Compile Time

2017-01-06 04:50:13

PE Imphash

d3a62971944197f0701c7049a9c739d1

PEiD Signatures

Armadillo v1.71

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000efda 0x0000f000 6.05672615116
.rdata 0x00010000 0x00004a92 0x00005000 5.36766026635
.data 0x00015000 0x00000c24 0x00001000 0.576465171893
.rsrc 0x00016000 0x00000f94 0x00001000 6.6645850685

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x000160fc 0x00000ca8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_RCDATA 0x00016da4 0x000001d9 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x00016f80 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x41006c GetModuleFileNameA
0x410070 GetLongPathNameA
0x410074 CreateMutexA
0x410078 OpenMutexA
0x41007c Process32Next
0x410080 Process32First
0x410088 SizeofResource
0x41008c LockResource
0x410090 LoadResource
0x410094 FindResourceA
0x410098 GetLocaleInfoA
0x41009c Process32NextW
0x4100a0 Process32FirstW
0x4100a4 lstrlenA
0x4100a8 GetDriveTypeA
0x4100ac CreateProcessA
0x4100b0 GetTickCount
0x4100b4 GlobalUnlock
0x4100b8 GlobalLock
0x4100bc GlobalAlloc
0x4100c0 WinExec
0x4100c4 GetCurrentProcessId
0x4100c8 CreateDirectoryW
0x4100cc CopyFileA
0x4100d0 GetFileAttributesW
0x4100d8 GetCurrentProcess
0x4100dc ResumeThread
0x4100e0 SetThreadContext
0x4100e4 WriteProcessMemory
0x4100e8 VirtualAllocEx
0x4100ec ReadProcessMemory
0x4100f0 GetThreadContext
0x4100f4 VirtualAlloc
0x4100f8 GlobalFree
0x4100fc LocalAlloc
0x410100 TerminateProcess
0x410104 ReadFile
0x410108 PeekNamedPipe
0x41010c GetStdHandle
0x410110 CreatePipe
0x410114 OpenProcess
0x410118 DuplicateHandle
0x41011c GetCurrentThread
0x410120 lstrcpynA
0x410124 ExitProcess
0x410128 AllocConsole
0x41012c GetStartupInfoA
0x410134 FindFirstFileA
0x410138 FindNextFileA
0x41013c GetLastError
0x410140 LoadLibraryA
0x410144 GetProcAddress
0x410148 CreateFileMappingA
0x41014c MapViewOfFileEx
0x410150 DeleteFileA
0x410154 RemoveDirectoryA
0x410158 CloseHandle
0x41015c GetFileAttributesA
0x410160 SetFileAttributesA
0x410164 SetEvent
0x410168 TerminateThread
0x41016c FindFirstFileW
0x410170 FindNextFileW
0x410174 FindClose
0x410178 GetLocalTime
0x41017c CreateEventA
0x410180 WaitForSingleObject
0x410184 CreateDirectoryA
0x410188 ExitThread
0x41018c Sleep
0x410190 GetModuleHandleA
0x410194 DeleteFileW
0x410198 CreateThread
Library USER32.dll:
0x4103e0 GetForegroundWindow
0x4103e4 UnhookWindowsHookEx
0x4103e8 CloseClipboard
0x4103ec GetClipboardData
0x4103f0 OpenClipboard
0x4103f4 SetClipboardData
0x4103f8 EmptyClipboard
0x4103fc ExitWindowsEx
0x410400 MessageBoxA
0x41040c ShowWindow
0x410410 CloseWindow
0x410414 GetWindowTextA
0x410418 GetWindowTextW
0x41041c EnumWindows
0x410420 SendInput
0x410424 CreateWindowExA
0x410428 RegisterClassExA
0x41042c AppendMenuA
0x410430 CreatePopupMenu
0x410434 TrackPopupMenu
0x410438 SetForegroundWindow
0x41043c GetCursorPos
0x410440 DefWindowProcA
0x410444 GetKeyState
0x410448 CallNextHookEx
0x41044c SetWindowsHookExA
0x410450 GetMessageA
0x410454 TranslateMessage
0x410458 GetKeyboardLayout
