Loading ...

Play interactive tourEdit tour

Analysis Report Anmodning om tilbud 12-04-2021#U00b7pdf.exe

Overview

General Information

Sample Name:Anmodning om tilbud 12-04-2021#U00b7pdf.exe
Analysis ID:385424
MD5:ff684bf547b6f692c53f80779dc5ee7b
SHA1:fe4116a2cfa9cadde500c900f605742d5ddabf10
SHA256:5cc3fcd6bc68db6107493ae5a1d9adfaa4cc210195c2c5f05d3059cd35ba2e09
Tags:GuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader Raccoon
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Yara detected Raccoon Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to hide a thread from the debugger
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Is looking for software installed on the system
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • Anmodning om tilbud 12-04-2021#U00b7pdf.exe (PID: 6976 cmdline: 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe' MD5: FF684BF547B6F692C53F80779DC5EE7B)
    • Anmodning om tilbud 12-04-2021#U00b7pdf.exe (PID: 4552 cmdline: 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe' MD5: FF684BF547B6F692C53F80779DC5EE7B)
      • cmd.exe (PID: 6828 cmdline: cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • timeout.exe (PID: 7096 cmdline: timeout /T 10 /NOBREAK MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1EVgv79jm2Kha80e4t5kPPRtQGH8glBYc"}

