Static | ZeroBOX

PE Compile Time

2025-02-24 19:00:41

PE Imphash

f2fe0712ecb6c4feca65be4f410e904e

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0004bd72 0x0004be00 6.59719730377
.rdata 0x0004d000 0x0001674c 0x00016800 5.87765654122
.data 0x00064000 0x000058b4 0x00000e00 2.96427957909
.tls 0x0006a000 0x00000009 0x00000200 0.0203931352361
.gfids 0x0006b000 0x00000230 0x00000400 2.42706773368
.rsrc 0x0006c000 0x00004adc 0x00004c00 3.9837288858
.reloc 0x00071000 0x000032c8 0x00003400 6.63848561097

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0006e024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0006e024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0006e024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0006e024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_RCDATA 0x000705cc 0x000004cd LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x00070a9c 0x0000003e LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x44d0b8 VirtualAlloc
0x44d0bc LoadLibraryA
0x44d0c0 GetNativeSystemInfo
0x44d0c4 HeapAlloc
0x44d0c8 GetProcAddress
0x44d0cc GetProcessHeap
0x44d0d0 FreeLibrary
0x44d0d4 IsBadReadPtr
0x44d0d8 GetCurrentProcess
0x44d0dc GetSystemDirectoryA
0x44d0e0 GlobalAlloc
0x44d0e4 GlobalLock
0x44d0e8 GetCurrentProcessId
0x44d0ec GetTickCount
0x44d0f0 GlobalUnlock
0x44d0f4 LocalAlloc
0x44d0f8 GetModuleHandleA
0x44d0fc GlobalFree
0x44d100 MulDiv
0x44d104 SizeofResource
0x44d108 QueryDosDeviceW
0x44d10c FindFirstVolumeW
0x44d118 lstrlenW
0x44d11c GetStdHandle
0x44d120 RemoveDirectoryW
0x44d124 FindResourceA
0x44d128 OpenProcess
0x44d12c lstrcatW
0x44d130 LockResource
0x44d134 LoadLibraryW
0x44d138 LoadResource
0x44d13c LocalFree
0x44d140 GetFileSize
0x44d144 FindVolumeClose
0x44d14c lstrcpyW
0x44d150 SetConsoleOutputCP
0x44d154 FormatMessageA
0x44d158 FindNextVolumeW
0x44d15c VirtualFree
0x44d160 GetLastError
0x44d164 GetModuleFileNameA
0x44d168 lstrcpynA
0x44d184 HeapSize
0x44d188 WriteConsoleW
0x44d18c SetStdHandle
0x44d1a0 GetCommandLineW
0x44d1a4 GetCommandLineA
0x44d1a8 GetOEMCP
0x44d1ac IsValidCodePage
0x44d1b0 FindFirstFileExA
0x44d1b4 ReadConsoleW
0x44d1b8 GetConsoleMode
0x44d1bc GetConsoleCP
0x44d1c0 FlushFileBuffers
0x44d1c4 GetFileType
0x44d1c8 EnumSystemLocalesW
0x44d1cc GetUserDefaultLCID
0x44d1d0 IsValidLocale
0x44d1d4 HeapReAlloc
0x44d1d8 GetACP
0x44d1dc GetModuleHandleExW
0x44d1e0 MoveFileExW
0x44d1e4 RtlUnwind
0x44d1e8 RaiseException
0x44d1ec LoadLibraryExW
0x44d1f0 SetLastError
0x44d1f4 VirtualProtect
0x44d1f8 Process32FirstW
0x44d1fc Process32NextW
0x44d204 GetLocaleInfoA
0x44d208 ExitProcess
0x44d20c CreateMutexA
0x44d210 GetModuleFileNameW
0x44d214 AllocConsole
0x44d218 GetLongPathNameW
0x44d220 FindNextFileA
0x44d224 WaitForSingleObject
0x44d228 FindFirstFileA
0x44d22c MoveFileW
0x44d230 SetFilePointerEx
0x44d238 DeleteFileW
0x44d23c DeleteFileA
0x44d240 SetFileAttributesW
0x44d244 GetFileAttributesW
0x44d248 CreateFileW
0x44d24c FindClose
0x44d250 lstrlenA
0x44d254 GetDriveTypeA
0x44d258 FindNextFileW
0x44d25c GetFileSizeEx
0x44d260 FindFirstFileW
0x44d264 CreateDirectoryW
0x44d268 CreateProcessA
0x44d26c Sleep
0x44d270 PeekNamedPipe
0x44d274 CreatePipe
0x44d278 TerminateProcess
0x44d27c WriteFile
0x44d280 ReadFile
0x44d284 HeapFree
0x44d288 HeapCreate
0x44d28c CreateEventA
