Static | ZeroBOX

PE Compile Time

2023-05-23 02:50:08

PE Imphash

3f3d4ba55ce3e8f736704310c56bf5aa

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000560eb 0x00056200 6.61739567797
.rdata 0x00058000 0x0001780a 0x00017a00 5.84600042027
.data 0x00070000 0x00005c94 0x00000e00 2.98685141287
.tls 0x00076000 0x00000009 0x00000200 0.0203931352361
.gfids 0x00077000 0x00000230 0x00000400 2.40650825478
.rsrc 0x00078000 0x00004868 0x00004a00 3.80810245973
.reloc 0x0007d000 0x00003b10 0x00003c00 6.68514322878

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_RCDATA 0x0007c5cc 0x00000259 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0007c828 0x0000003e LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x4580b4 FindNextFileA
0x4580bc GetLongPathNameW
0x4580c0 CopyFileW
0x4580c4 GetLocaleInfoA
0x4580cc Process32NextW
0x4580d0 Process32FirstW
0x4580d4 VirtualProtect
0x4580d8 SetLastError
0x4580dc VirtualFree
0x4580e0 VirtualAlloc
0x4580e4 GetNativeSystemInfo
0x4580e8 HeapAlloc
0x4580ec GetProcessHeap
0x4580f0 FreeLibrary
0x4580f4 IsBadReadPtr
0x4580f8 GetTempPathW
0x4580fc OpenProcess
0x458100 OpenMutexA
0x458104 lstrcatW
0x458108 GetCurrentProcessId
0x45810c GetTempFileNameW
0x458110 GetSystemDirectoryA
0x458114 GlobalAlloc
0x458118 GlobalLock
0x45811c GetTickCount
0x458120 GlobalUnlock
0x458124 WriteProcessMemory
0x458128 ResumeThread
0x45812c GetThreadContext
0x458130 ReadProcessMemory
0x458134 CreateProcessW
0x458138 SetThreadContext
0x45813c LocalAlloc
0x458140 GlobalFree
0x458144 MulDiv
0x458148 SizeofResource
0x458154 GetStdHandle
0x458158 SetFilePointer
0x45815c FindResourceA
0x458160 LockResource
0x458164 LoadResource
0x458168 LocalFree
0x45816c SetConsoleOutputCP
0x458170 FormatMessageA
0x458174 AllocConsole
0x458178 FindFirstFileA
0x45817c lstrcpynA
0x458198 HeapSize
0x45819c WriteConsoleW
0x4581a0 SetStdHandle
0x4581b4 GetCommandLineW
0x4581b8 GetCommandLineA
0x4581bc GetOEMCP
0x4581c0 IsValidCodePage
0x4581c4 FindFirstFileExA
0x4581c8 ReadConsoleW
0x4581cc GetConsoleMode
0x4581d0 GetConsoleCP
0x4581d4 FlushFileBuffers
0x4581d8 GetFileType
0x4581e0 EnumSystemLocalesW
0x4581e4 GetUserDefaultLCID
0x4581e8 IsValidLocale
0x4581ec GetTimeFormatW
0x4581f0 GetDateFormatW
0x4581f4 HeapReAlloc
0x4581f8 GetACP
0x4581fc GetModuleHandleExW
0x458200 MoveFileExW
0x458204 RtlUnwind
0x458208 RaiseException
0x45820c LoadLibraryExW
0x458210 GetCPInfo
0x458214 GetStringTypeW
0x458218 GetLocaleInfoW
0x45821c LCMapStringW
0x458220 CompareStringW
0x458224 TlsFree
0x458228 TlsSetValue
0x45822c TlsGetValue
0x458230 GetFileSize
0x458234 TerminateThread
0x458238 GetLastError
0x45823c GetModuleHandleA
0x458240 RemoveDirectoryW
0x458244 MoveFileW
0x458248 SetFilePointerEx
0x458250 DeleteFileW
0x458254 CreateDirectoryW
0x458258 DeleteFileA
0x45825c SetFileAttributesW
0x458260 GetFileAttributesW
0x458264 FindClose
0x458268 lstrlenA
0x45826c GetDriveTypeA
0x458270 FindNextFileW
0x458274 GetFileSizeEx
0x458278 FindFirstFileW
0x45827c GetModuleHandleW
0x458280 ExitProcess
0x458284 CreateMutexA
0x458288 GetCurrentProcess
0x45828c GetProcAddress
0x458290 LoadLibraryA
0x458294 CreateProcessA
0x458298 PeekNamedPipe
0x45829c CreatePipe
0x4582a0 TerminateProcess
0x4582a4 ReadFile
0x4582a8 HeapFree
0x4582ac HeapCreate
0x4582b0 CreateEventA
0x4582b4 GetLocalTime
0x4582b8 CreateThread
0x4582bc SetEvent
0x4582c0 CreateEventW
0x4582c4 WaitForSingleObject
0x4582c8 Sleep
0x4582cc GetModuleFileNameW