Threatname: Raccoon Stealer

{"Config: ": ["00000000 -> Raccoon | 1.7.3", "Build compile date: Sat Feb 27 21:25:06 2021", "Launched at: 2021.04.12 - 11:46:46 GMT", "Bot_ID: D06ED635-68F6-4E9A-955C-4899F5F57B9A_user", "Running on a desktop", "-------------", "- Cookies: 1", "- Passwords: 0", "- Files: 0", "System Information:", "- System Language: English", "- System TimeZone: +1 hrs", "- IP: 84.17.52.3", "- Location: 47.431702, 8.575900 | Zurich, Zurich, Switzerland (8152)", "- ComputerName: 128757", "- Username: user", "- Windows version: NT 10.0", "- Product name: Windows 10 Pro", "- System arch: x64", "- CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (4 cores)", "- RAM: 8191 MB (5413 MB used)", "- Screen resolution: 1280x1024", "- Display devices:", "0) Microsoft Basic Display Adapter", "-------------", "Installed Apps:", "Adobe Acrobat Reader DC (19.012.20035)", "Adobe Refresh Manager (1.8.0)", "Google Chrome (85.0.4183.121)", "Google Update Helper (1.3.35.451)", "Java 8 Update 211 (8.0.2110.12)", "Java Auto Updater (2.8.211.12)", "Update for Skype for Business 2016 (KB4484286) 32-Bit Edition", "-------------"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
      Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552JoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
        Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552JoeSecurity_GuLoaderYara detected GuLoaderJoe Security
          Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 6976JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1EVgv79jm2Kha80e4t5kPPRtQGH8glBYc"}
            Source: machineinfo.txt.12.dr.binstrMalware Configuration Extractor: Raccoon Stealer {"Config: ": ["00000000 -> Raccoon | 1.7.3", "Build compile date: Sat Feb 27 21:25:06 2021", "Launched at: 2021.04.12 - 11:46:46 GMT", "Bot_ID: D06ED635-68F6-4E9A-955C-4899F5F57B9A_user", "Running on a desktop", "-------------", "- Cookies: 1", "- Passwords: 0", "- Files: 0", "System Information:", "- System Language: English", "- System TimeZone: +1 hrs", "- IP: 84.17.52.3", "- Location: 47.431702, 8.575900 | Zurich, Zurich, Switzerland (8152)", "- ComputerName: 128757", "- Username: user", "- Windows version: NT 10.0", "- Product name: Windows 10 Pro", "- System arch: x64", "- CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (4 cores)", "- RAM: 8191 MB (5413 MB used)", "- Screen resolution: 1280x1024", "- Display devices:", "0) Microsoft Basic Display Adapter", "-------------", "Installed Apps:", "Adobe Acrobat Reader DC (19.012.20035)", "Adobe Refresh Manager (1.8.0)", "Google Chrome (85.0.4183.121)", "Google Update Helper (1.3.35.451)", "Java 8 Update 211 (8.0.2110.12)", "Java Auto Updater (2.8.211.12)", "Update for Skype for Business 2016 (KB4484286) 32-Bit Edition", "-------------"]}
            Multi AV Scanner detection for domain / URLShow sources
            Source: telete.inVirustotal: Detection: 11%Perma Link
            Yara detected Raccoon StealerShow sources
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552, type: MEMORY
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: unknownHTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.4:49760 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 195.201.225.248:443 -> 192.168.2.4:49761 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 195.123.215.115:443 -> 192.168.2.4:49762 version: TLS 1.2
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: freebl3.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\gfx\angle\targets\libEGL\libEGL.pdb source: libEGL.dll.12.dr
            Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: api-ms-win-crt-locale-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: api-ms-win-crt-runtime-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libprldap\prldap60.pdb source: prldap60.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\interfaces\ia2\IA2Marshal.pdb source: IA2Marshal.dll.12.dr
            Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: api-ms-win-core-file-l1-2-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss3.pdb source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.dr
            Source: Binary string: ucrtbase.pdb source: ucrtbase.dll.12.dr
            Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: api-ms-win-core-memory-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: api-ms-win-core-sysinfo-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libldap\ldap60.pdb source: ldap60.dll.12.dr
            Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: api-ms-win-crt-filesystem-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: api-ms-win-crt-stdio-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: api-ms-win-core-heap-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: api-ms-win-core-util-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: api-ms-win-core-synch-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: api-ms-win-crt-environment-l1-1-0.dll.12.dr
            Source: Binary string: vcruntime140.i386.pdbGCTL source: vcruntime140.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: softokn3.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\ckfw\builtins\builtins_nssckbi\nssckbi.pdb source: nssckbi.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\mozglue\build\mozglue.pdb22! source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881046456.000000006D0F9000.00000002.00020000.sdmp, mozglue.dll.12.dr
            Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: api-ms-win-core-processthreads-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: freebl3.dll.12.dr
            Source: Binary string: api-ms-win-crt-private-l1-1-0.pdb source: api-ms-win-crt-private-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: api-ms-win-crt-convert-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\ipc\win\handler\AccessibleHandler.pdb source: AccessibleHandler.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb-- source: nssdbm3.dll.12.dr
            Source: Binary string: msvcp140.i386.pdb source: msvcp140.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\mailnews\mapi\mapihook\build\MapiProxy.pdb source: MapiProxy_InUse.dll.12.dr
            Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: api-ms-win-core-profile-l1-1-0.dll.12.dr
            Source: Binary string: ucrtbase.pdbUGP source: ucrtbase.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libldap\ldap60.pdbUU source: ldap60.dll.12.dr
            Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: api-ms-win-crt-time-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\ckfw\builtins\builtins_nssckbi\nssckbi.pdb66 source: nssckbi.dll.12.dr
            Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: api-ms-win-core-handle-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: api-ms-win-core-synch-l1-2-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: softokn3.dll.12.dr
            Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: api-ms-win-core-processenvironment-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\interfaces\ia2\IA2Marshal.pdb<< source: IA2Marshal.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\mozglue\build\mozglue.pdb source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881046456.000000006D0F9000.00000002.00020000.sdmp, mozglue.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\toolkit\library\dummydll\qipcap.pdb source: qipcap.dll.12.dr
            Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: api-ms-win-crt-conio-l1-1-0.dll.12.dr
            Source: Binary string: ms-win-core-memory-l1-1-0.pdb source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880884389.000000006698B000.00000004.00000001.sdmp
            Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: api-ms-win-crt-math-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: api-ms-win-core-localization-l1-2-0.dll.12.dr
            Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: api-ms-win-core-processthreads-l1-1-1.dll.12.dr
            Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: api-ms-win-core-namedpipe-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-multibyte-l1-1-0.pdb source: api-ms-win-crt-multibyte-l1-1-0.dll.12.dr
            Source: Binary string: vcruntime140.i386.pdb source: vcruntime140.dll.12.dr
            Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: api-ms-win-crt-utility-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\mailnews\mapi\mapiDLL\mozMapi32.pdb source: mozMapi32.dll.12.dr
            Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: api-ms-win-core-rtlsupport-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: api-ms-win-core-timezone-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: api-ms-win-core-string-l1-1-0.dll.12.dr
            Source: Binary string: msvcp140.i386.pdbGCTL source: msvcp140.dll.12.dr
            Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: api-ms-win-core-file-l2-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: api-ms-win-crt-process-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: api-ms-win-core-libraryloader-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\config\external\lgpllibs\lgpllibs.pdb source: lgpllibs.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libldif\ldif60.pdb source: ldif60.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\interfaces\msaa\AccessibleMarshal.pdb source: AccessibleMarshal.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb source: nssdbm3.dll.12.dr
            Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: api-ms-win-core-interlocked-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\toolkit\crashreporter\injector\breakpadinjector.pdb source: breakpadinjector.dll.12.dr
            Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: api-ms-win-crt-heap-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: api-ms-win-crt-string-l1-1-0.dll.12.dr
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ebx, 00005B18h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 4x nop then mov ecx, ecx