0x44d290 GetLocalTime
0x44d294 CreateThread
0x44d298 CloseHandle
0x44d29c SetEvent
0x44d2a0 CreateEventW
0x44d2a4 lstrcmpW
0x44d2a8 GetCPInfo
0x44d2ac GetStringTypeW
0x44d2b0 GetLocaleInfoW
0x44d2b4 LCMapStringW
0x44d2b8 CompareStringW
0x44d2bc TlsFree
0x44d2c0 TlsSetValue
0x44d2c4 TlsGetValue
0x44d2c8 TlsAlloc
0x44d2d0 MultiByteToWideChar
0x44d2d4 DecodePointer
0x44d2d8 EncodePointer
0x44d2dc WideCharToMultiByte
0x44d2e0 InitializeSListHead
0x44d2e8 GetCurrentThreadId
0x44d2ec GetStartupInfoW
0x44d2f8 IsDebuggerPresent
0x44d300 GetModuleHandleW
0x44d308 ResetEvent
0x44d30c SetEndOfFile
Library USER32.dll:
0x44d338 SetWindowTextW
0x44d33c TranslateMessage
0x44d340 DispatchMessageA
0x44d344 GetMessageA
0x44d348 GetWindowTextW
0x44d34c SetForegroundWindow
0x44d350 SetClipboardData
0x44d354 GetClipboardData
0x44d358 EnumWindows
0x44d35c ExitWindowsEx
0x44d360 EmptyClipboard
0x44d364 CloseClipboard
0x44d368 OpenClipboard
0x44d36c ShowWindow
0x44d370 CreatePopupMenu
0x44d374 TrackPopupMenu
0x44d378 DefWindowProcA
0x44d37c CreateWindowExA
0x44d380 AppendMenuA
0x44d384 MessageBoxW
0x44d388 IsWindowVisible
0x44d38c CloseWindow
0x44d394 SendInput
0x44d39c mouse_event
0x44d3a0 MapVirtualKeyA
0x44d3a4 DrawIcon
0x44d3a8 GetSystemMetrics
0x44d3ac GetIconInfo
0x44d3b4 GetForegroundWindow
0x44d3b8 RegisterClassExA
0x44d3bc GetCursorPos
Library GDI32.dll:
0x44d090 SelectObject
0x44d094 CreateCompatibleDC
0x44d098 StretchBlt
0x44d09c GetDIBits
0x44d0a0 DeleteDC
0x44d0a4 DeleteObject
0x44d0a8 CreateDCA
0x44d0ac GetObjectA
0x44d0b0 BitBlt
Library ADVAPI32.dll:
0x44d000 RegCreateKeyA
0x44d008 CryptGenRandom
0x44d00c CryptReleaseContext
0x44d010 GetUserNameW
0x44d014 RegEnumKeyExA
0x44d018 GetTokenInformation
0x44d01c QueryServiceStatus
0x44d020 CloseServiceHandle
0x44d024 OpenSCManagerW
0x44d028 OpenSCManagerA
0x44d02c ControlService
0x44d030 StartServiceW
0x44d034 QueryServiceConfigW
0x44d03c OpenServiceW
0x44d040 EnumServicesStatusW
0x44d04c OpenProcessToken
0x44d050 RegQueryInfoKeyW
0x44d054 RegQueryValueExA
0x44d058 RegCreateKeyExW
0x44d05c RegEnumKeyExW
0x44d060 RegSetValueExW
0x44d064 RegSetValueExA
0x44d068 RegOpenKeyExA
0x44d06c RegOpenKeyExW
0x44d070 RegCreateKeyW
0x44d074 RegDeleteValueW
0x44d078 RegEnumValueW
0x44d07c RegQueryValueExW
0x44d080 RegCloseKey
0x44d084 RegDeleteKeyA
Library SHELL32.dll:
0x44d314 ShellExecuteExA
0x44d318 Shell_NotifyIconA
0x44d31c ExtractIconA
0x44d320 ShellExecuteW
Library SHLWAPI.dll:
0x44d328 StrToIntA
0x44d32c PathFileExistsA
0x44d330 PathFileExistsW
Library WINMM.dll:
0x44d3d8 PlaySoundW
0x44d3dc mciSendStringA
0x44d3e0 mciSendStringW
Library WS2_32.dll:
0x44d3e8 inet_addr
0x44d3ec WSASetLastError
0x44d3f0 gethostbyname
0x44d3f4 gethostbyaddr
0x44d3f8 WSAGetLastError
0x44d3fc recv
0x44d400 connect
0x44d404 socket
0x44d408 send
0x44d40c WSAStartup
0x44d410 closesocket
0x44d414 htons
0x44d418 htonl
0x44d41c getservbyname
0x44d420 inet_ntoa
0x44d424 ntohs
0x44d428 getservbyport
Library urlmon.dll:
0x44d45c URLDownloadToFileW
Library gdiplus.dll:
0x44d430 GdiplusStartup
0x44d438 GdipCloneImage
0x44d43c GdipAlloc
0x44d440 GdipDisposeImage
0x44d444 GdipFree
Library WININET.dll:
0x44d3c4 InternetOpenUrlW
0x44d3c8 InternetOpenW
0x44d3cc InternetCloseHandle
0x44d3d0 InternetReadFile

!This program cannot be run in DOS mode.