0x4582d0 CloseHandle
0x4582d4 ExitThread
0x4582d8 CreateFileW
0x4582dc WriteFile
0x4582e0 GetModuleFileNameA
0x4582e4 TlsAlloc
0x4582ec MultiByteToWideChar
0x4582f0 DecodePointer
0x4582f4 EncodePointer
0x4582f8 WideCharToMultiByte
0x4582fc InitializeSListHead
0x458304 GetCurrentThreadId
0x45830c GetStartupInfoW
0x458318 IsDebuggerPresent
0x458320 ResetEvent
0x458324 SetEndOfFile
Library USER32.dll:
0x458350 GetWindowTextW
0x458354 wsprintfW
0x458358 GetClipboardData
0x45835c UnhookWindowsHookEx
0x458360 GetForegroundWindow
0x458364 ToUnicodeEx
0x458368 GetKeyboardLayout
0x45836c SetWindowsHookExA
0x458370 CloseClipboard
0x458374 OpenClipboard
0x458378 GetKeyboardState
0x45837c CallNextHookEx
0x458384 GetKeyState
0x458390 GetMessageA
0x458394 SetClipboardData
0x458398 EnumWindows
0x45839c ExitWindowsEx
0x4583a0 EmptyClipboard
0x4583a4 ShowWindow
0x4583a8 SetWindowTextW
0x4583ac MessageBoxW
0x4583b0 IsWindowVisible
0x4583b4 CloseWindow
0x4583b8 SendInput
0x4583c0 mouse_event
0x4583c4 CreatePopupMenu
0x4583c8 DispatchMessageA
0x4583cc TranslateMessage
0x4583d0 TrackPopupMenu
0x4583d4 DefWindowProcA
0x4583d8 CreateWindowExA
0x4583dc GetIconInfo
0x4583e0 GetSystemMetrics
0x4583e4 AppendMenuA
0x4583e8 RegisterClassExA
0x4583ec GetCursorPos
0x4583f0 SetForegroundWindow
0x4583f4 DrawIcon
Library GDI32.dll:
0x45808c SelectObject
0x458090 CreateCompatibleDC
0x458094 StretchBlt
0x458098 GetDIBits
0x45809c DeleteDC
0x4580a0 DeleteObject
0x4580a4 CreateDCA
0x4580a8 GetObjectA
0x4580ac BitBlt
Library ADVAPI32.dll:
0x458004 CryptGenRandom
0x458008 CryptReleaseContext
0x45800c GetUserNameW
0x458010 RegEnumKeyExA
0x458014 QueryServiceStatus
0x458018 CloseServiceHandle
0x45801c OpenSCManagerW
0x458020 OpenSCManagerA
0x458024 ControlService
0x458028 StartServiceW
0x45802c QueryServiceConfigW
0x458034 OpenServiceW
0x458038 EnumServicesStatusW
0x458044 OpenProcessToken
0x458048 RegCreateKeyA
0x45804c RegCloseKey
0x458050 RegQueryInfoKeyW
0x458054 RegQueryValueExA
0x458058 RegCreateKeyExW
0x45805c RegEnumKeyExW
0x458060 RegSetValueExW
0x458064 RegSetValueExA
0x458068 RegOpenKeyExA
0x45806c RegOpenKeyExW
0x458070 RegCreateKeyW
0x458074 RegDeleteValueW
0x458078 RegEnumValueW
0x45807c RegQueryValueExW
0x458080 RegDeleteKeyA
Library SHELL32.dll:
0x45832c ShellExecuteExA
0x458330 Shell_NotifyIconA
0x458334 ExtractIconA
0x458338 ShellExecuteW
Library ole32.dll:
0x4584b0 CoInitializeEx
0x4584b4 CoUninitialize
0x4584b8 CoGetObject
Library SHLWAPI.dll:
0x458340 PathFileExistsW
0x458344 PathFileExistsA
0x458348 StrToIntA
Library WINMM.dll:
0x458418 waveInOpen
0x45841c waveInStart
0x458420 waveInAddBuffer
0x458424 PlaySoundW
0x458428 mciSendStringA
0x45842c mciSendStringW
0x458430 waveInClose
0x458434 waveInStop
0x458438 waveInPrepareHeader
Library WS2_32.dll:
0x458440 gethostbyname
0x458444 send
0x458448 WSAStartup
0x45844c closesocket
0x458450 inet_ntoa
0x458454 htons
0x458458 htonl
0x45845c getservbyname
0x458460 ntohs
0x458464 getservbyport
0x458468 gethostbyaddr
0x45846c inet_addr
0x458470 WSASetLastError
0x458474 WSAGetLastError
0x458478 recv
0x45847c connect
0x458480 socket
Library urlmon.dll:
0x4584c4 URLDownloadToFileW
Library gdiplus.dll:
0x458490 GdipFree
0x458494 GdipDisposeImage
0x458498 GdipAlloc
0x45849c GdipCloneImage
0x4584a4 GdiplusStartup
Library WININET.dll:
0x458400 InternetOpenUrlW
0x458404 InternetOpenW
0x458408 InternetCloseHandle
0x45840c InternetReadFile

!This program cannot be run in DOS mode.