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1EVgv79jm2Kha80e4t5kPPRtQGH8glBYc
            Source: Joe Sandbox ViewIP Address: 195.201.225.248 195.201.225.248
            Source: Joe Sandbox ViewIP Address: 195.123.215.115 195.123.215.115
            Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
            Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS traffic detected: queries for: doc-00-7g-docs.googleusercontent.com
            Source: mozglue.dll.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: mozglue.dll.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
            Source: nssckbi.dll.12.drString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
            Source: nssckbi.dll.12.drString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.securetrust.com/STCA.crl0
            Source: mozglue.dll.12.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
            Source: mozglue.dll.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
            Source: mozglue.dll.12.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
            Source: mozglue.dll.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: mozglue.dll.12.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
            Source: nssckbi.dll.12.drString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://ocsp.accv.es0
            Source: mozglue.dll.12.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: mozglue.dll.12.drString found in binary or memory: http://ocsp.digicert.com0N
            Source: mozglue.dll.12.drString found in binary or memory: http://ocsp.thawte.com0
            Source: nssckbi.dll.12.drString found in binary or memory: http://policy.camerfirma.com0
            Source: nssckbi.dll.12.drString found in binary or memory: http://repository.swisssign.com/0
            Source: mozglue.dll.12.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
            Source: mozglue.dll.12.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
            Source: mozglue.dll.12.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.accv.es00
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.certicamara.com/dpc/0Z
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.chambersign.org1
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.firmaprofesional.com/cps0
            Source: mozglue.dll.12.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
            Source: mozglue.dll.12.drString found in binary or memory: http://www.mozilla.com0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.quovadis.bm0
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.quovadisglobal.com/cps0
            Source: sqlite3.dll.12.drString found in binary or memory: http://www.sqlite.org/copyright.html.
            Source: nssckbi.dll.12.drString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1EVgv79jm2Kha80e4t5kPPRtQGH8glBYc
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: nssckbi.dll.12.drString found in binary or memory: https://ocsp.quovadisoffshore.com0
            Source: nssckbi.dll.12.drString found in binary or memory: https://repository.luxtrust.lu0
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: nssckbi.dll.12.drString found in binary or memory: https://www.catcert.net/verarrel
            Source: nssckbi.dll.12.drString found in binary or memory: https://www.catcert.net/verarrel05
            Source: mozglue.dll.12.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
            Source: unknownHTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.4:49760 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 195.201.225.248:443 -> 192.168.2.4:49761 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 195.123.215.115:443 -> 192.168.2.4:49762 version: TLS 1.2
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040D548 OpenClipboard,

            E-Banking Fraud:

            barindex
            Yara detected Raccoon StealerShow sources
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552, type: MEMORY
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A4E08 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A528C NtResumeThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1F10 NtSetInformationThread,NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A03F5 EnumWindows,NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A300B NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A2018 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A22BC NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A5295 NtResumeThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A10FF NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A0EF7 NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A04C9 NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A5336 NtResumeThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A5501 NtResumeThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A0D5E NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A51EB NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A53F2 NtResumeThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A11CB NtSetInformationThread,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00403E7A
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040445A
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404C77
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404015
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404839
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004044C9
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004040F0
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404081
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004048AA
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040415D
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404915
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404538
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004041C0
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004049F8
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404987
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004045B2
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404A65
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040461C
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404230
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00403EC3
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404AC5
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004046EA
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040468B
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004042A4
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404753
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040430C
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404B27
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004047C4
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004043E8
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404380
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00403FA7
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0EBD8F
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0F5F1F
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0F0229
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: String function: 6D0E90E5 appears 41 times
            Source: sqlite3.dll.12.drStatic PE information: Number of sections : 18 > 10
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 00000000.00000002.782935706.0000000000414000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEleciv.exe vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880896126.0000000066A10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000000.778555254.0000000000414000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEleciv.exe vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880816092.000000001E040000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880785480.000000001DDB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881189819.000000006D23B000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamenss3.dll8 vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880770161.000000001DC60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881060024.000000006D102000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamemozglue.dll8 vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880822923.000000001E050000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exeBinary or memory string: OriginalFilenameEleciv.exe vs Anmodning om tilbud 12-04-2021#U00b7pdf.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/67@3/3
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0EADB0 GetLastError,FormatMessageA,__acrt_iob_func,__acrt_iob_func,fflush,LocalFree,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\sqlite3.dllJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6500:120:WilError_01
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeMutant created: \Sessions\1\BaseNamedObjects\uiabfqwfuuser
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\Temp\~DF57257DC25578F538.TMPJump to behavior
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: softokn3.dll.12.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, sqlite3.dll.12.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: softokn3.dll.12.drBinary or memory string: SELECT ALL %s FROM %s WHERE id=$ID;
            Source: softokn3.dll.12.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, sqlite3.dll.12.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);docid INTEGER PRIMARY KEY%z, 'c%d%q'%z, langidCREATE TABLE %Q.'%q_content'(%s)CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);<
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, sqlite3.dll.12.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, sqlite3.dll.12.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
            Source: softokn3.dll.12.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
            Source: softokn3.dll.12.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
            Source: softokn3.dll.12.drBinary or memory string: SELECT ALL id FROM %s WHERE %s;
            Source: softokn3.dll.12.drBinary or memory string: SELECT ALL id FROM %s;
            Source: softokn3.dll.12.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
            Source: sqlite3.dll.12.drBinary or memory string: UPDATE %Q.%s SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
            Source: softokn3.dll.12.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, sqlite3.dll.12.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
            Source: softokn3.dll.12.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);/overflow%s%.3x+%.6x%s%.3x/internalleafcorruptedno such schema: %sSELECT 'sqlite_master' AS name, 1 AS rootpage, 'table' AS type UNION ALL SELECT name, rootpage, type FROM "%w".%s WHERE rootpage!=0 ORDER BY namedbstat2018-01-22 18:45:57 0c55d179733b46d8d0ba4d88e01a25e10677046ee3da1d5b1581e86726f2171d:
            Source: sqlite3.dll.12.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
