IOC Report
rkn.log.exe

loading gif

Files

File Path
Type
Category
Malicious
rkn.log.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\apt66ext[1].log
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\apt66ext.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PIL\_imaging.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PIL\_imagingcms.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PIL\_imagingft.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PIL\_imagingtk.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PIL\_webp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\QtCore.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\QtGui.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\QtWidgets.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\platforms\qminimal.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\platforms\qoffscreen.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\platforms\qwebgl.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\platformthemes\qxdgdesktopportal.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\printsupport\windowsprintersupport.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\sip.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_cffi_backend.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_elementtree.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\_tkinter.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\concrt140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\cv2\cv2.pyd
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libfreetype-6.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libjpeg-9.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libopenblas.WCDJNK7YVMPZQ2ME2ZZHJJRJ3JIKNDB7.gfortran-win_amd64.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libpng16-16.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\core\_multiarray_tests.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\core\_multiarray_umath.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\fft\_pocketfft_internal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\linalg\_umath_linalg.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\linalg\lapack_lite.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_bounded_integers.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_common.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_generator.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_mt19937.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_pcg64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_philox.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\_sfc64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\bit_generator.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\numpy\random\mtrand.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\_freetype.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\base.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\bufferproxy.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\color.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\constants.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\display.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\draw.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\event.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\font.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\image.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\imageext.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\joystick.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\key.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\mask.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\math.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\mixer.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\mixer_music.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\mouse.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\pixelarray.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\pixelcopy.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\rect.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\rwobject.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\scrap.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\surface.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\surflock.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\time.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\pygame\transform.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\python37.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5dbus.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5printsupport.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\sdl2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\sdl2_image.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\sdl2_mixer.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\sdl2_ttf.dll
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\staged_out.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\zlib1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\2ae2084c-08f1-45a4-b202-25788e08d35e.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6384
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\unity[1].pdf
PDF document, version 1.7, 4 pages
dropped
C:\Users\user\AppData\Local\Temp\MSId101a.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-07-05 00-48-53-615.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\28d854e8-d7cf-4df2-9de2-c275cb69ebf2.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 647360
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\a1bae895-bd89-4946-8139-5b33837f980e.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\ad329d6e-d6e8-49af-a2e7-b8c3bea700d5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e1256416-f0a7-411f-a487-cc86afe48c28.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\iconengines\qsvgicon.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qgif.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qicns.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qico.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qjpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qsvg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qtga.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qtiff.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qwbmp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\imageformats\qwebp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\mediaservice\dsengine.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\mediaservice\qtmedia_audioengine.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\mediaservice\wmfengine.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\platforms\qwindows.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\PyQt5\qt-plugins\styles\qwindowsvistastyle.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libeay32.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\msvcp140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5core.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5gui.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5multimedia.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5network.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5qml.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5qmlmodels.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5quick.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5svg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5websockets.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\qt5widgets.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\ssleay32.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\tcl86t.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\tk86t.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\unity.pdf
PDF document, version 1.7, 4 pages
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 160 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rkn.log.exe
"C:\Users\user\Desktop\rkn.log.exe"
malicious
C:\Users\user\AppData\Local\Temp\apt66ext.exe
"C:\Users\user\AppData\Local\Temp\apt66ext.exe"
malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\unity.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2072 --field-trial-handle=1664,i,2083842070607392695,600635408370004689,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Users\user\AppData\Local\Temp\onefile_5264_133646285321448385\staged_out.exe
"C:\Users\user\AppData\Local\Temp\apt66ext.exe"

URLs

Name
IP
Malicious
http://121.127.33.39/apt66ext.logIL
unknown
https://onnx.ai/)
unknown
http://caffe.berkeleyvision.org/)
unknown
http://www.scipy.org/not/real/data.txt
unknown
http://www.megginson.com/SAX/.
