Malware Analysis Report

2025-01-03 05:02

Sample ID 231231-gsrqlsdge2
Target 2b17e88121f688966b5c9313e9680f01
SHA256 78ac173de38f6be4ec1686d84a71082838154d42ed05e970b574a9e82b76800d
Tags
bitrat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

78ac173de38f6be4ec1686d84a71082838154d42ed05e970b574a9e82b76800d

Threat Level: Known bad

The file 2b17e88121f688966b5c9313e9680f01 was found to be: Known bad.

Malicious Activity Summary

bitrat trojan upx

BitRAT

Executes dropped EXE

Checks computer location settings

UPX packed file

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Checks processor information in registry

Suspicious use of SetWindowsHookEx

Modifies Internet Explorer settings

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-31 06:04

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-31 06:04

Reported

2024-01-05 18:14

Platform

win7-20231215-en

Max time kernel

18s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe"

Signatures

BitRAT

trojan bitrat

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1820 set thread context of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 1820 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

"C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe"

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.pdf"

C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe

"C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe"

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

Network

Country Destination Domain Proto
US 204.77.8.221:5506 tcp
US 204.77.8.221:5506 tcp
US 204.77.8.221:5506 tcp
US 204.77.8.221:5506 tcp

Files

memory/1820-1-0x00000000744D0000-0x0000000074BBE000-memory.dmp

memory/1820-0-0x0000000000DB0000-0x0000000000FFA000-memory.dmp

memory/1820-2-0x00000000049F0000-0x0000000004A30000-memory.dmp

memory/1820-3-0x0000000000AB0000-0x0000000000AD6000-memory.dmp

memory/2696-6-0x0000000000400000-0x0000000000612000-memory.dmp

memory/2696-8-0x0000000000400000-0x0000000000612000-memory.dmp

memory/1820-10-0x00000000744D0000-0x0000000074BBE000-memory.dmp

memory/2696-12-0x0000000004BF0000-0x0000000004C30000-memory.dmp

memory/2696-9-0x00000000744D0000-0x0000000074BBE000-memory.dmp

memory/2400-25-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2696-24-0x00000000744D0000-0x0000000074BBE000-memory.dmp

memory/2696-23-0x0000000007200000-0x00000000075E4000-memory.dmp

memory/2696-22-0x0000000007200000-0x00000000075E4000-memory.dmp

memory/2696-4-0x0000000000400000-0x0000000000612000-memory.dmp

memory/2400-44-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2400-46-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2400-50-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/2400-53-0x0000000000400000-0x00000000007E4000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-31 06:04

Reported

2024-01-05 18:14

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe"

Signatures

BitRAT

trojan bitrat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5072 set thread context of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5072 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3756 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 5072 wrote to memory of 4248 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe
PID 4248 wrote to memory of 1016 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 4248 wrote to memory of 1016 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 4248 wrote to memory of 1016 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
PID 4248 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe
PID 4248 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe
PID 4248 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe
PID 1016 wrote to memory of 4256 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 1016 wrote to memory of 4256 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 1016 wrote to memory of 4256 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
PID 4256 wrote to memory of 4008 N/A C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

"C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe"

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Users\Admin\AppData\Local\Temp\2b17e88121f688966b5c9313e9680f01.exe

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.pdf"

C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe

"C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe"

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7EE0A455B41FEB392C66247F87F06E23 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7EE0A455B41FEB392C66247F87F06E23 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:1

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=67B6D3D1710CA1DA1CE95C219BBCF588 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BB16A1C644113F5B5904866D7C41C919 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0E71739990563DC09538697D25E34A98 --mojo-platform-channel-handle=1924 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BCDC3184E6C4158854D308397D34E151 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2

C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe

"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C66A8F4D1B4174C344FB2370A2859B5E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C66A8F4D1B4174C344FB2370A2859B5E --renderer-client-id=6 --mojo-platform-channel-handle=1860 --allow-no-sandbox-job /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

