Static | ZeroBOX

PE Compile Time

2025-02-24 19:00:11

PE Imphash

41e05d591d7d93bdd5bc6d5da04da74b

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0005715b 0x00057200 6.63330946245
.rdata 0x00059000 0x00018ce6 0x00018e00 5.75373613283
.data 0x00072000 0x00005e2c 0x00000e00 3.11435064034
.rsrc 0x00078000 0x00004bac 0x00004c00 3.99456151662
.reloc 0x0007d000 0x00003cac 0x00003e00 6.67061645234

Resources

Name Offset Size Language Sub-language File type
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x0007a024 0x000025a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_RCDATA 0x0007c5cc 0x0000059e LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x0007cb6c 0x0000003e LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x4590b8 FindFirstFileA
0x4590bc FindNextFileA
0x4590c4 GetModuleFileNameW
0x4590c8 GetLongPathNameW
0x4590cc CopyFileW
0x4590d0 GetLocaleInfoA
0x4590d4 VirtualProtect
0x4590d8 SetLastError
0x4590dc VirtualFree
0x4590e0 VirtualAlloc
0x4590e4 LoadLibraryA
0x4590e8 GetNativeSystemInfo
0x4590ec HeapAlloc
0x4590f0 GetProcessHeap
0x4590f4 FreeLibrary
0x4590f8 IsBadReadPtr
0x4590fc GetTempPathW
0x459100 lstrcatW
0x459104 GetCurrentProcessId
0x459108 GetTempFileNameW
0x45910c GetSystemDirectoryA
0x459110 GlobalAlloc
0x459114 GlobalLock
0x459118 GetTickCount
0x45911c GlobalUnlock
0x459120 WriteProcessMemory
0x459124 ResumeThread
0x459128 GetThreadContext
0x45912c ReadProcessMemory
0x459130 CreateProcessW
0x459134 SetThreadContext
0x459138 LocalAlloc
0x45913c GlobalFree
0x459140 MulDiv
0x459144 SizeofResource
0x459148 QueryDosDeviceW
0x45914c FindFirstVolumeW
0x459158 lstrlenW
0x45915c GetStdHandle
0x459160 SetFilePointer
0x459164 FindResourceA
0x459168 LockResource
0x45916c LoadLibraryW
0x459170 LoadResource
0x459174 LocalFree
0x459178 FindVolumeClose
0x459180 lstrcpyW
0x459184 SetConsoleOutputCP
0x459188 FormatMessageA
0x45918c TerminateThread
0x459190 AllocConsole
0x459194 lstrcmpW
0x459198 GetModuleFileNameA
0x45919c lstrcpynA
0x4591b8 HeapSize
0x4591bc WriteConsoleW
0x4591c0 SetStdHandle
0x4591d4 GetCommandLineW
0x4591d8 GetCommandLineA
0x4591dc GetOEMCP
0x4591e0 IsValidCodePage
0x4591e4 FindFirstFileExA
0x4591e8 HeapReAlloc
0x4591ec ReadConsoleW
0x4591f0 GetConsoleMode
0x4591f4 GetConsoleCP
0x4591f8 FlushFileBuffers
0x4591fc GetFileType
0x459204 EnumSystemLocalesW
0x459208 GetUserDefaultLCID
0x45920c IsValidLocale
0x459210 GetTimeFormatW
0x459214 GetDateFormatW
0x459218 GetACP
0x45921c GetModuleHandleExW
0x459220 MoveFileExW
0x459224 LoadLibraryExW
0x459228 RaiseException
0x45922c RtlUnwind
0x459230 GetCPInfo
0x459234 GetStringTypeW
0x459238 GetLocaleInfoW
0x45923c LCMapStringW
0x459240 CompareStringW
0x459244 MultiByteToWideChar
0x459248 DecodePointer
0x45924c EncodePointer
0x459250 TlsFree
0x459254 TlsSetValue
0x459258 GetModuleHandleA
0x45925c RemoveDirectoryW
0x459260 MoveFileW
0x459264 SetFilePointerEx
0x45926c DeleteFileW
0x459270 DeleteFileA
0x459274 SetFileAttributesW
0x459278 GetFileAttributesW
0x45927c CreateDirectoryW
0x459280 GetFileSize
0x459284 FindClose
0x459288 lstrlenA
0x45928c GetDriveTypeA
0x459290 FindNextFileW
0x459294 GetFileSizeEx
0x459298 FindFirstFileW
0x45929c GetModuleHandleW
0x4592a0 ExitProcess
0x4592a4 GetProcAddress
0x4592a8 Process32FirstW
0x4592ac Process32NextW
0x4592b0 OpenMutexA
0x4592b4 GetLastError
0x4592bc OpenProcess
0x4592c0 CreateMutexA
0x4592c4 GetCurrentProcess
0x4592c8 CreateProcessA
0x4592cc PeekNamedPipe
0x4592d0 CreatePipe
0x4592d4 TerminateProcess
0x4592d8 ReadFile
0x4592dc HeapFree
0x4592e0 HeapCreate
0x4592e4 CreateEventA
0x4592e8 GetLocalTime
0x4592ec CreateThread
0x4592f0 SetEvent
0x4592f4 CreateEventW
0x4592f8 WaitForSingleObject
0x4592fc Sleep
0x459300 CloseHandle
0x459304 ExitThread
0x459308 CreateFileW
0x45930c WriteFile
0x459310 FindNextVolumeW
0x459314 TlsGetValue
0x459318 TlsAlloc
0x45931c SwitchToThread
0x459320 WideCharToMultiByte
0x459324 InitializeSListHead
0x45932c GetCurrentThreadId
0x459334 GetStartupInfoW
0x459340 IsDebuggerPresent
0x459348 ResetEvent
0x459350 SetEndOfFile
Library USER32.dll:
0x45937c SetClipboardData
0x459380 EnumWindows
0x459384 ExitWindowsEx
0x459388 EmptyClipboard
0x45938c ShowWindow
0x459390 SetWindowTextW
0x459394 MessageBoxW
0x459398 IsWindowVisible
0x45939c CloseWindow
0x4593a0 SendInput
0x4593a8 mouse_event
0x4593ac MapVirtualKeyA
0x4593b0 DrawIcon
0x4593b4 GetSystemMetrics
0x4593b8 GetIconInfo
0x4593c0 GetCursorPos