q5H+/0I
q4H3/0I
/1I2.0I
q9Hu/0I
/0IRich
`.rdata
@.data
.gfids
@.rsrc
@.reloc
^|9^xv
tD;Nxr
jD^VSh
9{Lt:V
D$$PuI
L$(+\$
u 8_=t
Y<9X8t
u$Wj@h
P4+S4t
V,YYG;~
u"VVVV
SVWj j
VjxVVh
L$0h\|F
SVWj 3
SVWj@3
SVWj@3
YSSSSSSSj
QQSVW3
DSVWj,3
t SSSj
SSSSSS
u0hHzF
tZ<*u=N
t$<.t:G
u2j$Xf
u2j$Xf
u j ^j
SVWjGZ
<0r"<9w
4V9~,
SVWj7^
SVWj7j
QQj7PQQ
QQj7PQQ
PWWj Sj
t]j@^+
N`j8[;
v4j@X+
9E$WWV
t,WW9}
jA[jZZ+
QQSVWd
URPQQh0%C
;t$,v-
UQPXY]Y[
u0jAXf;
u0jAXf;
<xt"<Xt
PVSQSWV
SVjA[jZ^+
jAZjZ^
^$+^8+
^$+^8+
SVWjA_jZ+
uBjAYjZ+
t/j=[f;
QSSSSj
pLh<VF
tyPVj@W
_tcPVj@
u#j,Xf;
PPPPPPPP
mSjA[jZ^+
8jZZf;
PPPPPWS
PP9E u:PPVWP
TVhx0E
Wj0XPV
<at<rt
>=umF8
D8(HXt:f
D8(Ht5F
WWWPWS
u-PWWS
SSVWh
f9:t!V
|VWj=S
}VWj=S
tl9tX
35lYF
QQSWj0j@
<0|o<9
tl=xAF
u^9^\t/
VX9^`tT
;N\u\W
u2Vj@hP;E
9C`u99C\t4
9C`u5Wj
WHPh`>E
HPhP;E
PPPPPPPP
InitializeConditionVariable
SleepConditionVariableCS
WakeAllConditionVariable
bad allocation
bad array new length
invalid argument
invalid seek
io error
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no lock available
no message available
no message
no protocol option
no space on device
no stream resources
no such device or address
no such device
no such file or directory
no such process
not a directory
not a socket
not a stream
not connected
not enough memory
not supported
operation canceled
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
permission denied
protocol error
protocol not supported
read only file system
resource deadlock would occur
resource unavailable try again
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many files open
too many links
too many symbolic link levels
value too large
wrong protocol type
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
cross device link
destination address required
device or resource busy
directory not empty
executable format error
file exists
file too large
filename too long
function not supported
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
interrupted
unknown error
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreW
CreateSemaphoreExW
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
FlushProcessWriteBuffers
FreeLibraryWhenCallbackReturns
GetCurrentProcessorNumber
CreateSymbolicLinkW
GetCurrentPackageId
GetTickCount64
GetFileInformationByHandleEx
SetFileInformationByHandle
GetSystemTimePreciseAsFileTime
WakeConditionVariable
InitializeSRWLock
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
SleepConditionVariableSRW
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CompareStringEx
GetLocaleInfoEx
LCMapStringEx
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefghijklmnopqrstuvwxyz
bad exception
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`h````
xpxxxx
`h`hhh
xwpwpp
(null)
[aOni*{
~ $s%r
@b;zO]
v2!L.2
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
AreFileApisANSI
EnumSystemLocalesEx
GetUserDefaultLocaleName
IsValidLocaleName
LCIDToLocaleName
LocaleNameToLCID
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
UTF-16LEUNICODE
_hypot
_nextafter
1#QNAN
1#SNAN
]vQ<)8
|)P!?Ua0
Eb2]A=
u?^p?o4
y1~?|"
?x+s7
?5Od%
?|I7Z#
>,'1D=
?g)([|X>=
~U`?K
:h"?bC
@H#?43
Ax#?uN}*
r7Yr7=
F0$?3=1
H`$?h|
&?~YK|
sU0&?W
<8bunz8
?#%X.y
F||<##
<@En[vP
?5Wg4p
%S#[k=
"B <1=
Failed to initialize TLS
Failed to initialize TLS context
Failed to load TLS certificate
Failed to load TLS key
Failed to load peer certificate
TLS Handshake... |
TLS Error 1
TLS Error 2
TLS Authentication Failed
TLS Error 3
Connection Refused
Connection Failed:
KeepAlive | Enabled | Timeout:
KeepAlive | Disabled
Connection Timeout
string too long
invalid string position
DisplayMessage
GetMessage
CloseChat
invalid vector<T> subscript
cmd.exe
SystemDrive
ZipFiles
UnzipFiles
Browsing directory:
Executing file:
Downloading file:
Downloaded file:
Failed to download file:
Deleted file:
Unable to delete:
Unable to rename file!