            Source: unknownProcess created: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess created: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /T 10 /NOBREAK
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess created: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /T 10 /NOBREAK
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: freebl3.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\gfx\angle\targets\libEGL\libEGL.pdb source: libEGL.dll.12.dr
            Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: api-ms-win-crt-locale-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: api-ms-win-crt-runtime-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libprldap\prldap60.pdb source: prldap60.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\interfaces\ia2\IA2Marshal.pdb source: IA2Marshal.dll.12.dr
            Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: api-ms-win-core-file-l1-2-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss3.pdb source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881153656.000000006D200000.00000002.00020000.sdmp, nss3.dll.12.dr
            Source: Binary string: ucrtbase.pdb source: ucrtbase.dll.12.dr
            Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: api-ms-win-core-memory-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: api-ms-win-core-sysinfo-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libldap\ldap60.pdb source: ldap60.dll.12.dr
            Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: api-ms-win-crt-filesystem-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: api-ms-win-crt-stdio-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: api-ms-win-core-heap-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: api-ms-win-core-util-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: api-ms-win-core-synch-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: api-ms-win-crt-environment-l1-1-0.dll.12.dr
            Source: Binary string: vcruntime140.i386.pdbGCTL source: vcruntime140.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: softokn3.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\ckfw\builtins\builtins_nssckbi\nssckbi.pdb source: nssckbi.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\mozglue\build\mozglue.pdb22! source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881046456.000000006D0F9000.00000002.00020000.sdmp, mozglue.dll.12.dr
            Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: api-ms-win-core-processthreads-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: freebl3.dll.12.dr
            Source: Binary string: api-ms-win-crt-private-l1-1-0.pdb source: api-ms-win-crt-private-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: api-ms-win-crt-convert-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\ipc\win\handler\AccessibleHandler.pdb source: AccessibleHandler.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb-- source: nssdbm3.dll.12.dr
            Source: Binary string: msvcp140.i386.pdb source: msvcp140.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\mailnews\mapi\mapihook\build\MapiProxy.pdb source: MapiProxy_InUse.dll.12.dr
            Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: api-ms-win-core-profile-l1-1-0.dll.12.dr
            Source: Binary string: ucrtbase.pdbUGP source: ucrtbase.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libldap\ldap60.pdbUU source: ldap60.dll.12.dr
            Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: api-ms-win-crt-time-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\ckfw\builtins\builtins_nssckbi\nssckbi.pdb66 source: nssckbi.dll.12.dr
            Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: api-ms-win-core-handle-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: api-ms-win-core-synch-l1-2-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: softokn3.dll.12.dr
            Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: api-ms-win-core-processenvironment-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\interfaces\ia2\IA2Marshal.pdb<< source: IA2Marshal.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\mozglue\build\mozglue.pdb source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.881046456.000000006D0F9000.00000002.00020000.sdmp, mozglue.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\toolkit\library\dummydll\qipcap.pdb source: qipcap.dll.12.dr
            Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: api-ms-win-crt-conio-l1-1-0.dll.12.dr
            Source: Binary string: ms-win-core-memory-l1-1-0.pdb source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880884389.000000006698B000.00000004.00000001.sdmp
            Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: api-ms-win-crt-math-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: api-ms-win-core-localization-l1-2-0.dll.12.dr
            Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: api-ms-win-core-processthreads-l1-1-1.dll.12.dr
            Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: api-ms-win-core-namedpipe-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-multibyte-l1-1-0.pdb source: api-ms-win-crt-multibyte-l1-1-0.dll.12.dr
            Source: Binary string: vcruntime140.i386.pdb source: vcruntime140.dll.12.dr
            Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: api-ms-win-crt-utility-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\mailnews\mapi\mapiDLL\mozMapi32.pdb source: mozMapi32.dll.12.dr
            Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: api-ms-win-core-rtlsupport-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: api-ms-win-core-timezone-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: api-ms-win-core-string-l1-1-0.dll.12.dr
            Source: Binary string: msvcp140.i386.pdbGCTL source: msvcp140.dll.12.dr
            Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: api-ms-win-core-file-l2-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: api-ms-win-crt-process-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: api-ms-win-core-libraryloader-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\config\external\lgpllibs\lgpllibs.pdb source: lgpllibs.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\comm\ldap\c-sdk\libraries\libldif\ldif60.pdb source: ldif60.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\accessible\interfaces\msaa\AccessibleMarshal.pdb source: AccessibleMarshal.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\security\nss\lib\softoken\legacydb\legacydb_nssdbm3\nssdbm3.pdb source: nssdbm3.dll.12.dr
            Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: api-ms-win-core-interlocked-l1-1-0.dll.12.dr
            Source: Binary string: z:\task_1552562425\build\src\obj-thunderbird\toolkit\crashreporter\injector\breakpadinjector.pdb source: breakpadinjector.dll.12.dr
            Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: api-ms-win-crt-heap-l1-1-0.dll.12.dr
            Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: api-ms-win-crt-string-l1-1-0.dll.12.dr