0x4593c4 RegisterClassExA
0x4593c8 AppendMenuA
0x4593cc CreateWindowExA
0x4593d0 TrackPopupMenu
0x4593d4 TranslateMessage
0x4593d8 DispatchMessageA
0x4593dc GetMessageA
0x4593e0 GetWindowTextW
0x4593e4 wsprintfW
0x4593e8 GetClipboardData
0x4593ec UnhookWindowsHookEx
0x4593f0 GetForegroundWindow
0x4593f4 ToUnicodeEx
0x4593f8 GetKeyboardLayout
0x4593fc SetWindowsHookExA
0x459400 CloseClipboard
0x459404 OpenClipboard
0x459408 GetKeyboardState
0x459414 GetKeyState
0x459418 DefWindowProcA
0x45941c SetForegroundWindow
0x459424 CallNextHookEx
0x459428 CreatePopupMenu
Library GDI32.dll:
0x459090 SelectObject
0x459094 CreateCompatibleDC
0x459098 StretchBlt
0x45909c GetDIBits
0x4590a0 DeleteDC
0x4590a4 DeleteObject
0x4590a8 CreateDCA
0x4590ac GetObjectA
0x4590b0 BitBlt
Library ADVAPI32.dll:
0x459008 CryptGenRandom
0x45900c CryptReleaseContext
0x459010 GetUserNameW
0x459014 RegEnumKeyExA
0x459018 GetTokenInformation
0x45901c QueryServiceStatus
0x459020 CloseServiceHandle
0x459024 OpenSCManagerW
0x459028 OpenSCManagerA
0x45902c ControlService
0x459030 StartServiceW
0x459034 QueryServiceConfigW
0x45903c OpenServiceW
0x459040 EnumServicesStatusW
0x459048 RegQueryInfoKeyW
0x45904c RegQueryValueExA
0x459050 RegCreateKeyExW
0x459054 RegEnumKeyExW
0x459058 RegSetValueExW
0x45905c RegSetValueExA
0x459060 RegOpenKeyExA
0x459064 RegOpenKeyExW
0x459068 RegCreateKeyW
0x45906c RegDeleteValueW
0x459070 RegEnumValueW
0x459074 RegQueryValueExW
0x459078 RegCreateKeyA
0x45907c RegCloseKey
0x459080 RegDeleteKeyA
0x459084 OpenProcessToken
Library SHELL32.dll:
0x459358 ShellExecuteExA
0x45935c Shell_NotifyIconA
0x459360 ExtractIconA
0x459364 ShellExecuteW
Library ole32.dll:
0x4594e0 CoGetObject
0x4594e4 CoInitializeEx
0x4594e8 CoUninitialize
Library SHLWAPI.dll:
0x45936c StrToIntA
0x459370 PathFileExistsW
0x459374 PathFileExistsA
Library WINMM.dll:
0x459444 mciSendStringA
0x459448 PlaySoundW
0x45944c mciSendStringW
0x459450 waveInClose
0x459454 waveInStop
0x459458 waveInPrepareHeader
0x459460 waveInOpen
0x459464 waveInAddBuffer
0x459468 waveInStart
Library WS2_32.dll:
0x459470 gethostbyname
0x459474 WSASetLastError
0x459478 inet_addr
0x45947c gethostbyaddr
0x459480 getservbyport
0x459484 ntohs
0x459488 getservbyname
0x45948c htonl
0x459490 htons
0x459494 inet_ntoa
0x459498 closesocket
0x45949c WSAStartup
0x4594a0 send
0x4594a4 socket
0x4594a8 connect
0x4594ac recv
0x4594b0 WSAGetLastError
Library urlmon.dll:
0x4594f0 URLDownloadToFileW
Library gdiplus.dll:
0x4594bc GdipDisposeImage
0x4594c4 GdiplusStartup
0x4594cc GdipCloneImage
0x4594d0 GdipAlloc
0x4594d4 GdipFree
Library WININET.dll:
0x459430 InternetReadFile
0x459434 InternetOpenUrlW
0x459438 InternetOpenW
0x45943c InternetCloseHandle

!This program cannot be run in DOS mode.
`.rdata
@.data
@.reloc
_^][YY
_^][YY
;G0uBSV
VVWhlK@
^|9^xv
tD;Nxr
tZhhuF
D$ UPW
D$ UPW
QSUVWh
t4h8yF
XVWjD^V3
WWWhpyF
D$D_^][
D$$_^]
T$PSPS
PPh0aG
4Shp~F
L$@UVh
9{Lt:V
@_^][YY
Y<9X8t
D$ f;F
D$(;D$
uVj@h
P4+S4t
L$8h<sF
D$lPh<
D$TPh<
D$4_^][
L$0_^][
u#VVVV
SVWj j
uH9t$4t*
L$(PWj
L$(PWj
 !"#$%&'()*+,-N.NNN/NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN01N2N34N5678NNN9:;N<=NNNNNNN>?@ANNNBNNNNNNNNNNNNNNNNNNCDNEFGHIJKNNNLMV
D$LPUUj
D$LPUh
9L$,t"Uj
L$ +D$
t$0VWj
+|$,+t$0
t$`VWU
QQPVWQQU
D$TFVP
VjxVVh
L$$PWj
D$ PVUj
t$(9t$
t$(;t$
SVWj 3
SVWj@3
SVWj@3
YSSSSSSSj
|SUVWQ
L$(SSS
,SUVWh
tAQh vF
?u}f9D$
uvf9Dl
D$LQPQ
t SSSj
SSSSSS
u0hX[G
ti<*u?O
t%<.tHF
_^][YY
j(XjtY
LSUVW3
\$<+\$@
l$L9t$
D$HHBj
_^][YY
_^][YY
QSUVW3
D$Lj P
_^][YY
^f9t$
Y_^][Y
\$$UVW3
_9D$Lt
t$PQQV
YY9D$(t
D$ +D$
_^][YY
T$0ZR^
$SUVW3
D$ +L$$
T$ +D$$
t-_^][Y
QVWjGZ
D$$WPV
1D$ 1L$$
0SUVWj
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
D$ WSP
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
T$41D$
D$(1D$
D$,1D$
D$01D$ Y
D$ SUP
T$41D$
D$(1D$
L$(1L$
L$,1L$
T$01D$
_^][YY
;\$$wD
_^][YY
T$$j4Y
@9D$(u
D$$URP
^[_]YY
_^][YY
T$(PPPP
T$(PPPP
A;L$,|
t$dQPU
D$(98r1
SUVWj(
SUVWj(
D$`j@SP
T$@+T$
T$hUWQ
T$hUWQ
D$@9D$
D$0WQU
T$$9]
D$hQUP
D$$9|$
QQSUVW
_^][YY
spuqj@Y;
u.j _j@Y;
u79|$$
][_^YY
9D$H~$
C9\$pu
9l$p~$
9l$P~A
9l$`~A
Y_^][Y
D$ ;D$4|
;l$8}P
u:E;l$
T$ UVW
9D$ ~b
C;\$ |
C;\$ |
^_][YY
SUVWj7_
$SUVWj7]Uj
t$LVU3
W?PPUSPQ
SUVWjx
u PPj7UPQ
$SUVWQP
PWWj Sj
L$ #D$ #
#T$ #D$
T$$#T$
L$,#L$$
tPj@^+
s u&j@
K`j8^;
v5j@X+
u"hL-G
9E$WWV
t,WW9}
QQSVWd
tH9] uC
u PWQR
URPQQh
;t$,v-
UQPXY]Y[
u0jAXf;
u0jAXf;
<xt"<Xt
v!j"X_^[
SVWjA_jZ+
uBjAYjZ+
Tt1jhZ;
Tt1jhZ;
^$+^8+
^$+^8+
t0jXXf
~$+~8+
t0jXXf
~$+~8+
F2jgYf;
PVSQSWV
SVjA[jZ^+