unknown
http://torch.ch/)
unknown
https://github.com/opencv/opencv/issues/19634cv::mjpeg::MjpegEncoder::MjpegEncodercv::mjpeg::MotionJ
unknown
https://web.archive.org/web/20090514091424/http://brighton-webs.co.uk:80/distributions/rayleigh.asp
unknown
https://web.archive.org/web/20170802060935/http://oss.sgi.com/projects/ogl-sample/registry/EXT/textu
unknown
http://121.127.33.39/apt66ext.log
121.127.33.39
https://numpy.org/neps/nep-0032-remove-financial-functions.html
unknown
http://docs.python.org/library/unittest.html
unknown
https://github.com/opencv/opencv/issues/6293
unknown
https://github.com/opencv/opencv/issues/16739
unknown
https://github.com/opencv/opencv/issues/16736
unknown
https://www.math.hmc.edu/~benjamin/papers/CombTrig.pdf
unknown
https://github.com/torch/nn/blob/master/doc/module.md
unknown
https://refspecs.linuxfoundation.org/elf/gabi4
unknown
https://www.littlecms.com
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://speleotrove.com/decimal/decarith.html
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
http://www.gdal.org/ogr_formats.html).
unknown
https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packagesr7
unknown
https://github.com/numpy/numpy/issues/8577
unknown
http://arxiv.org/abs/1805.10941.
unknown
http://json.org
unknown
https://stackoverflow.com/questions/7648200/pip-install-pil-e-tickets-1-no-jpeg-png-support
unknown
https://www.tensorflow.org/)
unknown
http://xml.python.org/entities/fragment-builder/internalz
unknown
https://exiv2.org/tags.html)
unknown
http://mathworld.wolfram.com/NegativeBinomialDistribution.html
unknown
https://github.com/opencv/opencv_contrib/blob/master/modules/text/samples/OCRHMM_transitions_table.x
unknown
https://www.itl.nist.gov/div898/software/dataplot/refman2/auxillar/powpdf.pdf
unknown
https://www.pygame.org/contribute.html
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
http://www.oasis-open.org/committees/documents.php
unknown
http://www.pcg-random.org/posts/developing-a-seed_seq-alternative.html
unknown
https://github.com/pypa/packagingz
unknown
https://github.com/opencv/opencv_contrib/issues/2235
unknown
https://github.com/numpy/numpy/issues/4763
unknown
http://mathworld.wolfram.com/CauchyDistribution.html
unknown
http://www.inf.ufrgs.br/~eslgastal/DomainTransform/).COLOR_SPACE_Lab_D75_2MORPH_CROSSCAP_PROP_DC1394
unknown
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.476.5736&rep=rep1&type=pdf
unknown
http://graphics.berkeley.edu/papers/Tao-SAN-2012-05/
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://onnx.ai/
unknown
https://software.intel.com/openvino-toolkit)
unknown
http://caffe.berkeleyvision.org
unknown
https://askubuntu.com/questions/697397/python3-is-not-supporting-gtk-module
unknown
https://github.com/jaraco/jaraco.functools/issues/5
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
https://pypi.org/project/numpy-financial.