Uploaded file:
Failed to upload file:
Uploading file to Controller:
SetFilePointerEx error
ReadFile error
\AppData\Local\Google\Chrome\User Data\Default\Login Data
UserProfile
[Chrome StoredLogins not found]
[Chrome StoredLogins found, cleared!]
\AppData\Local\Google\Chrome\User Data\Default\Cookies
[Chrome Cookies not found]
[Chrome Cookies found, cleared!]
\AppData\Roaming\Mozilla\Firefox\Profiles\
[Firefox StoredLogins not found]
\logins.json
\key3.db
[Firefox StoredLogins Cleared!]
[Firefox Cookies not found]
\cookies.sqlite
[Firefox cookies found, cleared!]
Cookies
\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
[IE cookies not found]
[IE cookies cleared!]
[Cleared browsers logins and cookies.]
Cleared browsers logins and cookies.
FunFunc
exepath
Unknown exception
bad cast
bad locale name
generic
iostream
iostream stream error
ios_base::badbit set
ios_base::failbit set
ios_base::eofbit set
license_code.txt
Software\
licence
Remcos Agent initialized
Access Level:
Administrator
System
override
6.1.0 Light
StartForward
StartReverse
StopForward
StopReverse
GetDirectListeningPort
finished
s ap traffic
s hs traffic
TLS 1.3, client CertificateVerify
traffic upd
derived
tls13
c ap traffic
c hs traffic
TLS 1.3, server CertificateVerify
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
>!KK
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
t>!K
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
tt>!
pp|B>>q
aaj_55
UUPx((
SHA256wECDSA
Unknown
?456789:;<=
 !"#$%&'()*+,-./0123@
lzNg},8S*:#
)U[/t|
SECP112R1
DB7C2ABF62E35E668076BEAD208B
DB7C2ABF62E35E668076BEAD2088
659EF8BA043916EEDE8911702B22
DB7C2ABF62E35E7628DFAC6561C5
9487239995A5EE76B55F9C2F098
A89CE5AF8724C0A23E0E0FF77500
SECP128R1
FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC
E87579C11079F43DD824993C2CEE5ED3
FFFFFFFE0000000075A30D1B9038A115
161FF7528B899B2D0C28607CA52C5B86
CF5AC8395BAFEB13C02DA292DDED7A83
SECP160R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC
1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45
100000000000000000001F4C8F927AED3CA752257
4A96B5688EF573284664698968C38BB913CBFC82
23A628553168947D59DCC912042351377AC5FB32
SECP192R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC
64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1
FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831
188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012
7192B95FFC8DA78631011ED6B24CDD573F977A11E794811
SECP224R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE
B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4
FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D
B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21
BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34
PRIME239V1
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC
6B016C3BDCF18941D0D654921475CA71A9DB2FB27D1D37796185C2942C0A
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF9E5E9A9F5D9071FBD1522688909D0B
0FFA963CDCA8816CCC33B8642BEDF905C3D358573D3F27FBBD3B3CB9AAAF
7DEBE8E4E90A5DAE6E4054CA530BA04654B36818CE226B39FCCB7B02F1AE
SECP256R1
FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC
5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B
FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551
6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296
4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5
SECP384R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFC
B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0DB248B0A77AECEC196ACCC52973
AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7
3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F
SECP521R1
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC
51953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409
C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66
11839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650