jAZjZ^
t/j=[f;
QSSSSj
tyPVj@W
_tcPVj@
u#j,Xf;
f98t V
PPPPPPPP
QQQWPQ
SSPQSS
u kE$<
>:uBFV
mSjA[jZ^+
8jZZf;
Wj0XPV
PPPPPWS
PP9E u:PPVWP
x7;5H:G
x7;5H:G
D8(HXt:f
D8(Ht5F
<at<rt
>=umF8
WWWPWS
u-PWWS
PQhx%G
SSVWh
f9:t!V
|VWj=S
}VWj=S
tl9tX
QQSWj0j@
xi;5H:G
xg;5H:G
<0|o<9
u^9^\t/
VX9^`tT
;N\u\W
u2Vj@h
9C`u99C\t4
9C`u5Wj
PPPPPPPP
InitializeConditionVariable
SleepConditionVariableCS
WakeAllConditionVariable
bad allocation
bad array new length
unknown error
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
cross device link
destination address required
device or resource busy
directory not empty
executable format error
file exists
file too large
filename too long
function not supported
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
interrupted
invalid argument
invalid seek
io error
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no lock available
no message available
no message
no protocol option
no space on device
no stream resources
no such device or address
no such device
no such file or directory
no such process
not a directory
not a socket
not a stream
not connected
not enough memory
not supported
operation canceled
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
permission denied
protocol error
protocol not supported
read only file system
resource deadlock would occur
resource unavailable try again
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many files open
too many links
too many symbolic link levels
value too large
wrong protocol type
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreW
CreateSemaphoreExW
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
FlushProcessWriteBuffers
FreeLibraryWhenCallbackReturns
GetCurrentProcessorNumber
CreateSymbolicLinkW
GetCurrentPackageId
GetTickCount64
GetFileInformationByHandleEx
SetFileInformationByHandle
GetSystemTimePreciseAsFileTime
WakeConditionVariable
InitializeSRWLock
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
SleepConditionVariableSRW
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CompareStringEx
GetLocaleInfoEx
LCMapStringEx
0123456789abcdefghijklmnopqrstuvwxyz
0123456789abcdefghijklmnopqrstuvwxyz
bad exception
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__swift_1
__swift_2
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
operator co_await
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
`h````
xpxxxx
`h`hhh
xwpwpp
(null)
[aOni*{
~ $s%r
@b;zO]
v2!L.2
CorExitProcess
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
AreFileApisANSI
CompareStringEx
EnumSystemLocalesEx
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
GetCurrentPackageId
GetDateFormatEx
GetLocaleInfoEx
GetSystemTimePreciseAsFileTime
GetTimeFormatEx
GetUserDefaultLocaleName
InitializeCriticalSectionEx
IsValidLocaleName
LCMapStringEx
LCIDToLocaleName
LocaleNameToLCID
NAN(SNAN)
nan(snan)
NAN(IND)
nan(ind)
UTF-16LEUNICODE
_hypot
_nextafter
1#QNAN
1#SNAN
?Dj0Q:W$=
5s3R6=
]vQ<)8
|)P!?Ua0
Eb2]A=
u?^p?o4
y1~?|"
?x+s7
?5Od%
?|I7Z#
>,'1D=
?g)([|X>=
~U`?K
:h"?bC
@H#?43
Ax#?uN}*
r7Yr7=
F0$?3=1
H`$?h|
&?~YK|
sU0&?W
<8bunz8
?#%X.y
F||<##
<@En[vP
b<log10
?5Wg4p
%S#[k=
"B <1=
?%Y-%m-%d %H.%M
invalid vector<T> subscript
vector<T> too long
string too long
invalid string position
sc.exe
OpenCamera
CloseCamera
GetFrame
FreeFrame
Failed to initialize TLS
Failed to initialize TLS context
Failed to load TLS certificate
Failed to load TLS key
Failed to load peer certificate
TLS Handshake... |
TLS Error 1
TLS Error 2
TLS Authentication Failed
TLS Error 3
Connection Refused
Connection Failed:
KeepAlive | Enabled | Timeout:
KeepAlive | Disabled
Connection Timeout
DisplayMessage
GetMessage
CloseChat
cmd.exe
SystemDrive
RecoverCookiesEx
FreeData
SysCoR
recover.exe
SysHlp
CurrentBuildNumber
SOFTWARE\Microsoft\Windows NT\CurrentVersion
RtlInitUnicodeString
NtAllocateVirtualMemory
NtFreeVirtualMemory
RtlAcquirePebLock
RtlReleasePebLock
LdrEnumerateLoadedModules
[+] supxLdrEnumModulesCallback
[+] NtAllocateVirtualMemory Success
[-] NtAllocateVirtualMemory Error
PEB: %x
[+] ucmAllocateElevatedObject
[+] CoGetObject
[+] CoGetObject SUCCESS
[-] CoGetObject FAILURE
[+] ucmCMLuaUtilShellExecMethod
[+] before ShellExec
[+] ShellExec success
/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
C:\Windows\System32\cmd.exe
ZipFiles
UnzipFiles
Browsing directory:
Executing file:
Downloading file:
Downloaded file:
Failed to download file:
Deleted file:
Unable to delete:
Unable to rename file!