unknown
https://www.numpy.org/neps/nep-0001-npy-format.html
unknown
https://mahler:8092/site-updates.py
unknown
https://github.com/opencv/opencv/issues/21326cv::initOpenEXRD:
unknown
https://www.learnopencv.com/convex-hull-using-opencv-in-python-and-c/cornersQualityOOOO
unknown
https://github.com/asweigart/pygetwindow
unknown
https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
unknown
https://mouseinfo.readthedocs.io
unknown
https://www.cazabon.com
unknown
http://www.cs.tut.fi/~foi/GCF-BM3D/BM3D_TIP_2007.pdf
unknown
http://www.google.com/index.html
unknown
https://github.com/openvinotoolkit/open_model_zoo/blob/master/models/public/yolo-v2-tiny-tf/yolo-v2-
unknown
http://tip.tcl.tk/48)
unknown
https://github.com/python/cpython/blob/3.7/Objects/listsort.txt
unknown
http://pracrand.sourceforge.net/RNG_engines.txt
unknown
http://xml.org/sax/features/namespacesz.http://xml.org/sax/features/namespace-prefixesz
unknown
http://121.127.33.39/unity.pdfapt66ext.exehttp://121.127.33.39/apt66ext.logapt66.exemsupdate.exeC
unknown
https://stat.ethz.ch/~stahel/lognormal/bioscience.pdf
unknown
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.6394
unknown
https://github.com/opencv/opencv/issues/21326
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
http://docs.python.org/library/itertools.html#recipes
unknown
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising
unknown
https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbca
unknown
https://www.openblas.net/
unknown
http://121.127.33.39/apt66ext.logCL
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://tinyurl.com/y3dm3h86
unknown
http://digitalassets.lib.berkeley.edu/sdtr/ucb/text/34.pdf
unknown
http://www.ipol.im/pub/art/2011/ys-dct/
unknown
https://arxiv.org/abs/1704.04503
unknown
https://code.google.com/archive/p/casadebender/wikis/Win32IconImagePlugin.wiki
unknown
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising/
unknown
http://www.nightmare.com/squirl/python-ext/misc/syslog.py
unknown
http://www.pcg-random.org/
unknown
https://github.com/opencv/opencv/issues/20833.
unknown
http://www.math.sfu.ca/~cbm/aands/page_379.htm
unknown
http://www.iana.org/assignments/character-sets
unknown
https://people.eecs.berkeley.edu/~wkahan/ieee754status/IEEE754.PDF
unknown
http://www.gdal.org/formats_list.html)
unknown
https://github.com/opencv/opencv/issues/20833DNN/OpenCL:
unknown
http://mathworld.wolfram.com/GammaDistribution.html
unknown
https://www.itl.nist.gov/div898/handbook/eda/section3/eda3663.htm
unknown
http://www.gdal.org)
unknown
https://github.com/opencv/opencv/issues/5412.
unknown
http://code.activestate.com/recipes/577916/
unknown
https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
unknown
https://tinyurl.com/y3dm3h86u
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
121.127.33.39
unknown
Afghanistan
23.47.168.24
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
6AEE9000
unkown
page readonly
1E4C7690000
heap
page read and write
1E4C1C9E000
heap
page read and write
2B4597B7000
heap
page read and write
97B000
heap
page read and write
2B458FD1000
heap
page read and write
2B459681000
heap
page read and write
2B440B20000
direct allocation
page read and write
2B459330000
direct allocation
page read and write
62E95000
unkown
page readonly
2B4597B7000
heap
page read and write
2B459693000
heap
page read and write
63C000
unkown
page read and write
633000
unkown
page write copy
2B45909C000
heap
page read and write
1C81000
unkown
page write copy
67898000
unkown
page readonly
2560000
heap
page read and write
2B459857000
heap
page read and write
2B459522000
heap
page read and write
1E4C7191000
heap
page read and write
2B4597C3000
heap
page read and write
71001000
unkown
page execute read
2B43F2D8000
heap
page read and write
881000
unkown
page execute read
2B458FDC000
heap
page read and write
2B45950E000
heap
page read and write