0x41045c FindWindowA
0x410460 DispatchMessageA
0x410464 IsWindowVisible
Library GDI32.dll:
0x410040 CreateDCA
0x410044 CreateCompatibleDC
0x410048 GetDeviceCaps
0x410050 SelectObject
0x410054 StretchBlt
0x410058 GetObjectA
0x41005c GetDIBits
0x410060 DeleteObject
0x410064 DeleteDC
Library ADVAPI32.dll:
0x410000 OpenProcessToken
0x41000c RegCreateKeyExA
0x410010 RegQueryInfoKeyA
0x410014 RegEnumKeyExA
0x410018 RegEnumValueA
0x41001c RegDeleteValueA
0x410020 RegCreateKeyA
0x410024 RegSetValueExA
0x410028 RegOpenKeyExA
0x41002c RegDeleteKeyA
0x410030 RegCloseKey
0x410034 RegQueryValueExA
0x410038 GetUserNameW
Library SHELL32.dll:
0x4103bc ShellExecuteA
0x4103c0 ExtractIconA
0x4103c4 Shell_NotifyIconA
0x4103c8 ShellExecuteExA
0x4103cc ShellExecuteW
Library MSVCP60.dll:
Library MSVCRT.dll:
0x410308 _wrename
0x41030c _controlfp
0x410310 __set_app_type
0x410314 __p__fmode
0x410318 __p__commode
0x41031c _adjust_fdiv
0x410320 __setusermatherr
0x410324 _initterm
0x410328 __getmainargs
0x41032c _acmdln
0x410330 _XcptFilter
0x410334 _exit
0x410338 _onexit
0x41033c __dllonexit
0x410344 _iob
0x410348 freopen
0x41034c srand
0x410350 rand
0x410354 mbstowcs
0x410358 realloc
0x41035c _itoa
0x410360 sprintf
0x410364 getenv
0x410368 toupper
0x41036c tolower
0x410370 wcscmp
0x410374 printf
0x410378 strncmp
0x41037c malloc
0x410380 free
0x410384 _EH_prolog
0x410388 __CxxFrameHandler
0x41038c time
0x410390 localtime
0x410394 strftime
0x410398 puts
0x41039c atoi
0x4103a0 _ftol
0x4103a4 ??2@YAPAXI@Z
0x4103a8 _except_handler3
0x4103ac exit
0x4103b4 _CxxThrowException
Library WINMM.dll:
0x410480 waveInOpen
0x410484 waveInStop
0x410488 waveInClose
0x41048c waveInAddBuffer
0x410490 waveInPrepareHeader
0x410498 waveInStart
Library SHLWAPI.dll:
0x4103d4 PathFileExistsA
Library WS2_32.dll:
0x4104a0 htons
0x4104a4 gethostbyname
0x4104a8 closesocket
0x4104ac socket
0x4104b0 send
0x4104b4 WSAGetLastError
0x4104b8 connect
0x4104bc recv
0x4104c0 WSAStartup
Library urlmon.dll:
0x4104f8 URLDownloadToFileA
Library gdiplus.dll:
0x4104cc GdipDisposeImage
0x4104d0 GdipCloneImage
0x4104d4 GdipAlloc
0x4104dc GdipSaveImageToFile
0x4104e4 GdiplusStartup
0x4104ec GdipFree
Library WININET.dll:
0x41046c InternetCloseHandle
0x410470 InternetOpenUrlA
0x410474 InternetOpenA
0x410478 InternetReadFile

!This program cannot be run in DOS mode.
vu^viq^
wu^&ps^
vu^vi~^
vu^Rich
`.rdata
@.data
YYPVhT
SSVh#(@
tl9~8tg
8F4t{8
^<v8^5
F<;F8r
8^5uu8
WWVh,8@
WWVh;8@
8^9u=8^8W
SSVh;8@
SSVhJ8@
W8^9t@
8^8t'8^9
#twHt`HtIHt2Ht
Bt`HtIHt2Ht
vtdHtPHt<Ht(Ht
tTIt=It,It
t=It,It
t]ItIIt2It
t<It(It
2twHt`HtIHt2Ht
gtaHtMHt9Ht)Ht
uD8^-u
utCHt.
t3Jt(Jt Jt
HHt4Ht
HHt4Ht
PPPhr^@
VWVPh`
tV950YA
u$WVVVV
t VVVj
SbieDll.dll
HARDWARE\ACPI\DSDT\VBOX__
PROCMON_WINDOW_CLASS
PROCEXPL
invalid vector<T> subscript
?playaudio
%Y-%m-%d %H.%M
getcamsingleframe
nocamera
startcamcap
closecam
getcamframe
initcamcap
FreeFrame
GetFrame
CloseCamera
OpenCamera
camdlldata
camframe
[DataStart]
[DataStart]0000
%02i:%02i:%02i:%03i [KeepAlive]
Enabled! (Timeout: %i seconds)
Timeout changed to %i
Disabled.