Uploaded file:
Failed to upload file:
Uploading file to Controller:
SetFilePointerEx error
ReadFile error
okmode
Offline Keylogger Started
Keylogger initialization failure: error
minutes }
{ User has been idle for
Online Keylogger Started
Online Keylogger Stopped
Offline Keylogger Stopped
[Space]
[BckSp]
[Enter]
[Pause]
[PagUp]
[PagDw]
[Start]
[Left]
[Right]
[Down]
[Print]
[Menu]
[End of clipboard]
[Ctrl+V]
[Text pasted from clipboard]
[Ctrl+
[AltL]
[AltR]
[CtrlL]
[CtrlR]
[End of clipboard]
[Text copied to clipboard]
\AppData\Local\Google\Chrome\User Data\Default\Login Data
UserProfile
[Chrome StoredLogins not found]
[Chrome StoredLogins found, cleared!]
\AppData\Local\Google\Chrome\User Data\Default\Cookies
[Chrome Cookies not found]
[Chrome Cookies found, cleared!]
\AppData\Roaming\Mozilla\Firefox\Profiles\
[Firefox StoredLogins not found]
\logins.json
\key3.db
[Firefox StoredLogins Cleared!]
[Firefox Cookies not found]
\cookies.sqlite
[Firefox cookies found, cleared!]
Cookies
\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
[IE cookies not found]
[IE cookies cleared!]
[Cleared browsers logins and cookies.]
Cleared browsers logins and cookies.
FunFunc
exepath
Unknown exception
bad cast
bad locale name
generic
iostream
iostream stream error
ios_base::badbit set
ios_base::failbit set
ios_base::eofbit set
license_code.txt
Software\
licence
Remcos Agent initialized
Access Level:
Administrator
System
override
6.1.0 Pro
SysPwR
StartForward
StartReverse
StopForward
StopReverse
GetDirectListeningPort
finished
s ap traffic
s hs traffic
TLS 1.3, client CertificateVerify
traffic upd
derived
tls13
c ap traffic
c hs traffic
TLS 1.3, server CertificateVerify
='9-6d
_jbF~T
11#?*0
,4$8_@
t\lHBW
QPeA~S
>4$8,@
p\lHtW
+HpXhE
T[$:.6
=j&&LZ66lA??~
}{))R>
f""D~**T
V22dN::t
o%%Jr..\$
&&Lj66lZ??~A
99rKJJ
==zGdd
""Df**T~
;22dV::tN
$$Hl\\
C77nYmm
%%Jo..\r
>!KK
55j_WW
&Lj&6lZ6?~A?
~=zG=d
"Df"*T~*
2dV2:tN:
x%Jo%.\r.
t>!K
a5j_5W
ggV}++
Lj&&lZ66~A??
bS11*?
Xt,,4.
RRvM;;
MMfU33
PPxD<<%
Bc!! 0
~~zG==
Df""T~**;
dV22tN::
xxJo%%\r..8$
tt>!
pp|B>>q
aaj_55
UUPx((
SHA256wECDSA
Unknown
?456789:;<=
 !"#$%&'()*+,-./0123
lzNg},8S*:#
)U[/t|
SECP112R1
DB7C2ABF62E35E668076BEAD208B
DB7C2ABF62E35E668076BEAD2088
659EF8BA043916EEDE8911702B22
DB7C2ABF62E35E7628DFAC6561C5
9487239995A5EE76B55F9C2F098
A89CE5AF8724C0A23E0E0FF77500
SECP128R1
FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC
E87579C11079F43DD824993C2CEE5ED3
FFFFFFFE0000000075A30D1B9038A115
161FF7528B899B2D0C28607CA52C5B86
CF5AC8395BAFEB13C02DA292DDED7A83
SECP160R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC
1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45
100000000000000000001F4C8F927AED3CA752257
4A96B5688EF573284664698968C38BB913CBFC82
23A628553168947D59DCC912042351377AC5FB32
SECP192R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC
64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1
FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831
188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012
7192B95FFC8DA78631011ED6B24CDD573F977A11E794811
SECP224R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE
B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4
FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D
B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21
BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34
PRIME239V1
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC
6B016C3BDCF18941D0D654921475CA71A9DB2FB27D1D37796185C2942C0A
7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF9E5E9A9F5D9071FBD1522688909D0B
0FFA963CDCA8816CCC33B8642BEDF905C3D358573D3F27FBBD3B3CB9AAAF
7DEBE8E4E90A5DAE6E4054CA530BA04654B36818CE226B39FCCB7B02F1AE
SECP256R1
FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC
5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B
FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551
6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296
4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5
SECP384R1
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFC
B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0DB248B0A77AECEC196ACCC52973
AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7
3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F
SECP521R1
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC
51953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00
1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409
C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66
11839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E662C97EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD16650
Remcos restarted by watchdog!
Watchdog module activated
Watchdog launch failed!