ierRich
`.rdata
@.data
.gfids
@.rsrc
@.reloc
;|$$tKQ
_^][YY
;G,uBSV
WWVh0Q@
^x9^tv
tD;Ntr
tZhpPF
Y95 \G
SUh$\G
xShhRF
QSUVWh
XVWjD^V3
WWWhHTF
D$@9\$0
D$ PVU
T$,;T$0
T$PSPS
PPhH@G
9>ubWW
~5h@\G
4ShHYF
VWh$\F
t]hl\F
t=h8`F
VPh@`F
VPhD_F
uRh<bF
tQhpcF
|$,PhtcF
PVhD_F
9{Lt:V
D$$PuJ
u 8_=t
@_^][YY
Y<9X8t
\$0f;F
9D$(t;
@^][YY
P4+S4t
V,YYG;~
L$8hDNF
^uh8TF
u"VVVV
SVWj j
I9t$4t+
PWh|dF
PWh`IG
L$(PWj
L$(PWj
 !"#$%&'()*+,-J.JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ/0J1J23J4567JJJ89:J;<JJJJJJJ=>?@JJJAJJJJJJJJJJJJJJJJJJBCJDEFGHIV
D$LPSSj
9L$,t#j
L$ +D$
D$D_^]
t$4VPQj
+|$(+t$,
t$`VWU
t$(QQU
D$TFVP
VjxVVh
L$$PWj
D$ PVUj
t$(9t$
t$(;t$
SVWj 3
SVWj@3
SVWj@3
YSSSSSSSj
|SUVWQ
L$(SSS
t1h8TF
D$LQPQ
DSVWj,3
t SSSj
SSSSSS
u0h(;G
t]<*u?N
t%<.t<G
_^][YY
LSUVW3
D$,j(P
L$<jHY
\$<+D$@
\$(X+D$$
\$<+D$@
l$L9t$
L$ !t$ j
_^][YY
_^][YY
QSUVW3
D$Lj P
l$xVW3
_^][YY
u1j$Xf
u2j$Xf
_]^[YY
^f9t$ s
Y_^][Y
\$$UVW3
u#j ^j
_9l$Lt
t$PQQV
D$ +D$
C@h<fF
_^][YY
$SUVW3
D$ +L$$
T$ +D$$
SVWjGZ
D$$WPV
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
D$ WSP
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
D$ USP
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
_^][YY
_^][YY
@9D$(u
D$$URP
<0r"<9w
^[_]YY
D$$<=u
T$(PPPP
QQSUV3
T$0PPPP
T$(PPPP
A;L$,|
t$dQPU
SUVWj(
SUVWj(
D$`j@SP
T$<+T$
D$<9D$,
D$$WQU
T$(9]
D$hQUP
D$$9|$
QQSUVW
_^][YY
u79|$$
][_^YY
9D$@~$
C9\$pu
9l$p~$
9l$P~A
9l$`~A
t$$9t$
4V9~,
D$(;D$ |
u:E;l$(|
T$ UVW
t$ ;L$<
C;\$,|
SUVWj7_
$SUVWj7]Uj
t$LVU3
W?PPUSPQ
Gv_^][
SUVWjx
u PPj7UPQ
$SUVWQP
t<j h(
PWWj Sj
D$03L$
L$,#L$ #D$,
#T$$#D$
#T$,#D$
L$ 3L$(
T$(#T$
T$$#T$(#D$$
K j@^+s`;
s u&j@
C`UVWj@_
K`j8^;
9E$WWV
t,WW9}
jA[jZZ+
QQSVWd
URPQQh
;t$,v-
UQPXY]Y[
u0jAXf;
u0jAXf;
<xt"<Xt
v!j"X_^[
Tt1jhZ;
Tt1jhZ;
^$+^8+
^$+^8+
t0jXXf
~$+~8+
t0jXXf
~$+~8+
F2jgYf;
PVSQSWV
SVjA[jZ^+
jAZjZ^
t/j=[f;
QSSSSj
tyPVj@W
_tcPVj@
u#j,Xf;
f98t V
PPPPPPPP
QQQWPQ
SSPQSS
u kE$<
>:uBFV
mSjA[jZ^+
8jZZf;
Wj0XPV
PPPPPWS
PP9E u:PPVWP
<at<rt
>=umF8
D8(HXt:f
D8(Ht5F
WWWPWS
u-PWWS
SSVWh
f9:t!V
|VWj=S
}VWj=S
tl9tX
QQSWj0j@
<0|o<9
u^9^\t/
VX9^`tT
;N\u\W
u2Vj@h
9C`u99C\t4
9C`u5Wj
SVWjA_jZ+
uBjAYjZ+
PPPPPPPP
InitializeConditionVariable
SleepConditionVariableCS
WakeAllConditionVariable
bad allocation
bad array new length
invalid argument
invalid seek
io error
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no lock available
no message available
no message
no protocol option
no space on device
no stream resources
no such device or address
no such device
no such file or directory
no such process
not a directory
not a socket
not a stream
not connected
not enough memory
not supported
operation canceled
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
permission denied
protocol error
protocol not supported
read only file system
resource deadlock would occur
resource unavailable try again
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many files open
too many links
too many symbolic link levels
value too large
wrong protocol type
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
cross device link
destination address required
device or resource busy
directory not empty
executable format error
file exists
file too large
filename too long
function not supported
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
interrupted
unknown error
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreW
CreateSemaphoreExW
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
FlushProcessWriteBuffers
FreeLibraryWhenCallbackReturns
GetCurrentProcessorNumber
CreateSymbolicLinkW
GetCurrentPackageId
GetTickCount64
GetFileInformationByHandleEx
SetFileInformationByHandle
GetSystemTimePreciseAsFileTime
WakeConditionVariable
InitializeSRWLock
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
SleepConditionVariableSRW
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CompareStringEx
GetLocaleInfoEx
LCMapStringEx
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefghijklmnopqrstuvwxyz
bad exception
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`h````
xpxxxx
`h`hhh
xwpwpp
(null)
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
[aOni*{
~ $s%r
@b;zO]
v2!L.2
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
AreFileApisANSI
EnumSystemLocalesEx
GetDateFormatEx
GetTimeFormatEx
GetUserDefaultLocaleName
IsValidLocaleName
LCIDToLocaleName
LocaleNameToLCID
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
UTF-16LEUNICODE
_hypot
_nextafter
1#QNAN
1#SNAN
?Dj0Q:W$=
5s3R6=
]vQ<)8
|)P!?Ua0
Eb2]A=
u?^p?o4
y1~?|"
?x+s7
?5Od%
?|I7Z#
>,'1D=
?g)([|X>=
~U`?K
:h"?bC
@H#?43
Ax#?uN}*
r7Yr7=
F0$?3=1
H`$?h|
&?~YK|
sU0&?W
<8bunz8
?#%X.y
F||<##
<@En[vP
b<log10
?5Wg4p
%S#[k=
"B <1=
%Y-%m-%d %H.%M
invalid vector<T> subscript
vector<T> too long
string too long
invalid string position
OpenCamera
CloseCamera
GetFrame
FreeFrame
Failed to initialize TLS
Failed to initialize TLS context
Failed to load TLS certificate
Failed to load TLS key
Failed to load peer certificate
TLS Handshake... |
TLS Error 1
TLS Error 2
TLS Authentication Failed
TLS Error 3
Connection Refused
Connection Failed:
KeepAlive | Enabled | Timeout:
KeepAlive | Disabled
Connection Timeout
DisplayMessage
GetMessage
CloseChat
cmd.exe
SystemDrive
<||||>
encrypted_key":"
CryptUnprotectData
crypt32
CurrentBuildNumber
SOFTWARE\Microsoft\Windows NT\CurrentVersion
RtlInitUnicodeString
NtAllocateVirtualMemory
NtFreeVirtualMemory
RtlAcquirePebLock
RtlReleasePebLock
LdrEnumerateLoadedModules
[+] supxLdrEnumModulesCallback
[+] NtAllocateVirtualMemory Success
[-] NtAllocateVirtualMemory Error
PEB: %x
[+] ucmAllocateElevatedObject
[+] CoGetObject
[+] CoGetObject SUCCESS
[-] CoGetObject FAILURE
[+] ucmCMLuaUtilShellExecMethod
[+] before ShellExec
[+] ShellExec success
/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
C:\Windows\System32\cmd.exe
ZipFiles
UnzipFiles
Browsing directory:
Executing file:
Downloading file:
Downloaded file:
Failed to download file:
Deleted file:
Unable to delete:
Unable to rename file!