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 6976, type: MEMORY
            Yara detected VB6 Downloader GenericShow sources
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 6976, type: MEMORY
            Source: sqlite3.dll.12.drStatic PE information: section name: /4
            Source: sqlite3.dll.12.drStatic PE information: section name: /19
            Source: sqlite3.dll.12.drStatic PE information: section name: /31
            Source: sqlite3.dll.12.drStatic PE information: section name: /45
            Source: sqlite3.dll.12.drStatic PE information: section name: /57
            Source: sqlite3.dll.12.drStatic PE information: section name: /70
            Source: sqlite3.dll.12.drStatic PE information: section name: /81
            Source: sqlite3.dll.12.drStatic PE information: section name: /92
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040F534 push dword ptr [ebp-08h]; ret
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404012 push esp; iretd
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040A680 push ds; iretd
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A34E1 push 8B792066h; iretd
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A55C0 pushad ; retf
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A55C5 pushad ; retf
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A55C5 push F7668EB2h; retn 2878h
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0F8646 push ecx; ret
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssdbm3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\freebl3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\sqlite3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\softokn3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldap60.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\vcruntime140.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-private-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ucrtbase.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-multibyte-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\qipcap.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\lgpllibs.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32_InUse.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldif60.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\prldap60.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-string-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozglue.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nss3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\breakpadinjector.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-util-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssckbi.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\msvcp140.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile created: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\libEGL.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\timeout.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\timeout.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1490
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1A95 LoadLibraryA,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1375
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A13B6 LoadLibraryA,
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A453B second address: 00000000022A453B instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F0BED037528h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test bl, bl 0x0000001f test ch, bh 0x00000021 add edi, edx 0x00000023 test dh, 00000019h 0x00000026 dec dword ptr [ebp+000000F8h] 0x0000002c cmp dword ptr [ebp+000000F8h], 00000000h 0x00000033 jne 00007F0BED037503h 0x00000035 test bl, cl 0x00000037 call 00007F0BED037548h 0x0000003c call 00007F0BED037538h 0x00000041 lfence 0x00000044 mov edx, dword ptr [7FFE0014h] 0x0000004a lfence 0x0000004d ret 0x0000004e mov esi, edx 0x00000050 pushad 0x00000051 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A4B5A second address: 00000000022A4B5A instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a inc ebx 0x0000000b cmp ebx, eax 0x0000000d je 00007F0BED03762Fh 0x00000013 cmp byte ptr [ebx], FFFFFFB8h 0x00000016 jne 00007F0BED037509h 0x00000018 pushad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A4BFD second address: 00000000022A4BFD instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a inc ebx 0x0000000b cmp byte ptr [ebx], FFFFFFC2h 0x0000000e jne 00007F0BED03A931h 0x00000010 pushad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A295B second address: 00000000022A2998 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pop dword ptr [ebp+0000012Ch] 0x00000010 cmp al, 21h 0x00000012 mov dword ptr [ebp+68h], 00000000h 0x00000019 jmp 00007F0BED038045h 0x0000001e call 00007F0BED036A02h 0x00000023 pop dword ptr [ebp+64h] 0x00000026 cmp dh, bh 0x00000028 jmp 00007F0BED037DB2h 0x0000002d call 00007F0BED036C93h 0x00000032 cmp cl, 00000003h 0x00000035 pop dword ptr [ebp+6Ch] 0x00000038 mov dword ptr [ebp+70h], 00000000h 0x0000003f pushad 0x00000040 mov edi, 00000003h 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A29B4 second address: 00000000022A29B4 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 0000000000561805 second address: 0000000000561805 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000005618F8 second address: 00000000005618F8 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 0000000000561A99 second address: 0000000000561A99 instructions:
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A453B second address: 00000000022A453B instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F0BED037528h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test bl, bl 0x0000001f test ch, bh 0x00000021 add edi, edx 0x00000023 test dh, 00000019h 0x00000026 dec dword ptr [ebp+000000F8h] 0x0000002c cmp dword ptr [ebp+000000F8h], 00000000h 0x00000033 jne 00007F0BED037503h 0x00000035 test bl, cl 0x00000037 call 00007F0BED037548h 0x0000003c call 00007F0BED037538h 0x00000041 lfence 0x00000044 mov edx, dword ptr [7FFE0014h] 0x0000004a lfence 0x0000004d ret 0x0000004e mov esi, edx 0x00000050 pushad 0x00000051 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A455B second address: 00000000022A455B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F0BED03AD3Ah 0x0000001d popad 0x0000001e call 00007F0BED03AA51h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A4B5A second address: 00000000022A4B5A instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a inc ebx 0x0000000b cmp ebx, eax 0x0000000d je 00007F0BED03762Fh 0x00000013 cmp byte ptr [ebx], FFFFFFB8h 0x00000016 jne 00007F0BED037509h 0x00000018 pushad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A4BFD second address: 00000000022A4BFD instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a inc ebx 0x0000000b cmp byte ptr [ebx], FFFFFFC2h 0x0000000e jne 00007F0BED03A931h 0x00000010 pushad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A295B second address: 00000000022A2998 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pop dword ptr [ebp+0000012Ch] 0x00000010 cmp al, 21h 0x00000012 mov dword ptr [ebp+68h], 00000000h 0x00000019 jmp 00007F0BED038045h 0x0000001e call 00007F0BED036A02h 0x00000023 pop dword ptr [ebp+64h] 0x00000026 cmp dh, bh 0x00000028 jmp 00007F0BED037DB2h 0x0000002d call 00007F0BED036C93h 0x00000032 cmp cl, 00000003h 0x00000035 pop dword ptr [ebp+6Ch] 0x00000038 mov dword ptr [ebp+70h], 00000000h 0x0000003f pushad 0x00000040 mov edi, 00000003h 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A2998 second address: 00000000022A29B4 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 mov dword ptr [ebp+74h], 00000000h 0x0000000a mov dword ptr [ebp+000000ACh], 0008F400h 0x00000014 mov dword ptr [ebp+7Ch], 00000000h 0x0000001b pushad 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000022A29B4 second address: 00000000022A29B4 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 000000000056455B second address: 000000000056455B instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F0BED03AD3Ah 0x0000001d popad 0x0000001e call 00007F0BED03AA51h 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 0000000000561805 second address: 0000000000561805 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 00000000005618F8 second address: 00000000005618F8 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRDTSC instruction interceptor: First address: 0000000000561A99 second address: 0000000000561A99 instructions:
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A3F21 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssdbm3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\freebl3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\softokn3.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldap60.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-private-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-multibyte-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\qipcap.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\lgpllibs.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32_InUse.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldif60.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\prldap60.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-string-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\breakpadinjector.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-util-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssckbi.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\libEGL.dllJump to dropped file
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeRegistry key enumerated: More than 152 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
            Source: C:\Windows\SysWOW64\timeout.exe TID: 2460Thread sleep count: 77 > 30
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0E199C GetSystemInfo,MapViewOfFile,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\html\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\images\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\_locales\bg\
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.5_0\css\
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880896126.0000000066A10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880896126.0000000066A10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880896126.0000000066A10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000002.880896126.0000000066A10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