FoxMailRecovery
[regsplt]
SHDeleteKeyW
Shlwapi.dll
getaddrinfo
getnameinfo
freeaddrinfo
\ws2_32
\wship6
TLS On
TLS Off
Connecting |
Connection Error:
Connection Error: Unable to create socket
Connected |
hlight
Disconnected
SetSuspendState
PowrProf.dll
SeShutdownPrivilege
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ZwClose
GetCursorInfo
User32.dll
PromptOnSecureDesktop
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DISPLAY
alarm.wav
Alarm triggered
play audio
pause audio
resume audio
status audio mode
stopped
stop audio
close audio
GetLastInputInfo
\Software
S-1-5-18
WTSGetActiveConsoleSessionId
kernel32
WTSQuerySessionInformationW
WTSFreeMemory
ProductName
(64 bit)
(32 bit)
SETTINGS
%02i:%02i:%02i:%03i
abcdefghijklmnopqrstuvwxyz
Software\Microsoft\Windows\CurrentVersion\Uninstall
\Control Panel\Desktop
WallpaperStyle
TileWallpaper
GetProcessImageFileNameW
Kernel32
SetProcessDpiAwareness
shcore
user32
NtUnmapViewOfSection
GlobalMemoryStatusEx
IsWow64Process
GetComputerNameExW
IsUserAnAdmin
Shell32
SetProcessDEPPolicy
EnumDisplayDevicesW
EnumDisplayMonitors
GetMonitorInfoW
GetSystemTimes
Shlwapi
GetConsoleWindow
NtSuspendProcess
NtResumeProcess
GetExtendedTcpTable
Iphlpapi
GetExtendedUdpTable
ConvertSidToStringSidA
Advapi32.dll
CONOUT$
______
(_____ \
_____) )_____ ____ ____ ___ ___
| __ /| ___ | \ / ___) _ \ /___)
| | \ \| ____| | | ( (__| |_| |___ |
|_| |_|_____)_|_|_|\____)___/(___/
Remcos v
BreakingSecurity.net
Remcos
MsgWindowClass
TLS13-AES128-GCM-SHA256
/serialNumber=
/emailAddress=
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
-----BEGIN DH PARAMETERS-----
-----END DH PARAMETERS-----
-----BEGIN X509 CRL-----
-----END X509 CRL-----
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
-----BEGIN EC PRIVATE KEY-----
-----END EC PRIVATE KEY-----
-----BEGIN DSA PRIVATE KEY-----
-----END DSA PRIVATE KEY-----
-----BEGIN PUBLIC KEY-----
-----END PUBLIC KEY-----
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ abcdefghijklmnopqrstuvwxyz+/
?UUUUUU
?UUUUUU
?333333
.text$di
.text$mn
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCC
.CRT$XCL
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$T
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.tls$ZZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.rsrc$01
.rsrc$02
CreateDirectoryW
WriteFile
CreateFileW
ExitThread
CloseHandle
WaitForSingleObject
CreateEventW
SetEvent
CreateThread
GetLocalTime
CreateEventA
HeapCreate
HeapFree
ReadFile
TerminateProcess
CreatePipe
PeekNamedPipe
CreateProcessA
GetCurrentProcess
CreateMutexA
OpenProcess
CreateToolhelp32Snapshot
GetLastError
OpenMutexA
Process32NextW
Process32FirstW
GetProcAddress
ExitProcess
GetModuleHandleW
FindFirstFileW
GetFileSizeEx
FindNextFileW
GetDriveTypeA
lstrlenA
FindClose
GetFileAttributesW
SetFileAttributesW
DeleteFileA
DeleteFileW
GetLogicalDriveStringsA
SetFilePointerEx
MoveFileW
RemoveDirectoryW
GetModuleHandleA
TerminateThread
GetFileSize
FindFirstFileA
FindNextFileA
ExpandEnvironmentStringsA
GetModuleFileNameW
GetLongPathNameW
CopyFileW
GetLocaleInfoA
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
LoadLibraryA
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetTempPathW
lstrcatW
GetCurrentProcessId
GetTempFileNameW
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetTickCount
GlobalUnlock
WriteProcessMemory
ResumeThread
GetThreadContext
ReadProcessMemory
CreateProcessW
SetThreadContext
LocalAlloc
GlobalFree
MulDiv
SizeofResource
QueryDosDeviceW
FindFirstVolumeW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
lstrlenW
GetStdHandle
SetFilePointer
FindResourceA
LockResource
LoadLibraryW
LoadResource
LocalFree
FindVolumeClose
GetVolumePathNamesForVolumeNameW
lstrcpyW
SetConsoleOutputCP
FormatMessageA
FindNextVolumeW
AllocConsole
lstrcmpW
GetModuleFileNameA
lstrcpynA
QueryPerformanceFrequency
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
KERNEL32.dll
TranslateMessage
DispatchMessageA
GetMessageA
GetWindowTextW
wsprintfW
GetClipboardData
UnhookWindowsHookEx
GetForegroundWindow
ToUnicodeEx
GetKeyboardLayout
SetWindowsHookExA
CloseClipboard
OpenClipboard
GetKeyboardState
CallNextHookEx
GetKeyboardLayoutNameA
GetKeyState
GetWindowTextLengthW
GetWindowThreadProcessId
SetForegroundWindow
SetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
ShowWindow
SetWindowTextW
MessageBoxW
IsWindowVisible
CloseWindow
SendInput
EnumDisplaySettingsW
mouse_event
MapVirtualKeyA
DrawIcon
GetSystemMetrics
GetIconInfo
SystemParametersInfoW
GetCursorPos