Timeout expired, resetting connection.
eventvwr.exe
Software\Classes\mscfile\shell\open\command
origmsc
mscfile\shell\open\command
searchfinished
filefound
searchwrongpath
searchstarted
offlinelogs
autofflinelogs
{ User has been idle for
minutes }
onlinelogs
[F7]
[F8]
[F9]
[F10]
[F11]
[F12]
[F6]
[Del]
[F1]
[F2]
[F3]
[F4]
[F5]
[Print]
[End]
[Start]
[Left]
[Up]
[Right]
[Down]
[PagDw]
[BckSp]
[Tab]
[Enter]
[Pause]
[Esc]
[PagUp]
[Ctrl + V]
[Following text has been pasted from clipboard:]
[End of clipboard text]
[Ctrl +
[LCtrl]
[RCtrl]
[Following text has been copied to clipboard:]
[End of clipboard text]
[Chrome StoredLogins found, cleared!]
[Chrome StoredLogins not found]
UserProfile
\AppData\Local\Google\Chrome\User Data\Default\Login Data
[Chrome Cookies found, cleared!]
[Chrome Cookies not found]
\AppData\Local\Google\Chrome\User Data\Default\Cookies
[Firefox StoredLogins cleared!]
\key3.db
\logins.json
[Firefox StoredLogins not found]
\AppData\Roaming\Mozilla\Firefox\Profiles\
[Firefox cookies found, cleared!]
\cookies.sqlite
[Firefox Cookies not found]
[IE cookies cleared!]
[IE cookies not found]
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Cookies
[Cleared all cookies & stored logins!]
getfunlib
funready
funfunc
FunFunc
fundlldata
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
Userinit
C:\WINDOWS\system32\userinit.exe,
Software\Microsoft\Windows NT\CurrentVersion\Winlogon\
explorer.exe,
Software\Microsoft\Windows\CurrentVersion\Run\
del %0
start ""
PING 127.0.0.1 -n 2
\install.bat
@RD /Q "
if exist "
" goto Repeat
:Repeat
\uninstall.bat
EXEpath
C:\WINDOWS\system32\userinit.exe
explorer.exe
update.bat
AppData
ProgramFiles
\SysWOW64
\system32
WinDir
SystemDrive
(32 bit)
(64 bit)
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
Remcos_Mutex_Inj
Software\
SetProcessDEPPolicy
Shell32
IsUserAnAdmin
GetComputerNameExW
IsWow64Process
kernel32
kernel32.dll
GlobalMemoryStatusEx
GetModuleFileNameExW
Kernel32.dll
Psapi.dll
GetModuleFileNameExA
Program Files (x86)\
Program Files\
SETTINGS
C:\Windows\System32\cmd.exe
/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
autopswdata
pswdata
/stext "
[regsplt]
regmsg
regopened
regcreatekey
regeditval
Shlwapi.dll
SHDeleteKeyA
regdelkey
regdelval
regopen
initregedit
Disconnection occurred, retrying to connect...
addnew
1.7 Pro
Connected to C&C!
%02i:%02i:%02i:%03i [INFO]
Initializing connection to C&C...
initremscript
initfun
dllurl
dlldata
clipboarddata
emptyclipboard
setclipboard
getclipboard
PowrProf.dll
SetSuspendState
OSpower
mclick
keyinput
msgbox
updatefromlocal
updatefromurl
uninstall
deletefile
pwgrab
stopmiccapture
miccapture
freecamcap
getcamlib
screenshotdata
dwnldscr
scrslist
getscrslist
clearlogins
deletekeylog
autogetofflinelogs
getofflinelogs
stoponlinekl
startonlinekl
initklfrm
freescrcap
scrcap
initializescrcap
openaddress
cmdoutput
consolecmd
execcom
closeprocfromwindow
restorewindow
maxwindow
closewindow
getwindows
prockill
proclist
getproclist
downloadfromlocaltofile
downloadfromurltofile
filemgr
keepaliveoff
fileslist
err_notopendir
stopsearch
search
newfolder
showmsg
Unable to rename file!