Uploaded file:
Failed to upload file:
Uploading file to Controller:
SetFilePointerEx error
ReadFile error
okmode
Offline Keylogger Started
Keylogger initialization failure: error
minutes }
{ User has been idle for
Online Keylogger Started
Online Keylogger Stopped
Offline Keylogger Stopped
[Space]
[BckSp]
[Enter]
[Pause]
[PagUp]
[PagDw]
[Start]
[Left]
[Right]
[Down]
[Print]
[Menu]
[End of clipboard]
[Ctrl+V]
[Text pasted from clipboard]
[Ctrl+
[AltL]
[AltR]
[CtrlL]
[CtrlR]
[End of clipboard]
[Text copied to clipboard]
\AppData\Local\Google\Chrome\User Data\Default\Login Data
UserProfile
[Chrome StoredLogins not found]
[Chrome StoredLogins found, cleared!]
\AppData\Local\Google\Chrome\User Data\Default\Cookies
[Chrome Cookies not found]
[Chrome Cookies found, cleared!]
\AppData\Roaming\Mozilla\Firefox\Profiles\
[Firefox StoredLogins not found]
\logins.json
\key3.db
[Firefox StoredLogins Cleared!]
[Firefox Cookies not found]
\cookies.sqlite
[Firefox cookies found, cleared!]
Cookies
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
[IE cookies not found]
[IE cookies cleared!]
[Cleared browsers logins and cookies.]
Cleared browsers logins and cookies.
FunFunc
exepath
Unknown exception
bad cast
bad locale name
generic
iostream
iostream stream error
ios_base::badbit set
ios_base::failbit set
ios_base::eofbit set
license_code.txt
Software\
licence
Remcos Agent initialized
Access Level:
Administrator
override
4.7.1 Pro
StartForward
StartReverse
StopForward
StopReverse
GetDirectListeningPort
finished
s ap traffic
s hs traffic
TLS 1.3, client CertificateVerify
traffic upd
derived
tls13
c ap traffic
c hs traffic
TLS 1.3, server CertificateVerify
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
>!KK
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
t>!K
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
tt>!
pp|B>>q
aaj_55
UUPx((
SHA256wECDSA
Unknown
?456789:;<=
 !"#$%&'()*+,-./0123
lzNg},8S*:#
)U[/t|
SECP112R1
DB7C2ABF62E35E668076BEAD208B
DB7C2ABF62E35E668076BEAD2088
659EF8BA043916EEDE8911702B22
DB7C2ABF62E35E7628DFAC6561C5
9487239995A5EE76B55F9C2F098
A89CE5AF8724C0A23E0E0FF77500
SECP128R1
FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC
E87579C11079F43DD824993C2CEE5ED3
FFFFFFFE0000000075A30D1B9038A115
161FF7528B899B2D0C28607CA52C5B86
CF5AC8395BAFEB13C02DA292DDED7A83
SECP160R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC
1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45
100000000000000000001F4C8F927AED3CA752257
4A96B5688EF573284664698968C38BB913CBFC82
23A628553168947D59DCC912042351377AC5FB32
SECP192R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC
64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1
FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831
188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012
7192B95FFC8DA78631011ED6B24CDD573F977A11E794811
SECP224R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE
B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4
FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D
B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21
BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34
PRIME239V1
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC
6B016C3BDCF18941D0D654921475CA71A9DB2FB27D1D37796185C2942C0A
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF9E5E9A9F5D9071FBD1522688909D0B
0FFA963CDCA8816CCC33B8642BEDF905C3D358573D3F27FBBD3B3CB9AAAF
7DEBE8E4E90A5DAE6E4054CA530BA04654B36818CE226B39FCCB7B02F1AE
SECP256R1
FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC
5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B
FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551
6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296
4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5
SECP384R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFC
B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0DB248B0A77AECEC196ACCC52973
AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7
3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F
SECP521R1
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC
51953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409
C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66
11839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650
Remcos restarted by watchdog!
Watchdog module activated
Watchdog launch failed!