[regsplt]
SHDeleteKeyW
Shlwapi.dll
vector<T> too long
getaddrinfo
getnameinfo
freeaddrinfo
\ws2_32
\wship6
TLS On
TLS Off
Connecting |
Connection Error:
Connection Error: Unable to create socket
Connected |
hlight
Disconnected
SetSuspendState
PowrProf.dll
SeShutdownPrivilege
GetCursorInfo
User32.dll
PromptOnSecureDesktop
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DISPLAY
alarm.wav
Alarm triggered
play audio
pause audio
resume audio
status audio mode
stopped
stop audio
close audio
GetLastInputInfo
\Software
S-1-5-18
WTSGetActiveConsoleSessionId
kernel32
WTSQuerySessionInformationW
WTSFreeMemory
ProductName
SOFTWARE\Microsoft\Windows NT\CurrentVersion
CurrentBuildNumber
(64 bit)
(32 bit)
SETTINGS
%02i:%02i:%02i:%03i
abcdefghijklmnopqrstuvwxyz
Software\Microsoft\Windows\CurrentVersion\Uninstall
\Control Panel\Desktop
WallpaperStyle
TileWallpaper
GetProcessImageFileNameW
Kernel32
SetProcessDpiAwareness
shcore
user32
NtUnmapViewOfSection
GlobalMemoryStatusEx
IsWow64Process
GetComputerNameExW
IsUserAnAdmin
Shell32
SetProcessDEPPolicy
EnumDisplayDevicesW
EnumDisplayMonitors
GetMonitorInfoW
GetSystemTimes
Shlwapi
GetConsoleWindow
NtSuspendProcess
NtResumeProcess
GetExtendedTcpTable
Iphlpapi
GetExtendedUdpTable
ConvertSidToStringSidA
Advapi32.dll
CONOUT$
______
(_____ \
_____) )_____ ____ ____ ___ ___
| __ /| ___ | \ / ___) _ \ /___)
| | \ \| ____| | | ( (__| |_| |___ |
|_| |_|_____)_|_|_|\____)___/(___/
Remcos v
BreakingSecurity.net
Remcos
MsgWindowClass
TLS13-AES128-GCM-SHA256
/serialNumber=
/emailAddress=
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
-----BEGIN DH PARAMETERS-----
-----END DH PARAMETERS-----
-----BEGIN X509 CRL-----
-----END X509 CRL-----
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
-----BEGIN EC PRIVATE KEY-----
-----END EC PRIVATE KEY-----
-----BEGIN DSA PRIVATE KEY-----
-----END DSA PRIVATE KEY-----
-----BEGIN PUBLIC KEY-----
-----END PUBLIC KEY-----
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz+/
UUUUUU
?UUUUUU
?333333
?Dj0Q:W$=
5s3R6=
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCC
.CRT$XCL
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$T
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.tls$ZZZ
.gfids$x
.gfids$y
.rsrc$01
.rsrc$02
WaitForSingleObject
CreateEventW
SetEvent
CloseHandle
CreateThread
GetLocalTime
CreateEventA
HeapCreate
HeapFree
ReadFile
WriteFile
TerminateProcess
CreatePipe
PeekNamedPipe
CreateProcessA
CreateDirectoryW
FindFirstFileW
GetFileSizeEx
FindNextFileW
GetDriveTypeA
lstrlenA
FindClose
CreateFileW
GetFileAttributesW
SetFileAttributesW
DeleteFileA
DeleteFileW
GetLogicalDriveStringsA
SetFilePointerEx
MoveFileW
FindFirstFileA
FindNextFileA
ExpandEnvironmentStringsA
GetLastError
GetLongPathNameW
GetModuleFileNameW
CreateMutexA
ExitProcess
GetLocaleInfoA
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
HeapAlloc
GetProcAddress
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetCurrentProcess
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetCurrentProcessId
GetTickCount
GlobalUnlock
LocalAlloc
GetModuleHandleA
GlobalFree
MulDiv
SizeofResource
QueryDosDeviceW
FindFirstVolumeW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
lstrlenW
GetStdHandle
RemoveDirectoryW
FindResourceA
OpenProcess
lstrcatW
LockResource
LoadLibraryW
LoadResource
LocalFree
GetFileSize
FindVolumeClose
GetVolumePathNamesForVolumeNameW
lstrcpyW
SetConsoleOutputCP
FormatMessageA
FindNextVolumeW
AllocConsole
lstrcmpW
GetModuleFileNameA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
KERNEL32.dll
TranslateMessage
DispatchMessageA
GetMessageA
GetWindowTextW
SetForegroundWindow
SetClipboardData
GetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
CloseClipboard
OpenClipboard
ShowWindow
SetWindowTextW
MessageBoxW
IsWindowVisible
CloseWindow
GetWindowThreadProcessId