Network

Country Destination Domain Proto
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 176.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 204.77.8.221:5506 tcp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 132.4.17.2.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 88.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 204.77.8.221:5506 tcp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 61.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 204.77.8.221:5506 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.77.8.221:5506 tcp

Files

memory/5072-0-0x0000000000D90000-0x0000000000FDA000-memory.dmp

memory/5072-1-0x00000000747D0000-0x0000000074F80000-memory.dmp

memory/5072-2-0x0000000005FB0000-0x0000000006554000-memory.dmp

memory/5072-3-0x0000000005AA0000-0x0000000005B32000-memory.dmp

memory/5072-4-0x0000000005C20000-0x0000000005C30000-memory.dmp

memory/5072-5-0x00000000059E0000-0x00000000059EA000-memory.dmp

memory/5072-6-0x0000000005BB0000-0x0000000005BD6000-memory.dmp

memory/4248-7-0x0000000000400000-0x0000000000612000-memory.dmp

memory/4248-12-0x0000000005350000-0x00000000053EC000-memory.dmp

memory/4248-14-0x0000000005260000-0x0000000005270000-memory.dmp

memory/5072-11-0x00000000747D0000-0x0000000074F80000-memory.dmp

memory/4248-10-0x00000000747D0000-0x0000000074F80000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2b17e88121f688966b5c9313e9680f01.exe.log

MD5 7ebe314bf617dc3e48b995a6c352740c
SHA1 538f643b7b30f9231a3035c448607f767527a870
SHA256 48178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8
SHA512 0ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e

memory/4248-25-0x00000000747D0000-0x0000000074F80000-memory.dmp

memory/4316-24-0x0000000000400000-0x00000000007E4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe

MD5 7b0478b79216d2d3dfd2db6d90072abc
SHA1 54f5159295bedc51da9163d3752905df2faf6303
SHA256 a26384575dd53882a7e1e8d580140322519f7bb5ef48671018ace687ecd608f0
SHA512 81cc4001758f85e7327b5ce5024996cfb0dff77570e39ecb115675d9106742a298ae2ee8729a0101e13edd3301c5ccecf7bba25ab42263f9ce6e0f5bc6be0a92

C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe

MD5 7883fc5b5a6e603de63b68981fb05027
SHA1 d3088d00b2c597d50a4f0e8da41eec5db013a894
SHA256 e96e85af580332aee4fbfde0c2df665d5d83487ba4551a79a2572e31e9dddad3
SHA512 f33e2a9114b4028421aca33ac5a0548d078163f18fd2fa9cb533bd53c710c89b6f01fb8f0434a083467e72cb85eeccbee63900037ab7e5ca59c3aa695b857c22

C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.exe

MD5 3267aaaa00e9793fd0110b0d7face79c
SHA1 1275d09331fcef8db717e6f21095ec2f1b09bb7f
SHA256 e462da0925198eca0c8eccf060685fd8797816574157dfbfe1c122f09c3f5497
SHA512 58fb085cda7e16eddf58819a9271a1210868463ead5d9febb2df586276a447697a0002ded3bd7f7910f5d355ca829bc8d7a1e8cf3b4d5279dc2a8375278f25b7

C:\Users\Admin\AppData\Local\Temp\eInvoice-20210805_200426_600838.pdf

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4316-27-0x0000000073810000-0x0000000073849000-memory.dmp

memory/4316-28-0x0000000073500000-0x0000000073539000-memory.dmp

memory/1016-56-0x0000000008660000-0x0000000008681000-memory.dmp

memory/4316-58-0x0000000000400000-0x00000000007E4000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

MD5 752a1f26b18748311b691c7d8fc20633
SHA1 c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256 111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512 a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

memory/4316-159-0x0000000071800000-0x0000000071839000-memory.dmp

memory/4316-165-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4316-187-0x0000000071570000-0x00000000715A9000-memory.dmp

memory/4316-194-0x0000000000400000-0x00000000007E4000-memory.dmp

memory/4316-209-0x0000000071570000-0x00000000715A9000-memory.dmp

memory/4316-216-0x0000000000400000-0x00000000007E4000-memory.dmp