RegisterClassExA
AppendMenuA
CreateWindowExA
DefWindowProcA
TrackPopupMenu
CreatePopupMenu
USER32.dll
GetObjectA
CreateDCA
DeleteObject
DeleteDC
GetDIBits
StretchBlt
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
BitBlt
GDI32.dll
OpenProcessToken
RegDeleteKeyA
RegCloseKey
RegCreateKeyA
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegCreateKeyW
RegOpenKeyExW
RegOpenKeyExA
RegSetValueExA
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegQueryValueExA
RegQueryInfoKeyW
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusW
OpenServiceW
ChangeServiceConfigW
QueryServiceConfigW
StartServiceW
ControlService
OpenSCManagerA
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
GetTokenInformation
RegEnumKeyExA
GetUserNameW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
ADVAPI32.dll
ShellExecuteW
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
SHELL32.dll
CoUninitialize
CoInitializeEx
CoGetObject
ole32.dll
StrToIntA
PathFileExistsW
PathFileExistsA
SHLWAPI.dll
waveInAddBuffer
waveInStart
waveInOpen
waveInUnprepareHeader
waveInPrepareHeader
waveInStop
waveInClose
mciSendStringW
mciSendStringA
PlaySoundW
WINMM.dll
WS2_32.dll
URLDownloadToFileW
URLOpenBlockingStreamW
urlmon.dll
GdipLoadImageFromStream
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipGetImageEncoders
GdiplusStartup
gdiplus.dll
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
WININET.dll
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlUnwind
RaiseException
LoadLibraryExW
MoveFileExW
GetModuleHandleExW
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
HeapReAlloc
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
WriteConsoleW
HeapSize
SetEndOfFile
Copyright (c) by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
.?AVtype_info@@
.?AVbad_alloc@std@@
.?AVbad_array_new_length@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVerror_category@std@@
.?AV_Generic_error_category@std@@
.?AV_Facet_base@std@@
.?AV_Locimp@locale@std@@
.?AVfacet@locale@std@@
.?AU_Crt_new_delete@std@@
.?AVcodecvt_base@std@@
.?AUctype_base@std@@
.?AV?$ctype@D@std@@
.?AV?$codecvt@DDU_Mbstatet@@@std@@
.?AVbad_exception@std@@
.?AVfailure@ios_base@std@@
.?AVruntime_error@std@@
.?AVsystem_error@std@@
.?AVbad_cast@std@@
.?AV_System_error@std@@
.?AVexception@std@@
33333333tQQ
33333333
JCiE4-T
-V,'vpRUi
;?S#-_t
PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD
0!0-070K0X0f0p0|0
1&121<1J1T1`1j1v1
2 2*262@2L2V2b2l2x2
3!3+393C3O3Y3e3o3{3
4%414;4G4Q4]4b4h4o4t4z4
55)555?5K5W5c5o5y5D6[6f6~6
7 7'7<7Y7s7y7~7
8&8,818<8W8j8
9%9.949:9E9t9z9
:%:/:8:=:C:J:O:d:i:n:u:z:
<!<+<J<
0z6,9{<
:.;N;%>p>u>
>\?h?m?y?~?
0%0/040
0+1:1_1m1
2'282m2
343C3x3
4&474X4g4
7<8V8_8m8
:/:5:B:f:
;%;>;J;U;^;
;6>A>]>
>1?;?r?
00'0-0D0R0|0
1*101:1E1Y1d1q1~1
2(282A2H2R2X2
2N3j3v3
4 4'424:4B4f4
&0+0I0^0
4:4M4W4m4
8#8-8<8A8G8P8X8a8l8u8
9#9)949G9R9f9r9
:#:(:3:A:Y:b:h:o:
;!;2;C;J;Q;s;
<$<I<W<]<b<g<
=Y=^=d=m=0?O?x?
101[1k1
2"272\2
3*393{3
5q5E6T6
<=.=C=Z=s=
>.>L>g>
!0/0u0z0
5e7o7t7y7~7
8!8+878=8B8G8
889=9R9b9t9
<A<Q<^<n<z<
</===C=K=W=m=~=
?!?8?X?a?
1(1E1L1b1
2T2_2|2V3d3
6U7b7m7v7
7$8C8I8
=%=4=L=V=e=t=
>)>8>V>e>t>
??#?'?+?/?3?{?
1]1i1q1}1
60656f6p6
767P7Z7
7B8L8[8e8s8
949N9X9
: :4:S:a:
=&=e=m=
8(9=9K9d9
;D;J;Q;`;h;
<`<o<}<
?\?c?j?
0-0;0J0W0z0
1.1=1Y1p1
2/2f2k2
2B3I3U3
4`4e4}4
4&565=5I5
>$>^>j>
5?6]6g6t6
7&707>7T7^7
8:8?8l8
:%:5:}:
;';2;<;J;d;p;
<;<@<T<o<
>)>@>a>w>
?)?2?J?V?b?q?
0U1_1d1s1
2*3H3b3g3|3
4E5]5~5
;(;.;3;N;$=p=u=
1(2.2:2D2P2v2}2
33$30353A3F3R3W3d3j3r3{3
9.9P9c9n9}9
>!>.>E>e>m>v>
0I0X0k0q0
1(1/151T1f1s1
3&3D3`3u3
3&4d4j4r4
4$5>5D5K5S5^5
:h;r;U<
050:0X0m0
121=1l1
2;2Z2c2q2
3&4A4i4t4
5?5Z5e5
:?:D:L:T:[:a:m:
:V;[;n;s;
???D?J?Q?Z?
<*=2=:=B=J=R=Z=s=
>><>_>q>z>
0D0h0y0
061F1W1q1{1
333M3`3n3
7Z:f:p:{:
2X3g3v3
384?4E4T4d4i4p4
5D5Q5l5
50666=6C6I6T6
9!929P9q9
:$:-:3:::\:`;
=&=?=~=
182<2@2D2H2L2P2T2X2\2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3d3h3l3p3
5*6/6^6t6y6
>4>`>k>
? ?H?Q?`?
424R4d4n4x4
8"9;9A9G9T9y9
080@0K0}0
:.;>;J;
<=s=x=
>?$?F?g?
363B3G3
<N<c<p<{<
=,=9=H=S=g=v=
>+>8>G>P>}>
?/?8?=?Q?Y?e?q?
0 0)0.0C0R0_0h0q0
0#1o1{1
23393A3K3X3o3t3
4&4,484H4R4
4&5,565
576>6Z6|6
8'8G8h8n8s8
:":4:@:
:-;E;P;
=X=c=x=/>
,0?0h0n0
3<3K3e3l3
5$5+5C5T5_5
7 7(7M7`7k7
8$8A8s8
9 9(9;9
9$:2:w:
<B<H<s<
>:???y?
11)13181=1G1L1W1]1g1m1w1|1
2"2-22272B2H2R2W2\2i2{2
3!3/3q4}7
<'<1<><S<d<
=$=-=A=G=O=U=a=g=q=w=}=
c>k>q>w>
2$2S2`2i2
3 3&3,373_3s3
0{7;<_<
0,2024282<2@2D2H2L2P2V2-3D3d4w4>5I5U5_5
656@6L6Z6y6
70777E7O7g7v7
8M8d8w8
9.9A9\9s9
;>;O;`;l;y;
<G<X<i<u<
=<=M=^=j=w=0>B>J>Q>Y>c>o>v>
??&?8?J?R?Y?a?h?t?{?