2B459AA0000
direct allocation
page read and write
2B461BB0000
direct allocation
page read and write
2B461EF0000
direct allocation
page read and write
2B459018000
heap
page read and write
2B43F320000
direct allocation
page read and write
A673BFC000
stack
page read and write
2B459170000
direct allocation
page read and write
BFE000
stack
page read and write
69A33000
unkown
page readonly
1E4C75CD000
heap
page read and write
C15F3BF000
stack
page read and write
2B4597B1000
heap
page read and write
8F1000
unclassified section
page execute read
1E4C1C7C000
heap
page read and write
2B459522000
heap
page read and write
2B4597B7000
heap
page read and write
881000
unkown
page write copy
2B4597B1000
heap
page read and write
25D6000
unkown
page write copy
A673AFE000
stack
page read and write
68B76000
unkown
page readonly
885000
heap
page read and write
2B459571000
heap
page read and write
2B462350000
direct allocation
page read and write
2B459AA0000
direct allocation
page read and write
2B43F283000
heap
page read and write
2B4599D0000
direct allocation
page read and write
1E4C1C61000
heap
page read and write
2B4596DD000
heap
page read and write
1E4C3F91000
heap
page read and write
1E4C1C93000
heap
page read and write
6A8A6000
unkown
page readonly
3BC000
stack
page read and write
631000
unkown
page execute read
2B43E9EC000
heap
page read and write
2B459574000
heap
page read and write
7FF76F141000
unkown
page execute read
2B4599D0000
direct allocation
page read and write
2B46203F000
heap
page read and write
2B4597C3000
heap
page read and write
2B43F2D8000
heap
page read and write
62E9E000
unkown
page readonly
2B4597C3000
heap
page read and write
2B440EC0000
direct allocation
page read and write
1E4C77B1000
heap
page read and write
2B459400000
direct allocation
page read and write
7FF679D31000
unkown
page read and write
7FF679D00000
unkown
page readonly
2B459574000
heap
page read and write
2B43E9D7000
heap
page read and write
2B4597B1000
heap
page read and write
6A880000
unkown
page readonly
2B45909C000
heap
page read and write
2B43EA7A000
heap
page read and write
2B4599D0000
direct allocation
page read and write
2B4594A0000
heap
page read and write
1E4C74D8000
heap
page read and write
94F000
heap
page read and write
2B43EA65000
heap
page read and write
1E4C76E2000
heap
page read and write
1E4C5D91000
heap
page read and write
2B459857000
heap
page read and write
7100B000
unkown
page readonly
2B4594E9000
heap
page read and write
2B461F60000
trusted library allocation
page read and write
2B4599D0000
direct allocation
page read and write
2B43F2A8000
heap
page read and write
969000
heap
page read and write
678A6000
unkown
page write copy
2B459875000
heap
page read and write
2B459530000
heap
page read and write
7FF679D2E000
unkown
page write copy
1E4C1CA3000
heap
page read and write
2B43F020000
direct allocation
page read and write
1E4C752D000
heap
page read and write
2B4591B0000
direct allocation
page read and write
2B459062000
heap
page read and write
2B459574000
heap
page read and write
2B43EF60000
direct allocation
page read and write
2B4596DD000
heap
page read and write
2B43E900000
heap
page read and write
69A01000
unkown
page execute read
2B459062000
heap
page read and write
7FF76E741000
unkown
page execute read
2B4623F0000
direct allocation
page read and write
7FF679D3F000
unkown
page readonly
C15D75D000
stack
page read and write
A6738F6000
stack
page read and write
2B4599D0000
direct allocation
page read and write
2B45987B000
heap
page read and write
2B43EA57000
heap
page read and write
2B43E9EB000
heap
page read and write
2B459980000
direct allocation
page read and write
2B459678000
heap
page read and write
632000
unkown
page readonly
2B43E9D9000
heap
page read and write
2B461BF0000
direct allocation
page read and write
2CDE000
stack
page read and write
1E4C765B000
heap
page read and write
2B43F2AA000
heap