FoxMailRecovery
[regsplt]
SHDeleteKeyW
Shlwapi.dll
getaddrinfo
getnameinfo
freeaddrinfo
\ws2_32
\wship6
TLS On
TLS Off
Connecting |
Connection Error:
Connection Error: Unable to create socket
Connected |
hlight
Disconnected
SetSuspendState
PowrProf.dll
SeShutdownPrivilege
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ZwClose
GetCursorInfo
User32.dll
DISPLAY
alarm.wav
Alarm triggered
play audio
pause audio
resume audio
status audio mode
stopped
stop audio
close audio
GetLastInputInfo
ProductName
(64 bit)
(32 bit)
SETTINGS
%02i:%02i:%02i:%03i
abcdefghijklmnopqrstuvwxyz
Software\Microsoft\Windows\CurrentVersion\Uninstall
WallpaperStyle
Control Panel\Desktop
TileWallpaper
GetModuleFileNameExA
Psapi.dll
Kernel32.dll
GetModuleFileNameExW
SetProcessDpiAwareness
shcore
SetProcessDpiAware
user32
NtUnmapViewOfSection
ntdll.dll
GlobalMemoryStatusEx
kernel32.dll
IsWow64Process
kernel32
GetComputerNameExW
IsUserAnAdmin
Shell32
SetProcessDEPPolicy
EnumDisplayDevicesW
EnumDisplayMonitors
GetMonitorInfoW
GetSystemTimes
GetConsoleWindow
NtSuspendProcess
NtResumeProcess
CONOUT$
______
(_____ \
_____) )_____ ____ ____ ___ ___
| __ /| ___ | \ / ___) _ \ /___)
| | \ \| ____| | | ( (__| |_| |___ |
|_| |_|_____)_|_|_|\____)___/(___/
Remcos v
BreakingSecurity.net
Remcos
MsgWindowClass
TLS13-AES128-GCM-SHA256
/serialNumber=
/emailAddress=
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
-----BEGIN DH PARAMETERS-----
-----END DH PARAMETERS-----
-----BEGIN X509 CRL-----
-----END X509 CRL-----
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
-----BEGIN EC PRIVATE KEY-----
-----END EC PRIVATE KEY-----
-----BEGIN DSA PRIVATE KEY-----
-----END DSA PRIVATE KEY-----
-----BEGIN PUBLIC KEY-----
-----END PUBLIC KEY-----
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz+/
?UUUUUU
?UUUUUU
?333333
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCC
.CRT$XCL
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$T
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.tls$ZZZ
.gfids$x
.gfids$y
.rsrc$01
.rsrc$02
CreateDirectoryW
WriteFile
CreateFileW
ExitThread
CloseHandle
GetModuleFileNameW
WaitForSingleObject
CreateEventW
SetEvent
CreateThread
GetLocalTime
CreateEventA
HeapCreate
HeapFree
ReadFile
TerminateProcess
CreatePipe
PeekNamedPipe
CreateProcessA
LoadLibraryA
GetProcAddress
GetCurrentProcess
CreateMutexA
ExitProcess
GetModuleHandleW
FindFirstFileW
GetFileSizeEx
FindNextFileW
GetDriveTypeA
lstrlenA
FindClose
GetFileAttributesW
SetFileAttributesW
DeleteFileA
DeleteFileW
GetLogicalDriveStringsA
SetFilePointerEx
MoveFileW
RemoveDirectoryW
GetModuleHandleA
GetLastError
TerminateThread
GetFileSize
FindFirstFileA
FindNextFileA
ExpandEnvironmentStringsA
GetLongPathNameW
CopyFileW
GetLocaleInfoA
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetTempPathW
OpenProcess
OpenMutexA
lstrcatW
GetCurrentProcessId
GetTempFileNameW
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetTickCount
GlobalUnlock
WriteProcessMemory
ResumeThread
GetThreadContext
ReadProcessMemory
CreateProcessW
SetThreadContext
LocalAlloc
GlobalFree
MulDiv
SizeofResource
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetStdHandle
SetFilePointer
FindResourceA
LockResource
LoadResource
LocalFree
SetConsoleOutputCP
FormatMessageA
AllocConsole
GetModuleFileNameA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
KERNEL32.dll
TranslateMessage
DispatchMessageA
GetMessageA
GetWindowTextW
wsprintfW
GetClipboardData
UnhookWindowsHookEx
GetForegroundWindow
ToUnicodeEx
GetKeyboardLayout
SetWindowsHookExA
CloseClipboard
OpenClipboard
GetKeyboardState
CallNextHookEx
GetKeyboardLayoutNameA
GetKeyState
GetWindowTextLengthW
GetWindowThreadProcessId
SetForegroundWindow
SetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
ShowWindow
SetWindowTextW
MessageBoxW
IsWindowVisible
CloseWindow
SendInput
EnumDisplaySettingsW
mouse_event
DrawIcon
GetSystemMetrics
GetIconInfo
SystemParametersInfoW
GetCursorPos
RegisterClassExA
AppendMenuA
CreateWindowExA
DefWindowProcA
TrackPopupMenu