SendInput
EnumDisplaySettingsW
mouse_event
MapVirtualKeyA
DrawIcon
GetSystemMetrics
GetIconInfo
SystemParametersInfoW
GetForegroundWindow
GetCursorPos
RegisterClassExA
AppendMenuA
CreateWindowExA
DefWindowProcA
TrackPopupMenu
CreatePopupMenu
USER32.dll
GetObjectA
CreateDCA
DeleteObject
DeleteDC
GetDIBits
StretchBlt
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
GDI32.dll
RegDeleteKeyA
RegCloseKey
RegCreateKeyA
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegCreateKeyW
RegOpenKeyExW
RegOpenKeyExA
RegSetValueExA
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryValueExA
RegQueryInfoKeyW
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusW
OpenServiceW
ChangeServiceConfigW
QueryServiceConfigW
StartServiceW
ControlService
OpenSCManagerA
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
GetTokenInformation
RegEnumKeyExA
GetUserNameW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
ADVAPI32.dll
ShellExecuteW
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
SHELL32.dll
StrToIntA
PathFileExistsA
PathFileExistsW
SHLWAPI.dll
mciSendStringW
mciSendStringA
PlaySoundW
WINMM.dll
WS2_32.dll
URLDownloadToFileW
URLOpenBlockingStreamW
urlmon.dll
GdipLoadImageFromStream
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusStartup
gdiplus.dll
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
WININET.dll
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
EncodePointer
DecodePointer
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
LoadLibraryExW
RaiseException
RtlUnwind
MoveFileExW
GetModuleHandleExW
GetACP
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
HeapSize
SetEndOfFile
Copyright (c) by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVtype_info@@
.?AVbad_alloc@std@@
.?AVbad_array_new_length@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AV_Facet_base@std@@
.?AV_Locimp@locale@std@@
.?AVfacet@locale@std@@
.?AU_Crt_new_delete@std@@
.?AVcodecvt_base@std@@
.?AUctype_base@std@@
.?AV?$ctype@D@std@@
.?AV?$codecvt@DDU_Mbstatet@@@std@@
.?AVbad_exception@std@@
.?AVfailure@ios_base@std@@
.?AVruntime_error@std@@
.?AVsystem_error@std@@
.?AVbad_cast@std@@
.?AV_System_error@std@@
.?AVexception@std@@
33333333tQQ
33333333
/(s4EA
PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD
0#0/090E0O0]0g0u0
1"1,181B1N1X1d1n1z1
2#2-292C2O2Y2e2o2}2
3"3'3-34393?3I3U3_3m3w3
4(444>4
6,6K6Z6j6
717<7H7^7
8%8U8d8~8
:!:6:E:I:P:U:]:i:q:z:
:D<W<b<k<
>.>V>^>i>
?-?H?Q?X?
0%040X0g0H7
353A3x3
3(474B4
<'<,<><I<V<c<i<n<s<y<
=#=,=3===C=z=
=,>P>\>j>v>{>
?$?,?M?
4.4X4}4
;S<j<y=
0E0R0g0
0#1/141A1G1W1f1
6$767e7
;?;N;c;w;
>M>L?y?~?
00?0F0U0
314K4g4
;H<#=m=
>1?6?g?q?
0%0j0x0
2+2?2~2
4)454S4X4]4
495D5Y5
6S6d6s6
7"797?7b7
7"81868<8|8
9!9&9/9<9i9
:!:[:g:
;Q;X;_;p;
<!<H<V<p<
= =%=7===o=t=
=7>>>J>x>
?F?K?c?
0#0/0^0
1c2g2k2o2s2w2{2
3%4*4Z4r4
;(;:;|;
0,1c1p1
2[3m3v3
3 474D4V4s4
5!5+5R5w5|5
717@7I7\7c7j7{7
859:9?9N9
; ;4<C<S<]<
;S<z<H=
000G0U0a0o0
2$3L3Y3
7]7i7n7z7
:):c<8=S=l=
>0?:?A?H?O?
0$191r1
2,272g2
3?3W3`3i3w3
5'5N5W5b5
8:8U8o8
9%9=9U9m9
;$;2;>;8<
90C0O0
:$:<:e:
;';7;H;Q;Z;n;s;
=<=P=V=^=d=y=~=
>"><>F>[>j>
0+0>0L0h0
0"1r1~1
1W4$7:7I7
: :/:i:
:2;I;N;U;x;
=.=c=|=
0*080X0a0
7"70767<7B7
8$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
<+=2=@=M=
0(020?0U0\0g0n0
5&5F5R5
8 999_9n9
:b;l;q;~;
<O=c=s=
=4>H>W>
d0o0w0~0
181J1\1i1n1
2,2:2W2h2z2
2I3i3v3
334:4C4K4i5p5
7.7X7u7z7
8%8*8E8K8T8]8c8
1&212m2{2
5"5N5b5o5~5
66R6f6s6
6!757B7w7
:^;d;l;x;
<5<;<F<L<V<\<h<x<
<,=l=r=|=
>#>r>y>
?6?>?M?R?X?^?f?q?
%0*0/0E0[0m0
2"2)212F2W2k2}2
4g5)6>6F6R6
;&;-;G;X;c;
<!=9=G=O=t=
0)0<0l0
1L1Y1b1
2/2J2O2
4!4M4R4
5"5F5e5
6#6(6-676@6E6O6T6Y6c6h6r6w6|6
7#7(7-777<7A7K7P7U7_7d7i7t7z7
8.8T8j8
80B0Q0[0e0o0y0~0
22'2-22292B2O2c3j3
3 3&343:3@3
6$6E6R6a6n6{6
7*757;7A7J7V7^7
2(4,4044484<4@4D4H4L4R4;5T5
7#7/797X7_7l7v7
8!8-8:8Z8a8n8x8
9%9/9N9U9b9o9
9$:9:M:_:
;5;E;Z;o;
<+<?<s<
0%070?0F0S0Z0f0m0}0
?4?;?s?z?