page read and write
2B459574000
heap
page read and write
2B458FA7000
heap
page read and write
1E4C7714000
heap
page read and write
2B43EFE0000
direct allocation
page read and write
2B459AA0000
direct allocation
page read and write
8D0000
direct allocation
page read and write
6AE81000
unkown
page execute read
2B43EB95000
heap
page read and write
A6739FF000
stack
page read and write
2B43E9EC000
heap
page read and write
1E4C86DD000
heap
page read and write
2B459518000
heap
page read and write
2B459775000
heap
page read and write
2B462290000
direct allocation
page read and write
1E4C7532000
heap
page read and write
2B43E9C9000
heap
page read and write
1E4C1C37000
heap
page read and write
633000
unkown
page read and write
1E4C1C93000
heap
page read and write
2B43F255000
heap
page read and write
2B45969A000
heap
page read and write
2B5E000
stack
page read and write
2B4595DD000
heap
page read and write
C16100E000
stack
page read and write
6AF15000
unkown
page write copy
2B43E9B8000
heap
page read and write
2B461E60000
direct allocation
page read and write
2710000
heap
page read and write
2B459143000
heap
page read and write
2B4597B7000
heap
page read and write
2B461F50000
trusted library allocation
page read and write
7FF76F438000
unkown
page write copy
9AC000
heap
page read and write
2B43EA4E000
heap
page read and write
678A2000
unkown
page read and write
2B4597C3000
heap
page read and write
1E4C753E000
heap
page read and write
2B459523000
heap
page read and write
2B4599D0000
direct allocation
page read and write
305E000
stack
page read and write
2B459B70000
direct allocation
page read and write
2B43E9D9000
heap
page read and write
2B43EA51000
heap
page read and write
AFE000
stack
page read and write
2B43EA4B000
heap
page read and write
2B4597C3000
heap
page read and write
1E4C3591000
heap
page read and write
73A000
stack
page read and write
2B459380000
direct allocation
page read and write
2B45951D000
heap
page read and write
2C9E000
stack
page read and write
C15EA4D000
stack
page read and write
2B459400000
direct allocation
page read and write
2B458FA7000
heap
page read and write
2B4594D1000
heap
page read and write
2B43E9EC000
heap
page read and write
2B461E10000
direct allocation
page read and write
2B461B70000
direct allocation
page read and write
90A000
heap
page read and write
25AE000
stack
page read and write
2B4596B7000
heap
page read and write
2B43F2E0000
direct allocation
page read and write
2B43E940000
heap
page read and write
2B45955B000
heap
page read and write
2B45909C000
heap
page read and write
2B440C60000
direct allocation
page read and write
2B45951D000
heap
page read and write
2B4595DD000
heap
page read and write
1E4C755E000
heap
page read and write
6A881000
unkown
page execute read
7FF679D21000
unkown
page readonly
2B43E9D9000
heap
page read and write
1E4C77A0000
heap
page read and write
34FB000
stack
page read and write
1E4C1C93000
heap
page read and write
310E000
stack
page read and write
2B458FED000
heap
page read and write
2B459778000
heap
page read and write
1C81000
unkown
page execute read
2B4590A2000
heap
page read and write
2B4597B7000
heap
page read and write
2B459460000
direct allocation
page read and write
8F3000
unclassified section
page readonly
69A40000
unkown
page read and write
A673DFF000
stack
page read and write
2B440B20000
direct allocation
page read and write
68B78000
unkown
page read and write
6789E000
unkown
page readonly
2B4590A2000
heap
page read and write
2B4599D0000
direct allocation
page read and write
2B4599D0000
direct allocation
page read and write
630000
unkown
page readonly
6AF12000
unkown
page read and write
870000
unclassified section
page execute and read and write
2B461FB0000
direct allocation
page read and write
1E4C77F9000
heap
page read and write
246C000
unkown
page readonly
2B462250000
direct allocation
page read and write
7FF679D3F000
unkown
page readonly