            Anti Debugging:

            barindex
            Contains functionality to hide a thread from the debuggerShow sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1F10 NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A3F21 rdtsc
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A29E9 LdrInitializeThunk,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0E308C IsDebuggerPresent,OutputDebugStringA,_dup,_fdopen,__vfprintf_l,fclose,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00403E7A mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404015 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004040F0 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404081 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_0040415D mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_004041C0 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00404230 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00403EC3 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_00403FA7 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1A42 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A1A95 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A3EFE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A4350 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A13B6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A2582 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 0_2_022A49C2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0F7414 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0F84D6 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeProcess created: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /T 10 /NOBREAK
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0E149E cpuid
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeCode function: 12_2_6D0EB95E GetSystemTimeAdjustment,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected Raccoon StealerShow sources
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552, type: MEMORY
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
            Source: C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook

            Remote Access Functionality:

            barindex
            Yara detected Raccoon StealerShow sources
            Source: Yara matchFile source: Process Memory Space: Anmodning om tilbud 12-04-2021#U00b7pdf.exe PID: 4552, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Masquerading1OS Credential Dumping1System Time Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion22LSASS MemorySecurity Software Discovery731Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Local System1Automated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSVirtualization/Sandbox Evasion22Distributed Component Object ModelClipboard Data1Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information3LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery335Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            No Antivirus matches

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dll0%VirustotalBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dll0%VirustotalBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dll0%VirustotalBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dll3%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dll0%VirustotalBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dll0%VirustotalBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dll0%MetadefenderBrowse
            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs

            Unpacked PE Files

            No Antivirus matches

            Domains

            SourceDetectionScannerLabelLink
            telete.in11%VirustotalBrowse
            belochkaneprihoditodna.top0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
            http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
            http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
            http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
            http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
            http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
            http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
            http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
            https://repository.luxtrust.lu00%URL Reputationsafe
            https://repository.luxtrust.lu00%URL Reputationsafe
            https://repository.luxtrust.lu00%URL Reputationsafe
            https://repository.luxtrust.lu00%URL Reputationsafe
            http://ocsp.accv.es00%URL Reputationsafe
            http://ocsp.accv.es00%URL Reputationsafe
            http://ocsp.accv.es00%URL Reputationsafe
            http://ocsp.accv.es00%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            http://ocsp.thawte.com00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
            http://www.mozilla.com00%URL Reputationsafe
            http://www.mozilla.com00%URL Reputationsafe
            http://www.mozilla.com00%URL Reputationsafe
            http://www.mozilla.com00%URL Reputationsafe
            http://www.chambersign.org10%URL Reputationsafe
            http://www.chambersign.org10%URL Reputationsafe
            http://www.chambersign.org10%URL Reputationsafe
            http://www.chambersign.org10%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
            http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
            http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
            http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
            http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
            http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
            https://www.catcert.net/verarrel0%URL Reputationsafe
            https://www.catcert.net/verarrel0%URL Reputationsafe
            https://www.catcert.net/verarrel0%URL Reputationsafe
            https://www.catcert.net/verarrel0%URL Reputationsafe
            http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
            http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
            http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
            http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
            http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
            http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
            http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
            http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
            http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
            https://www.catcert.net/verarrel050%URL Reputationsafe
            https://www.catcert.net/verarrel050%URL Reputationsafe
            https://www.catcert.net/verarrel050%URL Reputationsafe
            https://www.catcert.net/verarrel050%URL Reputationsafe
            http://www.quovadis.bm00%URL Reputationsafe
            http://www.quovadis.bm00%URL Reputationsafe
            http://www.quovadis.bm00%URL Reputationsafe
            http://www.quovadis.bm00%URL Reputationsafe
            http://www.accv.es000%URL Reputationsafe
            http://www.accv.es000%URL Reputationsafe
            http://www.accv.es000%URL Reputationsafe
            http://www.accv.es000%URL Reputationsafe
            https://ocsp.quovadisoffshore.com00%URL Reputationsafe
            https://ocsp.quovadisoffshore.com00%URL Reputationsafe
            https://ocsp.quovadisoffshore.com00%URL Reputationsafe
            https://ocsp.quovadisoffshore.com00%URL Reputationsafe
            http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
            http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
            http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
            http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersignroot.html00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersignroot.html00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersignroot.html00%URL Reputationsafe
            http://cps.chambersign.org/cps/chambersignroot.html00%URL Reputationsafe
            http://policy.camerfirma.com00%URL Reputationsafe
            http://policy.camerfirma.com00%URL Reputationsafe
            http://policy.camerfirma.com00%URL Reputationsafe
            http://policy.camerfirma.com00%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            telete.in
            195.201.225.248
            truetrueunknown
            googlehosted.l.googleusercontent.com
            216.58.215.225
            truefalse
              high
              belochkaneprihoditodna.top
              195.123.215.115
              truefalseunknown
              doc-00-7g-docs.googleusercontent.com
              unknown
              unknownfalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://duckduckgo.com/chrome_newtabAnmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                  high
                  http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0nssckbi.dll.12.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://fedir.comsign.co.il/crl/ComSignCA.crl0nssckbi.dll.12.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.mozilla.com/en-US/blocklist/mozglue.dll.12.drfalse
                    high
                    https://duckduckgo.com/ac/?q=Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                      high
                      http://crl.chambersign.org/chambersroot.crl0nssckbi.dll.12.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.accv.es/legislacion_c.htm0Unssckbi.dll.12.drfalse
                        high
                        http://www.certicamara.com/dpc/0Znssckbi.dll.12.drfalse
                          high
                          https://repository.luxtrust.lu0nssckbi.dll.12.drfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://ocsp.accv.es0nssckbi.dll.12.drfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://ocsp.thawte.com0mozglue.dll.12.drfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://cps.chambersign.org/cps/chambersroot.html0nssckbi.dll.12.drfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.mozilla.com0mozglue.dll.12.drfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.chambersign.org1nssckbi.dll.12.drfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                            high
                            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0nssckbi.dll.12.drfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.firmaprofesional.com/cps0nssckbi.dll.12.drfalse
                              high
                              http://www.diginotar.nl/cps/pkioverheid0nssckbi.dll.12.drfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://repository.swisssign.com/0nssckbi.dll.12.drfalse
                                high
                                https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchAnmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                                  high
                                  http://crl.securetrust.com/SGCA.crl0nssckbi.dll.12.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://crl.securetrust.com/STCA.crl0nssckbi.dll.12.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlnssckbi.dll.12.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://ac.ecosia.org/autocomplete?q=Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                                    high
                                    https://www.catcert.net/verarrelnssckbi.dll.12.drfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.thawte.com/ThawteTimestampingCA.crl0mozglue.dll.12.drfalse
                                      high
                                      http://www.certplus.com/CRL/class2.crl0nssckbi.dll.12.drfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0nssckbi.dll.12.drfalse
                                        high
                                        http://www.quovadisglobal.com/cps0nssckbi.dll.12.drfalse
                                          high
                                          http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0nssckbi.dll.12.drfalse
                                            high
                                            http://crl.chambersign.org/chambersignroot.crl0nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://crl.xrampsecurity.com/XGCA.crl0nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://www.catcert.net/verarrel05nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.quovadis.bm0nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.accv.es00nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://ocsp.quovadisoffshore.com0nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.pkioverheid.nl/policies/root-policy-G20nssckbi.dll.12.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.cert.fnmt.es/dpcs/0nssckbi.dll.12.drfalse
                                              high
                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                                                high
                                                http://cps.chambersign.org/cps/chambersignroot.html0nssckbi.dll.12.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.sqlite.org/copyright.html.sqlite3.dll.12.drfalse
                                                  high
                                                  http://policy.camerfirma.com0nssckbi.dll.12.drfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Anmodning om tilbud 12-04-2021#U00b7pdf.exe, 0000000C.00000003.862159056.0000000066921000.00000004.00000001.sdmp, 1xVPfvJcrg.12.drfalse
                                                    high