CreatePopupMenu
USER32.dll
GetObjectA
CreateDCA
DeleteObject
DeleteDC
GetDIBits
StretchBlt
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
GDI32.dll
RegDeleteKeyA
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegCreateKeyW
RegOpenKeyExW
RegOpenKeyExA
RegSetValueExA
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryValueExA
RegQueryInfoKeyW
RegCloseKey
RegCreateKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusW
OpenServiceW
ChangeServiceConfigW
QueryServiceConfigW
StartServiceW
ControlService
OpenSCManagerA
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
RegEnumKeyExA
GetUserNameW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
ADVAPI32.dll
ShellExecuteW
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
SHELL32.dll
CoUninitialize
CoInitializeEx
CoGetObject
ole32.dll
StrToIntA
PathFileExistsW
PathFileExistsA
SHLWAPI.dll
waveInAddBuffer
waveInStart
waveInOpen
waveInUnprepareHeader
waveInPrepareHeader
waveInStop
waveInClose
mciSendStringW
mciSendStringA
PlaySoundW
WINMM.dll
WS2_32.dll
URLDownloadToFileW
URLOpenBlockingStreamW
urlmon.dll
GdipLoadImageFromStream
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusStartup
gdiplus.dll
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
WININET.dll
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
EncodePointer
DecodePointer
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LoadLibraryExW
RaiseException
RtlUnwind
MoveFileExW
GetModuleHandleExW
GetACP
HeapReAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
HeapSize
SetEndOfFile
Copyright (c) by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVtype_info@@
.?AVbad_alloc@std@@
.?AVbad_array_new_length@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AV_Facet_base@std@@
.?AV_Locimp@locale@std@@
.?AVfacet@locale@std@@
.?AU_Crt_new_delete@std@@
.?AVcodecvt_base@std@@
.?AUctype_base@std@@
.?AV?$ctype@D@std@@
.?AV?$codecvt@DDU_Mbstatet@@@std@@
.?AVbad_exception@std@@
.?AVfailure@ios_base@std@@
.?AVruntime_error@std@@
.?AVsystem_error@std@@
.?AVbad_cast@std@@
.?AV_System_error@std@@
.?AVexception@std@@
33333333tQQ
33333333
PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX
0!0-070K0W0e0o0{0
1%111;1G1Q1b1s1
2'232=2I2S2_2i2u2
3 3*363@3N3X3f3p3|3
4&404>4H4T4^4j4t4
7(7/7H7Q7V7f7p7u7|7
8%8+808;8A8_8i8v8
9&:,:7:V:`:
<4<D<I<S<]<f<k<q<w<|<
<"=J=b=
>">+>1>s>
1:1,4w4|4
4c5o5t5
6,666;6
647C7h7v7
8'848A8p8
969E9z9
:$:6:W:f:
>%>.><>`>f>V?c?u?
0L0S0[0i0
1"1U1m1y1
4 4<4`4l4
5Q5`5k5
6#616[6
7#7.7B7M7Z7g7l7s7x7~7
8!8*818;8A8y8
859Q9]9i9w9
:!:):M:(<
5+626E6U6|6
7(7/7;7f7
9%90999D9M9X9a9n9
:$:1:E:V:_:k:u:{:
;$;9;Y;_;g;};
<*<F<f<
=9=J=O=_=f=o=t=
2A2I2X2k2v2
34=4O4b4|4
8"848g8
?&?@?^?u?
5$6=6I6X6r6
:&:L:b:y:
34)434=4G4Q4[4e4o4y4
5:5@5H5
=F=R=f=v=
040K0z0
3"3,383I3O3X3
5F5V5l5x5
617U7x7
99.9=9L9[9j9y9
::.:=:p:|:
=#=+=7=^=e=u=
0#0T0^0w0
414q4{4
5/5E5q5~5
7,777A7F7Z7v7|7
;2;H;_;u;
=4=O=e=
>+>]>x>
4*4;4d4
525V5k5
6?6G6U6b6j6{6
7?7R7W7\7k7
8-8J8a8
:2:L:[:h:
;C;R;n;
;"<0<D<{<
=W=^=j=
=.>3>u>z>
?;?K?R?^?
*040G0V0
4'4M4^4
5)656u6{6
/0C0Q0\0x0
1'1,1T1h1n1
4+4E4S4
4!5&5P5d5l5~5
5<6B6q6
7 7A7W7`7
8 8'888J8e8j8
9(:-:S:o:
=L=Q=V=e=
=<>F>d>
0,1]1{1Y9
:8:T:x:
:!;';3;=;I;o;v;
<)<.<:<?<K<P<]<c<k<t<
2+2M2`2k2z2
7=7E7N7{7
9+9>9D9u9
:.:::?:_:e:
<1<<<C<I<O<T<
="=^=s=
8-8U8i8t8
9&919G9|9
9 :S:l:w:
;4;?;^;
<#<.<L<g<r<p=
=*>3>Q>
? ?;?U?
0*121:1B1J1R1Z1s1
22<2_2q2z2
4D4h4|4
4*5<5N5h5r5
707J7]7
868h8t8
5X6g6v6
637:7@7O7`7f7l7
768C8^8}8
8 9&9-93999D9
<(<F<g<u<
=#=)=0=R=Q>
3"3&3*3.32363:3>3B3F3J3N3R3V3Z3^3b3f3j3n3r3v3z3~3
4;5t6y6
;4;;;F;M;l;r;t<o>
3#3(3-373<3A3L3R3^3k3
6!6,636=6G6O6S7\7
718?8Q8W8r8
0#0)0]0e0r0
1&111^1|1
3=3K3W3b3
4'4/4#5*5[5
5&6/6T6
;\;m;i<
1&2L2h2n2s2
;(<=<J<U<^<
=$=/=C=R=[=
>%>.>]>q>~>
??3?;?G?S?
0%040A0J0S0a0z0
1Q1]1h1w1
33)363M3R3c3u3
525<5C5|5
:_;t;|;
="=+=>=L=X="?7?
2'222:2X2i2
3#4@4L4]4j4
50595T5]5
7.7E7\7p7
:*:8:B:G:]:k:y:
;";D;L;R;Z;c;h;r;|;
<#<(<2<8<B<G<L<W<]<g<m<w<|<
=)=/=6=B=O=T=g=
4(424<4A4F4L4Q4X4b4n4x4
5_5n5w5
;";+;S;`;l;y;
<'<8<D<J<P<Y<c<
91;5;9;=;A;E;I;M;Q;U;[;@<W<w=
=Q>\>h>r>
?'?1?Z?e?q?