rename
delete
sendfiledata
upload
download
listfiles
driveslist
getdrives
uploadprogress
subsplt
wndsplt
windowslist
SeShutdownPrivilege
err_notopenfile
filedown
remscripterr
remscriptsuccess
remscriptexecd
ntdll.dll
NtUnmapViewOfSection
DISPLAY
scrshot
User32.dll
GetLastInputInfo
http\shell\open\command
abcdefghijklmnopqrstuvwxyz
cmd.exe
Remcos
GetConsoleWindow
MsgWindowClass
* Breaking-Security.Net
* REMCOS v
CONOUT$
CreateThread
GetModuleHandleA
ExitThread
CreateDirectoryA
WaitForSingleObject
CreateEventA
GetLocalTime
FindClose
FindNextFileW
FindFirstFileW
TerminateThread
SetEvent
SetFileAttributesA
GetFileAttributesA
CloseHandle
RemoveDirectoryA
DeleteFileA
MapViewOfFileEx
CreateFileMappingA
GetProcAddress
LoadLibraryA
GetLastError
FindNextFileA
FindFirstFileA
ExpandEnvironmentStringsA
CopyFileA
GetModuleFileNameA
GetLongPathNameA
CreateMutexA
OpenMutexA
Process32Next
Process32First
CreateToolhelp32Snapshot
SizeofResource
LockResource
LoadResource
FindResourceA
GetLocaleInfoA
Process32NextW
Process32FirstW
lstrlenA
GetDriveTypeA
CreateProcessA
GetTickCount
GlobalUnlock
GlobalLock
GlobalAlloc
WinExec
GetCurrentProcessId
CreateDirectoryW
DeleteFileW
GetFileAttributesW
GetLogicalDriveStringsA
GetCurrentProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
VirtualAlloc
GlobalFree
LocalAlloc
TerminateProcess
ReadFile
PeekNamedPipe
GetStdHandle
CreatePipe
OpenProcess
DuplicateHandle
GetCurrentThread
lstrcpynA
ExitProcess
AllocConsole
KERNEL32.dll
FindWindowA
GetKeyboardLayout
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowsHookExA
CallNextHookEx
GetKeyState
GetWindowTextA
GetWindowTextLengthA
GetForegroundWindow
UnhookWindowsHookEx
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
ExitWindowsEx
MessageBoxA
GetKeyboardLayoutNameA
GetWindowThreadProcessId
ShowWindow
CloseWindow
IsWindowVisible
GetWindowTextW
EnumWindows
SendInput
CreateWindowExA
RegisterClassExA
AppendMenuA
CreatePopupMenu
TrackPopupMenu
SetForegroundWindow
GetCursorPos
DefWindowProcA
USER32.dll
DeleteDC
DeleteObject
GetDIBits
GetObjectA
StretchBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
CreateDCA
GDI32.dll
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
GetUserNameW
ADVAPI32.dll
ShellExecuteA
ShellExecuteW
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
SHELL32.dll
?data@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0logic_error@std@@QAE@ABV01@@Z
??0out_of_range@std@@QAE@ABV01@@Z
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDIABV?$allocator@D@1@@Z
??_D?$basic_fstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_fstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?seekp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@JW4seekdir@ios_base@2@@Z
??0?$basic_fstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@D@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?find@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIABV12@I@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@0@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@PBG@Z
?end@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEPAGXZ
?begin@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEPAGXZ
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@ABV10@G@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@JW4seekdir@ios_base@2@@Z
?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE?AV?$fpos@H@2@XZ
?is_open@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QBE_NXZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
?is_open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QBE_NXZ
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@IDABV?$allocator@D@1@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV?$allocator@G@1@@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??8std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@@Z
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADXZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??9std@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@G@Z
?substr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBE?AV12@II@Z
?rfind@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIGI@Z
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??Hstd@@YA?AV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@PBGABV10@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@DABV10@@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?begin@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
?end@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
?length@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIXZ
??Bios_base@std@@QBEPAXXZ
MSVCP60.dll
_except_handler3
??0exception@@QAE@ABV0@@Z
_CxxThrowException
??2@YAPAXI@Z
strftime
localtime
__CxxFrameHandler
_EH_prolog
malloc
strncmp
printf
wcscmp
tolower
toupper
getenv
sprintf
_wrename
realloc
mbstowcs
freopen
MSVCRT.dll
??1type_info@@UAE@XZ
__dllonexit
_onexit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
waveInStart
waveInOpen
waveInAddBuffer
waveInPrepareHeader
waveInUnprepareHeader
waveInClose
waveInStop
WINMM.dll
PathFileExistsA
SHLWAPI.dll
WS2_32.dll
URLDownloadToFileA
urlmon.dll
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipFree
GdipDisposeImage
GdipCloneImage
GdipAlloc
GdipSaveImageToStream
GdipSaveImageToFile
gdiplus.dll
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
WININET.dll
GetStartupInfoA
.?AVexception@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
UU{LL~57
UU{SStQQfppy
UU{UU{BD
y^_fccgeee
eeeccfeee
ssseee
qomkihkih
QPO*))221`_^Z]r4<
>>>KKKTTTXXX
JJIZYY]d
[\gtrq
SSSaaammmrrrsss
~}_]\EDC
555===NNNUUUTTT
ZYXBA@/..