0"0)0B0X0q0
1!1+1=1R1b1f1j1n1r1v1z1~1
::1:<;h;r;
>X?j?w?
!303M3^3l3
>0R0j0
8+8J8g8
4/4U4j4q4w4
4%5-5F5
6#6,6E6K6P6[6j6t6
7!7'7-73797C7M7X7b7g7
:,:2:G:_:e:u:
<@<I<V<a<j<y<
>&>1>N>
?.?4?{?
080>0D0J0P0V0]0d0k0r0y0
1?1E1K1Q1W1]1d1k1r1y1
2$2A2\2{2
3-353E3`3y3
4+4;4H4]4|4
5,555=5S5o5
<!<'<-<4<A<
=]>c>j>q>w>|>
?#?)?/?4?:?@?F?K?Q?W?]?b?h?n?t?y?
0 0&0,01070=0C0H0N0T0Z0_0e0k0q0v0|0
1#1)1.141:1@1E1K1Q1W1\1b1h1n1s1y1
62:>:D:r:
>'?/?A?
0L0\0s0{0
1!1&1M1V1[1`1
2A2I2N2^2h2
475O5T5
3)3J3X3^3y3
44+4G4g4u4|4
929O9Z9
0/0P0L1k1p1$2
34$4+4O4p4
515H5k5
5&6:6C6
2|3.4[4
8!8%8)8
85999=9A9E9I9M9Q9
9Q:U:Y:]:a:e:i:m:
3/4d8~8
454P4[4
6=6L6b6x6
6F7M7_7h7
8[8m8s8
;/<4<U<
>%?B?h?
00)0.090D0X0
4=4B4O4[4q4
5%5_5d5q5v5
6-666}6
:%:-:5:
1G2a2 3
<H=N=<>V>i>
4Z5g5w5
=}=6>=>j>q>
>-?>?X?a?n?x?
7B7I7O7V7h7m7
8L8\8s8{8
9#9(9-9E9f9
:G:R:W:\:w:
;#;-;I;T;Y;^;|;
<!<<<F<b<m<r<w<
=+=6=;=@=[=r=
?.?3?8?Z?h?w?
6G6n6y6
777V7l7v7
7"8K8t8
999b9~9
263H3N3
11.151M1T1r183C3j3
738|899W9z9
:&;2;J;
</=S=\>
?+?Z?w?
5<6K6]6o6
77&7@7O7Y7f7p7
8+8=:j:
;$;-;b;
=L=Q=W=\=
>!?,?9?J?X?`?
1]1k1s1
626T6{6
6!7(7/767C7
9'999f9
<#<@<H<q<x<
<(=/=8=b=u=
>&>X>n>
?X?j?|?
000o0X3
4414C4U4
4V6]6e6m6u62:u;
5T6g6W7
?@?U?l?
<#<9<A<
2U3g3y3\4
515G5P5[5c5
7%7T7t7
869>9d9
2I3f3v3+4,5<5M5U5e5v5
7#727=7A7
;(<R<f<
6=6D6n9c:k:
0!1F1R1^1q1
2$202<2O2s2
;*;2;O;_;k;z;e<
5;6C6K6
7J7Y7h7
81999A9I9g9o9
;8<N<d<m<x<
>">:>B>q>
A0I0o0
3!454M4U4v4
8I8Q8Y8a8
;>;a;|;
<$<.<8<B<L<V<`<j<t<
=#=-=7=A=K=U=_=i=
d4l4p4t4x4|4
5 5$5(5,5054585D5H5L5P5T5X5\5`5t5x5|5
6064686T6X6\6`6d6h6l6p6t6x6|6
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?D?L?T?\?d?l?t?|?
`2d2h2l2p2t2x2|2
7$7,747<7D7L7T7\7d7l7t7|7
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
;$;,;4;<;D;L;T;\;d;l;t;|;
<$<,<4<<<D<L<T<\<d<l<t<|<
=$=,=4=<=D=L=T=\=d=l=t=|=
> >(>0>8>@>H>P>X>`>h>p>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9
: :$:(:,:
=$=(=,=0=4=8=@=D=H=L=P=T=X=\=`=d=h=l=p=t=x=|=
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;x;|;
1P;\;h;t;
<(<4<@<L<X<d<p<|<
=$=0=<=H=T=`=l=x=
> >,>8>D>P>`>l>x>
? ?,?8?D?P?\?h?
D0L0T0\0d0l0t0|0
243<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4d4l4t4|4
5$5,545<5D5L5T5\5d5l5t5|5
6$6,646<6D6L6T6\6d6l6t6|6
7$7,747<7D7L7T7\7d7l7t7|7
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:P:X:`:h:p:x:
; ;(;0;8;@;H;P;X;`;h;p;x;
< <(<0<8<@<H<P<X<`<h<p<x<
= =(=0=8=@=H=P=X=`=h=p=x=
> >(>0>8>@>H>P>X>`>h>p>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1
?$?(?,?0?4?8?<?@?D?H?L?P?T?X?\?`?d?h?l?p?t?x?|?