2B43F21E000
heap
page read and write
880000
heap
page read and write
1E4C1C93000
heap
page read and write
2B459270000
direct allocation
page read and write
2B43E9D6000
heap
page read and write
2B459526000
heap
page read and write
2567000
heap
page read and write
2B459520000
heap
page read and write
2B4593C0000
direct allocation
page read and write
632000
unkown
page readonly
68B6A000
unkown
page readonly
1E4C778E000
heap
page read and write
1281000
unkown
page execute read
7FF76F402000
unkown
page readonly
6AF10000
unkown
page readonly
1E4C1C00000
heap
page read and write
2B4623B0000
direct allocation
page read and write
2B4598A0000
direct allocation
page read and write
35FC000
stack
page read and write
1E4C94B5000
heap
page read and write
2B4590A2000
heap
page read and write
320E000
stack
page read and write
2B43F267000
heap
page read and write
1E4C7521000
heap
page read and write
A673EFB000
stack
page read and write
2B45902A000
heap
page read and write
2B4594E8000
heap
page read and write
7FF679D00000
unkown
page readonly
2B45952A000
heap
page read and write
2B4597B1000
heap
page read and write
2B4597B1000
heap
page read and write
26AE000
stack
page read and write
2B4621D0000
direct allocation
page read and write
2B458F70000
heap
page read and write
2B461DC0000
direct allocation
page read and write
2B4592F0000
direct allocation
page read and write
25D9000
unkown
page readonly
2B461D80000
direct allocation
page read and write
2B45951D000
heap
page read and write
2B43F20E000
heap
page read and write
68B40000
unkown
page readonly
2B43F21E000
heap
page read and write
2B459940000
direct allocation
page read and write
6A8A2000
unkown
page read and write
69A00000
unkown
page readonly
2B43EA62000
heap
page read and write
2B4596A6000
heap
page read and write
C15FD2F000
stack
page read and write
2B43E980000
heap
page read and write
678A3000
unkown
page write copy
2B459142000
heap
page read and write
63D000
unkown
page readonly
2520000
heap
page read and write
2B459460000
direct allocation
page read and write
2B459086000
heap
page read and write
2B459018000
heap
page read and write
2B4599D0000
direct allocation
page read and write
2B43F208000
heap
page read and write
7FF679D2E000
unkown
page read and write
2B459085000
heap
page read and write
2B458FEE000
heap
page read and write
1E4C76F2000
heap
page read and write
2B4595DD000
heap
page read and write
2B4590A2000
heap
page read and write
2B43F254000
heap
page read and write
2B43F1E0000
heap
page read and write
1281000
unkown
page write copy
68B41000
unkown
page execute read
C15E0DE000
stack
page read and write
2B45968D000
heap
page read and write
1E4C3590000
heap
page read and write
2B45906D000
heap
page read and write
2B462310000
direct allocation
page read and write
2B45968D000
heap
page read and write
1E4C1C93000
heap
page read and write
2B45909C000
heap
page read and write
6A89A000
unkown
page read and write
2B4597C3000
heap
page read and write
6A89B000
unkown
page readonly
1E4C6791000
heap
page read and write
1E4C76A1000
heap
page read and write
2B45986A000
heap
page read and write
2B4597B1000
heap
page read and write
2B459522000
heap
page read and write
2B459857000
heap
page read and write
2B4599D0000
direct allocation
page read and write
1E4C1C93000
heap
page read and write
1E4C1C20000
heap
page read and write
2B43E9D8000
heap
page read and write
2B4599D0000
direct allocation
page read and write
8F5000
unclassified section
page readonly
2B43E9CA000
heap
page read and write
1E4C1C2E000
heap
page read and write
2B4596DD000
heap
page read and write
33D0000
heap
page read and write
1E4C1C9E000
heap
page read and write
2B4596DD000
heap
page read and write
2B459526000
heap
page read and write
26EE000
stack
page read and write
2B43EA14000
heap
page read and write
2F5E000
stack
page read and write
678A1000
unkown
page readonly
33F0000
heap
page read and write