***,,,<<<<<<
III...555
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
timage/jpeg
timage/png
SETTINGS
Antivirus Signature
Bkav W32.FamVT.RevetAF.Trojan
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
DrWeb Trojan.DownLoader25.11684
MicroWorld-eScan Trojan.Inject.BDT
FireEye Generic.mg.3343149d1253a8ec
CAT-QuickHeal Trojan.Mauvaise.SL1
ALYac Trojan.Inject.BDT
Cylance Unsafe
Zillya Trojan.Agent.Win32.742092
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 004f67651 )
BitDefender Trojan.Inject.BDT
K7GW Trojan ( 004f67651 )
Cybereason malicious.d1253a
BitDefenderTheta Gen:NN.ZexaF.34110.fqW@a47x76fi
Cyren W32/Injector.AKNB-1880
Symantec Infostealer!im
ESET-NOD32 Win32/Agent.RXL
APEX Malicious
Paloalto generic.ml
ClamAV Win.Malware.Azden-7587127-0
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Backdoor:Win32/Rescoms.32f
NANO-Antivirus Trojan.Win32.AD.erfeyu
ViRobot Trojan.Win32.Agent.94208.EA
Tencent Malware.Win32.Gencirc.10ce4956
Ad-Aware Trojan.Inject.BDT
TACHYON Backdoor/W32.Remcos.94208
Comodo TrojWare.Win32.Rescoms.A@70v67g
F-Secure Clean
Baidu Clean
VIPRE Clean
TrendMicro BKDR_SOCMER.SM
McAfee-GW-Edition BehavesLike.Win32.Generic.nh
CMC Clean
Emsisoft Trojan.Agent (A)
SentinelOne Static AI - Malicious PE
GData Win32.Backdoor.Remcos.B
Jiangmin Trojan.Generic.bgmwv
MaxSecure Trojan.Malware.300983.susgen
Avira HEUR/AGEN.1115265
Antiy-AVL Clean
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Backdoor.Win32.Gen.cc!s1
Arcabit Clean
SUPERAntiSpyware Backdoor.Remcos/Variant
ZoneAlarm Clean
Microsoft Backdoor:Win32/Rescoms
Cynet Malicious (score: 100)
AhnLab-V3 Backdoor/Win32.Rescoms.R198292
Acronis suspicious
McAfee Trojan-FOFQ!3343149D1253
MAX malware (ai score=100)
VBA32 BScope.Trojan.Downloader
Malwarebytes Generic.Trojan.Dropper.DDS
Panda Trj/Genetic.gen
Zoner Trojan.Win32.76707
TrendMicro-HouseCall BKDR_SOCMER.SM
Rising Backdoor.Remcos!1.B4AD (CLASSIC)
Yandex Trojan.GenAsa!7DchS5duLaA
Ikarus Backdoor.Rat.Remcos
eGambit Unsafe.AI_Score_100%
Fortinet W32/Agent.RXL!tr
Webroot Clean
AVG Win32:RemcosRAT-A [Trj]
Avast Win32:RemcosRAT-A [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.