0#0-0=0Y0`0n0x0
101A1K1~1
242D2W2m2
4#484g4v4
6#616e6t6
6T7f7n7u7
8 8'858<8H8O8_8q8y8
8;8B8I8P8W8a8
8'919;9E9O9Y9`9o9~9
K9X9m9
7)787J7k7
0000?0
=H>]>r>
7#7:7^7y7
81>1H1R1\1f1<2I2O2^2e2j2s2x2
3!3/373t3|3
8;8L8Q8V8w8|8
9S:r:|:
;];e;y;
<(<;<I<d<o<
=Y=h=o=
?A?J?P?X?]?
0#0*01080?0F0M0U0]0e0q0z0
1#1*11181?1F1M1T1\1d1l1w1|1
2"2A2`2
3&3?3R3{3
555J5_5d5
85;Z;h;t;
=#>)>0>7>=>B>H>N>T>Y>_>e>k>p>v>|>
?#?(?.?4?:???E?K?Q?V?\?b?h?m?s?y?
0 0%0+01070<0B0H0N0S0Y0_0e0j0p0v0|0
1"1(1.14191?1E1K1P1V1\1b1g1m1s1y1~1
12H2q2
6[6`6d6h6l6
:(;/;4;8;<;@;
7"7&7b8n8t8
='=I=Y=^=c=
>8>D>I>N>~>
6"6(606
3*303K3s3
494G4N4T4
657O7X7
<7<T<_<
1=1R1h1u1
0,1014181<1@1D1H1
1T2X2\2`2d2h2l2p2
2p3t3x3|3
8,<\<H=
515d5w5
2H2k2I3V4
5M6J8_8
;(;3;@;R;
;J<W<g<t<^=
?3?W?r?}?
0/1_1n1
293K3Q3e3
3:4C4|4
737a7f7
: :F:~:
? ?-?9?O?b?
0#000>0E0M0f0x0
3;3B4z4
4f5q5{5
8C:d<j<|<
9]:c:Q;k;~;
1D6J6\6h9
9#:{:7;
<>< =+=
>R>N?b?
131?1P1Y1
2!2+2N2X2u2
4A4Z4i4u4
595]5z5
6 6<6G6L6Q6l6v6
7%7A7L7Q7V7
8-888=8B8]8g8
9&989Z9e9j9o9
::*:/:4:X:
;!;&;D;s;~;
<,<><J<[<g<v<
=\=d=p=}=
0*0=0C0I0
415S5r5B6>8.9O9V9l9
;;U;x;
50676G6V6]6u6|6
9%:7:=: ;t;
0S0s0
2(4S4r4
91:D:z:
:';?;r;
=$>9>h>
0Y0a0i0q0
5I6f6v6
8+9A9W9`9k9s9
;-;5;d;
<F=N=t=
1)111R1
8"9I9R:
;9;C;T;Y;n;
? ?+???J?a?
)0_0r0
152X2~2
2<3H3\3q3
8B9:&:0:?:c:
<E<R<_<l<
12191P1f1
1#262@2a2
3/3j3q3
4+4=4O4a4s4
;&;.;6;
23I3x3
0k0+1 2j2\3
1[4^5o5R7]7m7
9V:h<s<
>5>O>u>
>!?F?R?^?q?
0$000<0O0s0
6?728r8
949X9c9p9
:0;=;g;q;
=i=q=y=
>1>=>I>i>
0F2K2]2{2
=5=>=H=R=\=f=p=z=
>&>I>d>
?%?/?9?M?W?a?k?u?
0$0.080B0L0V0`0j0t0~0
5 5$5(5,5054585<5@5D5H5L5P5T5X5\5`5d5h5l5p5t5x5|5
7 7$7(7,7074787<7@7D7H7X7\7`7d7h7l7p7t7x7|7
7$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
0$0,040<0D0L0T0\0d0l0t0|0
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3t3x3|3
3\7d7l7t7|7
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
;$;,;4;<;D;L;T;\;d;l;t;|;
<$<,<4<<<D<L<T<\<d<l<t<|<
=$=,=4=<=D=L=T=\=d=l=t=|=
>$>,>4><>D>L>T>\>d>l>t>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
4 4(4,4044484<4@4D4H4L4P4T4X4\4`4d4
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
< <$<(<,<0<4<8<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
? ?,?8?D?P?\?h?t?
0(040@0L0X0d0p0|0
1$101<1H1T1`1l1x1
2$202<2H2T2`2l2x2
4$4,444<4D4L4T4\4d4l4t4|4
4$5,545<5D5L5T5\5d5l5t5|5
6$6,646<6D6L6T6\6d6l6t6|6
7$7,747<7D7L7T7\7d7l7t7|7
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
;$;,;4;<;D;L;T;\;d;l;t;|;
<$<,<4<<<@<H<P<X<`<h<p<x<
= =(=0=8=@=H=P=X=`=h=p=x=
> >(>0>8>@>H>P>X>`>h>p>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3
5 5$5(5,5054585<5@5D5H5L5P5T5X5\5h5l5p5t5x5|5
7(7,7H7X7
8L8P8T8
3 34383<3@3X3\3l3p3x3
4$44484H4L4P4T4\4t4
5 5$54585<5@5H5`5p5t5
6 6$6(606H6L6d6t6x6|6
747D7H7X7\7`7d7h7p7
848D8H8X8\8`8d8h8l8t8
8(=0=d=t=
>X>l>|>
>,?<?H?P?