>8>?>w>~>
?&?-?F?\?u?
0%0/0A0V0f0j0n0r0v0z0~0
9%949=:}:
>%>J>h>t>
;*;9;K;l;
;#;A;x;
66$6*656;6J6Q6V6_6d6m6
7$7,787I7P7x7
8#8)808
9D9S9f9r9
<+<0<5<V<[<h<
<G>g>q>
?P?X?w?
0&090G0b0m0
1N1b1i1
1T2c2l2y2
2,353;3C3H3[3o3t3
4"4)41494A4M4V4[4a4k4u4
5 5'5.565>5F5Q5V5\5f5p5
646T6l6t6
6+7>7e7s7
909=9F9K9^9y9
:$;J;P;
?>?L?T?Z?a?h?n?s?y?
0 0&0+01070=0B0H0N0T0Y0_0e0k0p0v0|0
1#1(1.141:1?1E1K1Q1V1\1b1h1m1s1y1
2 2%2+21272<2B2H2N2S2Y2_2e2j2p2v2|2
4*4;4A4G4N4[4
:4=G=e=s=!?X?_?d?h?l?p?
3"3&3*3.32363:3>3B3F3J3N3R3V3Z3^3b3f3j3n3r3v3z3
080F0L0g0
131D1P1
?(?6?=?C?h?
"0*0`0
1'111=1B1G1e1o1{1
252A2^3e3
4,555=5
;E=a>{>
?2?H?U?c?q?|?
>0>R>d>
7!7%7)7-7175797=7A7E7I7
=$=H=i=e>
081=1D1h1
3 4Q4C5 6\6
0=1W1d1
334Q4o4
838I8`8g8s8
9,:>:D:X:
:-;6;o;z;n=x=
>&>T>Y>
2)2z2!3B3
6 6,6B6U6
7#71787@7Y7k7w7
9.:5;m;
;Y<d<n<t<
61W3]3o3z3
=0>I>v>}>
3K6U6_6
7S;{<w>}>
0x11282e2l2
2(393S3\3i3s3
4#474Q4{4
5"5*5f5v5
5 626=6B6G6_6
7.7a7l7q7v7
8"8=8G8c8n8s8x8
8"9>9I9N9S9w9
:=:R:n:y:~:
;7;B;G;L;g;~;
=&=:=?=D=f=t=
?!?*?2?>?F?X?c?k?s?{?
1*131X1]1c1n1x1
4*414;4E4V4]4
5!5.575L5
;';.;D;Z;g;l;z;
;(<X<s<
9;9:;j;
434H4Y4
455Q5p5
>4?>?Y?{?
585E5P5
;5;I;k;u;
293E3Y3e3q3
4'434B4>5o5
:-:5:E:V:
;%;0;k;
=I=U=m=u=
1A2p2=3Q3i3q3
585@5M5
6C7b7+:
=-=?=[=y=
>>)>6>@>P>
1:1[1`1k1
5/5Q5d5
6"6b6m6z6
7$868J8W8
=b>i>p>w>
G0P0h0z0
3G3V3d3
3 4'4i4p4y4
45,5[5g5
7)7;7M7_7q7
:N;`;r;
5$6]6s6
<[=n=^>
6G6\6s6
3*3@3H3
&1j4q4x4
4$535R5e5
2/3m3x3
3$404<4O4n4
8-9G9T9
?*?2?O?_?k?z?
8T9):8:G:l:
=?=V=^=
>5>P>k>
??)?3?=?G?Q?[?f?r?|?
0&000:0D0N0X0b0l0v0
1 1*141>1H1R1
5 5$5(5,5054585<5@5D5H5L5P5T5X5\5`5d5h5l5p5t5x5|5
6 6$6(6,60646H6L6P6
7 7$7(7,707D7H7L7h7l7p7t7x7|7
8 8$8(8,8084888<8@8D8H8L8P8T8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
7 7$7(7,7074787<7@7D7H7L7P7T7X7\7`7d7h7l7p7t7x7$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
;$;,;4;<;D;L;T;\;d;l;t;|;
<$<,<4<<<D<L<T<\<d<l<t<|<
=$=,=4=<=D=L=T=\=d=l=t=|=
>$>,>4><>D>L>T>\>d>l>t>|>
?$?,?4?<?@?H?P?X?`?h?p?x?
0 0(00080@0H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
6 6(60686@6H6P6X6
9 9$9(9
: :$:(:,:0:4:8:<:@:D:H:L:P:T:X:\:`:d:h:l:p:t:x:|:
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;X;\;`;d;h;l;p;t;x;|;
= =(=,=0=4=8=<=@=D=L=P=T=X=\=`=d=h=t=|=
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<d<h<l<p<t<x<|<
= =$=(=,=0=4=8=<=@=D=H=L=P=T=X=\=`=d=h=p=t=x=|=
2 2,282D2P2\2h2t2
3(343@3L3X3d3p3|3
4$404<4H4T4`4l4x4
5$505<5H5T5`5l5x5
7$7,747<7D7L7T7\7d7l7t7|7
8$8,848<8D8L8T8\8d8l8t8|8
9$9,949<9D9L9T9\9d9l9t9|9
:$:,:4:<:D:L:T:\:d:l:t:|:
;$;,;4;<;D;L;T;\;d;l;t;|;
<$<,<4<<<D<L<T<\<d<l<t<|<
=$=,=4=<=D=L=T=\=d=l=t=|=
>$>,>4><>D>L>T>\>d>l>t>|>
9 9(90989@9H9P9X9`9h9p9x9
: :(:0:8:@:H:P:X:`:h:p:x:
; ;(;0;8;@;H;P;X;`;h;p;x;
< <(<0<8<@<H<P<X<`<h<p<x<
= =(=0=8=@=H=P=X=`=h=p=x=
> >(>0>8>@>H>P>X>`>h>p>x>
? ?(?0?8?@?H?P?X?`?h?p?x?