2B43EB90000
heap
page read and write
7FF679D33000
unkown
page read and write
1E4C4991000
heap
page read and write
2B440B80000
heap
page read and write
1E4C777E000
heap
page read and write
2B459571000
heap
page read and write
1E4C74C8000
heap
page read and write
2B4596A0000
heap
page read and write
2B459460000
direct allocation
page read and write
2B4596BB000
heap
page read and write
2B4597B7000
heap
page read and write
2B459018000
heap
page read and write
2B459B30000
direct allocation
page read and write
1E4C1C62000
heap
page read and write
2B43E9D9000
heap
page read and write
2B4596B9000
heap
page read and write
2B43EFA0000
direct allocation
page read and write
2B45952A000
heap
page read and write
2B43F1F1000
heap
page read and write
2B459871000
heap
page read and write
2B459520000
heap
page read and write
7FF679D21000
unkown
page readonly
7FF76F4A7000
unkown
page readonly
2B45906D000
heap
page read and write
2B4597B1000
heap
page read and write
2B43E9BA000
heap
page read and write
2B4599D0000
direct allocation
page read and write
7FF679D01000
unkown
page execute read
2B4597B7000
heap
page read and write
1E4C8AB5000
heap
page read and write
1E4C7704000
heap
page read and write
2B45906D000
heap
page read and write
2B4595DD000
heap
page read and write
1E4C77C6000
heap
page read and write
2B4599D0000
direct allocation
page read and write
2B43EA77000
heap
page read and write
62EA3000
unkown
page readonly
8CE000
stack
page read and write
2B4590A2000
heap
page read and write
1E4C1C28000
heap
page read and write
620000
heap
page read and write
2B43E9B7000
heap
page read and write
1E4C766D000
heap
page read and write
1E4C764B000
heap
page read and write
2B459511000
heap
page read and write
2B43EB50000
direct allocation
page read and write
2B459857000
heap
page read and write
678A7000
unkown
page readonly
2B459520000
heap
page read and write
2B4597C3000
heap
page read and write
2B459400000
direct allocation
page read and write
2B459857000
heap
page read and write
71007000
unkown
page readonly
6A8A5000
unkown
page write copy
2B440B83000
heap
page read and write
975000
heap
page read and write
2B4597C3000
heap
page read and write
2B45969D000
heap
page read and write
2B459857000
heap
page read and write
90E000
heap
page read and write
1E4C5391000
heap
page read and write
1E4C1C9E000
heap
page read and write
62E9F000
unkown
page read and write
2B459A10000
direct allocation
page read and write
2B43E9FE000
heap
page read and write
67881000
unkown
page execute read
7FF76E740000
unkown
page readonly
7FF76E741000
unkown
page execute read
2B459873000
heap
page read and write
2B4599D0000
direct allocation
page read and write
2B43E9E2000
heap
page read and write
2B459699000
heap
page read and write
2B4623B0000
direct allocation
page read and write
69A43000
unkown
page readonly
2B43EA44000
heap
page read and write
2B459571000
heap
page read and write
2B45987A000
heap
page read and write
2B458F85000
heap
page read and write
2B4597A2000
heap
page read and write
2B459675000
heap
page read and write
2B4599D0000
direct allocation
page read and write
2B459018000
heap
page read and write
1E4C767E000
heap
page read and write
2B461EB0000
direct allocation
page read and write
63D000
unkown
page readonly
6AE80000
unkown
page readonly
2B459460000
direct allocation
page read and write
62E81000
unkown
page execute read
1E4C81F9000
heap
page read and write
2B43E920000
heap
page read and write
2B459571000
heap
page read and write
2B43F1F4000
heap
page read and write
1E4C1C93000
heap
page read and write
2B4591F0000
direct allocation
page read and write
2B43E9FC000
heap
page read and write
2B45968A000
heap
page read and write
2B4596DD000
heap
page read and write
1E4C77D6000
heap
page read and write
2B4596DD000
heap
page read and write
2B43F250000
heap
page read and write
2E1D000
stack
page read and write
C16069E000
stack
page read and write