040<0D0P0X0
1<1L1X1`1
2D2T2`2h2
3L3\3t3x3
4(40484@4D4H4P4d4l4t4|4
585@5D5`5h5l5
6 6(60686<6D6X6x6
787X7d7
8 8@8`8
9(9H9h9
:(:H:h:
;(;H;h;
<(<H<h<
=(=0=D=L=P=X=\=`=d=h=p=x=
p1t1x1
2(282H2X2p2|2
:(:D:l:
;0;T;t;
<,<L<l<
kernel32.dll
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
Eadvapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
(null)
mscoree.dll
DLC_ALL
LC_COLLATE
LC_CTYPE
LC_MONETARY
LC_NUMERIC
LC_TIME
((((( H
(
((((( H
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
Eapi-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
Eamerican
american english
american-english
australian
belgian
canadian
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
dutch-belgian
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
french-belgian
french-canadian
french-luxembourg
french-swiss
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
irish-english
italian-swiss
norwegian
norwegian-bokmal
norwegian-nynorsk
portuguese-brazilian
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
swedish-finland
america
britain
england
great britain
holland
hong-kong
new-zealand
pr china
pr-china
puerto-rico
slovak
south africa
south korea
south-africa
south-korea
trinidad & tobago
united-kingdom
united-states
CONOUT$
/sort "Visit Time" /stext "
ntdll.dll
explorer.exe
[+] FullDllName: %ws
[+] BaseDllName: %ws
windir
\explorer.exe
Elevation:Administrator!new:
{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
[%04i/%02i/%02i %02i:%02i:%02i
cAppData
\Mozilla\Firefox\Profiles\
\cookies.sqlite
UserProfile
\AppData\Local\Google\Chrome\
\AppData\Local\Microsoft\Edge\
\Opera Software\Opera Stable\
User Data\Default\Network\Cookies
User Data\Profile ?\Network\Cookies
Network\Cookies
User Data\Local State
Local State
Software\Microsoft\Windows\CurrentVersion\Run\
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
Set fso = CreateObject("Scripting.FileSystemObject")
On Error Resume Next
while fso.FileExists("
fso.DeleteFile "
fso.DeleteFolder "
fso.DeleteFile(Wscript.ScriptFullName)
\update.vbs
""", 0
CreateObject("WScript.Shell").Run "cmd /c ""
CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
SystemDrive
WinDir
\system32
\SysWOW64
ProgramFiles
ProgramData
C:\Program Files(x86)\Internet Explorer\
ieinstal.exe
ielowutil.exe
pth_unenc
H\system32\
\SysWOW64\
svchost.exe
rmclient.exe
fsutil.exe
!temp_
/stext "
http://geoplugin.net/json.gp
cmd.exe
\sysinfo.txt
dxdiag
image/jpeg
image/png
wnd_%04i%02i%02i_%02i%02i%02i
time_%04i%02i%02i_%02i%02i%02i
d alias audio
" type
open "
http\shell\open\command
program files\
program files (x86)\
lDisplayName
Publisher
DisplayVersion
InstallLocation
InstallDate
UninstallString
SETTINGS
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Remcos.4!c
Elastic Windows.Trojan.Remcos
MicroWorld-eScan Generic.Remcos.925227B1
CMC Clean
CAT-QuickHeal Clean
McAfee Remcos-FDQO!9AA44989B63C
Malwarebytes Remcos.Backdoor.Bot.DDS
VIPRE Generic.Remcos.925227B1
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Generic.Remcos.925227B1
K7GW Trojan ( 0053ac2c1 )
K7AntiVirus Trojan ( 0053ac2c1 )
BitDefenderTheta Gen:NN.ZexaF.36250.DCW@aa7aGYci
VirIT Trojan.Win32.GenusT.DIZM
Cyren W32/ABBackdoor.NMFU-7265
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Rescoms.B
APEX Malicious
Paloalto Clean
ClamAV Win.Trojan.Remcos-9841897-0
Kaspersky HEUR:Backdoor.Win32.Remcos.gen
Alibaba Backdoor:Win32/Remcos.6837b656
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Remcos.489984.B
Rising Backdoor.Remcos!1.BAC7 (CLASSIC)
TACHYON Clean
Sophos Mal/Emogen-Y
Baidu Win32.Trojan.Kryptik.awm
F-Secure Backdoor.BDS/Backdoor.Gen
DrWeb BackDoor.Remcos.362
Zillya Trojan.Rescoms.Win32.1399
TrendMicro TROJ_GEN.R002C0DF523
McAfee-GW-Edition BehavesLike.Win32.Generic.gh
Trapmine Clean
FireEye Generic.mg.9aa44989b63c667e
Emsisoft Generic.Remcos.925227B1 (B)
Ikarus Backdoor.Remcos
GData Generic.Remcos.925227B1
Jiangmin Clean
Webroot W32.Trojan.Gen
Google Detected
Avira BDS/Backdoor.Gen
Antiy-AVL Trojan[Backdoor]/Win32.Rescoms
Gridinsoft Ransom.Win32.Wacatac.cl
Xcitium Clean
Arcabit Generic.Remcos.925227B1
SUPERAntiSpyware Backdoor.Remcos/Variant
ZoneAlarm HEUR:Backdoor.Win32.Remcos.gen
Microsoft Backdoor:Win32/Remcos.GA!MTB
Cynet Malicious (score: 100)
AhnLab-V3 Backdoor/Win.Remcos.C5370570
Acronis Clean
VBA32 BScope.Trojan.Wacatac
ALYac Generic.Remcos.925227B1
MAX malware (ai score=87)
DeepInstinct MALICIOUS
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0DF523
Tencent Malware.Win32.Gencirc.10bee41b
Yandex Trojan.Rescoms!nFcse4ftzhs
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Remcos.A!tr
AVG Win32:RATX-gen [Trj]
Cybereason malicious.9b63c6
Avast Win32:RATX-gen [Trj]
No IRMA results available.