8 8$8(8,8084888<8@8D8H8L8X8\8`8
:(:8:p:
:,;0;4;
6H7L7P7T7l7p7
8 888H8L8\8`8d8h8p8
9$94989H9L9P9T9\9t9
: :$:,:D:T:X:h:l:p:t:x:
;,;<;@;P;T;X;\;`;h;
< <0<4<D<H<L<T<l<|<
=$=(=8=<=@=D=H=L=T=l=|=
@2H2|2
2,343<3H3P3
444D4P4X4
5<5L5X5`5
6D6T6`6h6
7D7H7d7h7p7x7
8 848<8D8L8P8T8\8p8x8
90989<9L9p9|9
:(:H:h:
;0;P;l;p;
<0<P<p<
=8=X=x=
>8>X>x>
?8?X?x?
080T0X0x0
1 1(1,1014181@1H1P1d1l1
`1d1h1
2(282H2X2p2|2
:(:D:l:
<,<L<X<|<
api-ms-win-core-synch-l1-2-0.dll
kernel32.dll
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
Eapi-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
api-ms-
ext-ms-
(null)
mscoree.dll
ELC_ALL
LC_COLLATE
LC_CTYPE
LC_MONETARY
LC_NUMERIC
LC_TIME
((((( H
(
((((( H
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
Eapi-ms-win-appmodel-runtime-l1-1-1
api-ms-win-core-datetime-l1-1-1
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-file-l2-1-1
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-synch-l1-2-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-kernel32-package-current-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
kernel32
user32
Eja-JP
american
american english
american-english
australian
belgian
canadian
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
dutch-belgian
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
french-belgian
french-canadian
french-luxembourg
french-swiss
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
irish-english
italian-swiss
norwegian
norwegian-bokmal
norwegian-nynorsk
portuguese-brazilian
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
swedish-finland
america
britain
england
great britain
holland
hong-kong
new-zealand
pr china
pr-china
puerto-rico
slovak
south africa
south korea
south-africa
south-korea
trinidad & tobago
united-kingdom
united-states
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
/sort "Visit Time" /stext "
e -sid -accepteula
ntdll.dll
explorer.exe
[+] FullDllName: %ws
[+] BaseDllName: %ws
windir
\explorer.exe
Elevation:Administrator!new:
{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
[%04i/%02i/%02i %02i:%02i:%02i
\Software\Microsoft\Windows\CurrentVersion\Run\
Software\Microsoft\Windows\CurrentVersion\Run\
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
Set fso = CreateObject("Scripting.FileSystemObject")
On Error Resume Next
while fso.FileExists("
fso.DeleteFile "
fso.DeleteFolder "
fso.DeleteFile(Wscript.ScriptFullName)
\update.vbs
""", 0
CreateObject("WScript.Shell").Run "cmd /c ""
CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
SystemDrive
WinDir
\system32
\SysWOW64
ProgramFiles
AppData
UserProfile
ProgramData
pth_unenc
H\system32\
\SysWOW64\
rmclient.exe
sc.exe
fsutil.exe
!temp_
/stext "
http://geoplugin.net/json.gp
cmd.exe
\sysinfo.txt
dxdiag
image/jpeg
image/png
wnd_%04i%02i%02i_%02i%02i%02i
time_%04i%02i%02i_%02i%02i%02i
d alias audio
" type
open "
Wtsapi32.dll
system
http\shell\open\command
program files\
program files (x86)\
lDisplayName
Publisher
DisplayVersion
InstallLocation
InstallDate
UninstallString
SETTINGS
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Remcos.m!c
Elastic Windows.Trojan.Remcos
ClamAV Win.Trojan.Remcos-9841897-0
CMC Clean
CAT-QuickHeal Trojan.Ghanarava.1741713795ae62c4
Skyhigh BehavesLike.Win32.Remcos.gh
ALYac Generic.Dacic.A9349469.A.FE6251BC
Cylance Unsafe
Zillya Trojan.Rescoms.Win32.2189
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Backdoor:Win32/Remcos.0c401fd8
K7GW Trojan ( 0053ac2c1 )
K7AntiVirus Trojan ( 0053ac2c1 )
huorong Backdoor/Remcos.k
Baidu Clean
VirIT Trojan.Win32.Remcos.DFP
Paloalto Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Rescoms.B
APEX Malicious
Avast Win32:RATX-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky HEUR:Backdoor.Win32.Remcos.gen
BitDefender Generic.Dacic.A9349469.A.FE6251BC
NANO-Antivirus Trojan.Win32.Remcos.kvsovm
ViRobot Clean
MicroWorld-eScan Generic.Dacic.A9349469.A.FE6251BC
Tencent Trojan.Win32.Remcos.16001234
Sophos Mal/Remcos-B
F-Secure Backdoor.BDS/Backdoor.Gen
DrWeb BackDoor.Remcos.491
VIPRE Generic.Dacic.A9349469.A.FE6251BC
TrendMicro Clean
McAfeeD Real Protect-LS!DB59BFEF32BC
Trapmine Clean
CTX exe.trojan.remcos
Emsisoft Generic.Dacic.A9349469.A.FE6251BC (B)
Ikarus Trojan.Win32.Remcos
FireEye Generic.mg.db59bfef32bc15d5
Jiangmin Clean
Webroot Win.Backdoor.Remcos
Varist W32/Agent.JUB.gen!Eldorado
Avira BDS/Backdoor.Gen
Fortinet W32/Rescoms.U!tr
Antiy-AVL GrayWare/Win32.Wacapew
Kingsoft malware.kb.a.1000
Gridinsoft Trojan.Win32.Remcos.tr
Xcitium Clean
Arcabit Generic.Dacic.A9349469.A.FE6251BC
SUPERAntiSpyware Clean
ZoneAlarm Mal/Remcos-B
Microsoft Backdoor:Win32/Remcos.GA!MTB
Google Detected
AhnLab-V3 Backdoor/Win.Remcos.R693720
Acronis Clean
McAfee Artemis!DB59BFEF32BC
TACHYON Clean
VBA32 Win32.Trojan.Dropper.Heur
Malwarebytes Backdoor.Remcos
Panda Trj/Genetic.gen
Zoner Clean
TrendMicro-HouseCall Trojan.Win32.VSX.PE04C9V
Rising Backdoor.Remcos!1.BAC7 (CLASSIC)
Yandex Trojan.Rescoms!0xdHUw5uf6o
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
GData Win32.Backdoor.Remcos.EEXSL2
AVG Win32:RATX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Backdoor:Win/Remcos
No IRMA results available.