2DDE000
stack
page read and write
2B43EF20000
direct allocation
page read and write
2B459062000
heap
page read and write
2B459555000
heap
page read and write
2B459230000
direct allocation
page read and write
2B43EA05000
heap
page read and write
7100F000
unkown
page write copy
2B45968D000
heap
page read and write
1E4C1CA3000
heap
page read and write
2B45951A000
heap
page read and write
2B462190000
direct allocation
page read and write
2B43F2D8000
heap
page read and write
7100C000
unkown
page read and write
1E4C1C7D000
heap
page read and write
634000
unkown
page write copy
2B43EA45000
heap
page read and write
2B459062000
heap
page read and write
2B43EA45000
heap
page read and write
2B4622D0000
direct allocation
page read and write
2B459857000
heap
page read and write
2B45909C000
heap
page read and write
2B459697000
heap
page read and write
1E4C1C38000
heap
page read and write
2B440CC0000
direct allocation
page read and write
810000
heap
page read and write
2B43E9DB000
heap
page read and write
2B45968D000
heap
page read and write
2B461FF0000
direct allocation
page read and write
A673CFB000
stack
page read and write
2B440F10000
direct allocation
page execute and read and write
2B458F83000
heap
page read and write
2B459400000
direct allocation
page read and write
2B4592B0000
direct allocation
page read and write
2B4598A0000
direct allocation
page read and write
62EA2000
unkown
page write copy
2B459791000
heap
page read and write
2B43EEE0000
direct allocation
page read and write
2B43F060000
direct allocation
page read and write
2B4596DD000
heap
page read and write
25D5000
unkown
page read and write
1E4C77E8000
heap
page read and write
71000000
unkown
page readonly
2B459BE0000
direct allocation
page read and write
900000
heap
page read and write
2B4596FC000
heap
page read and write
2B4596BA000
heap
page read and write
62E80000
unkown
page readonly
2B43EA5B000
heap
page read and write
2B459857000
heap
page read and write
2B461D60000
heap
page read and write
2B4596A8000
heap
page read and write
1E4C3620000
heap
page read and write
2B4596DD000
heap
page read and write
2B45906D000
heap
page read and write
8E0000
direct allocation
page read and write
1E4C1BD0000
heap
page read and write
1E4C1CA3000
heap
page read and write
67880000
unkown
page readonly
2B459400000
direct allocation
page read and write
1E4C1C93000
heap
page read and write
68B7B000
unkown
page readonly
1E4C1C05000
heap
page read and write
2B4594E2000
heap
page read and write
7FF76E740000
unkown
page readonly
2B45902B000
heap
page read and write
1E4C1BC0000
heap
page read and write
2B4597B1000
heap
page read and write
2B462210000
direct allocation
page read and write
67897000
unkown
page read and write
2B43F283000
heap
page read and write
2B458FA4000
heap
page read and write
2B4598E0000
direct allocation
page read and write
2B458FA3000
heap
page read and write
7FF679D01000
unkown
page execute read
1E4C86D0000
heap
page read and write
6A8A1000
unkown
page readonly
2B459877000
heap
page read and write
2B4596DD000
heap
page read and write
880000
unkown
page readonly
1E4C1C9E000
heap
page read and write
2B43EA52000
heap
page read and write
2B440F20000
direct allocation
page read and write
2B459400000
direct allocation
page read and write
2B43EA05000
heap
page read and write
2F1B000
stack
page read and write
7FF679D36000
unkown
page read and write
257B000
unkown
page readonly
2B4596FB000
heap
page read and write
2B461F70000
direct allocation
page read and write
1E4C1C84000
heap
page read and write
245D000
unkown
page read and write
6AF16000
unkown
page readonly
2B43F0A0000
direct allocation
page read and write
69A3E000
unkown
page readonly
2B9E000
stack
page read and write
85D000
stack
page read and write
2B4597B7000
heap
page read and write
631000
unkown
page execute read
630000
unkown
page readonly
There are 520 hidden memdumps, click here to show them.