202@2D2\2
D7H7P7d7h7l7p7
8,80848<8T8d8h8x8|8
9 9(9@9P9T9d9h9l9p9x9
:$:4:8:H:L:P:T:X:`:x:|:
;(;,;<;@;D;L;d;t;x;
< <0<4<8<<<@<D<L<d<t<x<
2,2<2L2X2`2
3D3L3T3`3h3
4L4\4h4p4
5 5T5d5|5
60686@6H6L6P6X6l6t6|6
7@7H7L7h7p7t7
7$8(80888@8D8L8`8
9(9H9h9
:$:(:H:h:
;0;P;p;
<0<P<p<
=0=P=p=
>0>L>P>X>`>
?$?8?@?D?L?T?\?p?x?
`1d1h1x1|1
2(282H2`2l2p2t2
:$:L:l:
;4;T;t;
<,<L<h<
kernel32.dll
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
Eadvapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
(null)
mscoree.dll
DLC_ALL
LC_COLLATE
LC_CTYPE
LC_MONETARY
LC_NUMERIC
LC_TIME
((((( H
(
((((( H
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
Eapi-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
user32
Damerican
american english
american-english
australian
belgian
canadian
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
dutch-belgian
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
french-belgian
french-canadian
french-luxembourg
french-swiss
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
irish-english
italian-swiss
norwegian
norwegian-bokmal
norwegian-nynorsk
portuguese-brazilian
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
swedish-finland
america
britain
england
great britain
holland
hong-kong
new-zealand
pr china
pr-china
puerto-rico
slovak
south africa
south korea
south-africa
south-korea
trinidad & tobago
united-kingdom
united-states
CONOUT$
Set fso = CreateObject("Scripting.FileSystemObject")
On Error Resume Next
while fso.FileExists("
fso.DeleteFile "
fso.DeleteFolder "
fso.DeleteFile(Wscript.ScriptFullName)
\update.vbs
""", 0
CreateObject("WScript.Shell").Run "cmd /c ""
CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
SystemDrive
WinDir
\system32
\SysWOW64
ProgramFiles
AppData
UserProfile
ProgramData
pth_unenc
http://geoplugin.net/json.gp
cmd.exe
\sysinfo.txt
dxdiag
image/jpeg
image/png
d alias audio
" type
open "
Wtsapi32.dll
system
lDisplayName
Publisher
DisplayVersion
InstallLocation
InstallDate
UninstallString
SETTINGS
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Remcos.m!c
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
CTX exe.trojan.remcos
CAT-QuickHeal Trojan.RemcosRAT.S31331583
ALYac Dump:Generic.Dacic.A9349469.A.02C5EA08
Cylance Unsafe
Zillya Trojan.Rescoms.Win32.2190
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
K7GW Trojan ( 0057919d1 )
K7AntiVirus Trojan ( 0057919d1 )
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
APEX Malicious
Paloalto Clean
ClamAV Win.Trojan.Remcos-9841897-0
Alibaba Backdoor:Win32/Remcos.7752029f
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Dump:Generic.Dacic.A9349469.A.02C5EA08
Sophos Mal/Remcos-B
F-Secure Backdoor.BDS/Backdoor.Gen
VIPRE Dump:Generic.Dacic.A9349469.A.02C5EA08
McAfeeD Real Protect-LS!E5A997DCD4D6
Trapmine suspicious.low.ml.score
CMC Clean
Emsisoft Dump:Generic.Dacic.A9349469.A.02C5EA08 (B)
huorong HEUR:Backdoor/Remcos.ae
GData Win32.Backdoor.Remcos.YMF452
Jiangmin Clean
Webroot Clean
Avira BDS/Backdoor.Gen
Antiy-AVL Clean
Kingsoft malware.kb.a.1000
Gridinsoft Trojan.Win32.Remcos.tr
Xcitium Clean
Arcabit Dump:Generic.Dacic.A9349469.A.02C5EA08
SUPERAntiSpyware Clean
ZoneAlarm Mal/Remcos-B
Microsoft Trojan:Win32/Remcos!MTB
Varist W32/Agent.JUB.gen!Eldorado
AhnLab-V3 Trojan/Win.RemcosRAT.R693547
Acronis Clean
McAfee GenericRXVH-QA!E5A997DCD4D6
TACHYON Clean
VBA32 BScope.Backdoor.Remcos
Malwarebytes Generic.Malware.AI.DDS
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.VSX.PE04C9V
Tencent Trojan.Win32.Remcos.16001234
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
Fortinet W32/Remcos.M!tr
Panda Trj/Genetic.gen
alibabacloud Backdoor:Win/Remcos
No IRMA results available.