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    195.201.225.248
                                                    telete.inGermany
                                                    24940HETZNER-ASDEtrue
                                                    216.58.215.225
                                                    googlehosted.l.googleusercontent.comUnited States
                                                    15169GOOGLEUSfalse
                                                    195.123.215.115
                                                    belochkaneprihoditodna.topBulgaria
                                                    50979ITL-LVfalse

                                                    General Information

                                                    Joe Sandbox Version:31.0.0 Emerald
                                                    Analysis ID:385424
                                                    Start date:12.04.2021
                                                    Start time:13:44:12
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 7m 48s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:22
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@8/67@3/3
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 75.3% (good quality ratio 60.3%)
                                                    • Quality average: 60.8%
                                                    • Quality standard deviation: 38%
                                                    HCA Information:
                                                    • Successful, ratio: 76%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    • Override analysis time to 240s for sample files taking high CPU consumption
                                                    • Stop behavior analysis, all processes terminated
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
                                                    • TCP Packets have been reduced to 100
                                                    • Excluded IPs from analysis (whitelisted): 104.43.193.48, 92.122.145.220, 52.147.198.201, 13.64.90.137, 40.88.32.150, 13.88.21.125, 168.61.161.212, 20.82.210.154, 205.185.216.42, 205.185.216.10, 92.122.213.194, 92.122.213.247, 104.43.139.144, 216.58.215.238, 20.54.26.129
                                                    • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, drive.google.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    No simulations

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    195.201.225.248http://telete.inGet hashmaliciousBrowse
                                                    • telete.in/
                                                    195.123.215.115setup - 2021-04-09T114140.132.exeGet hashmaliciousBrowse
                                                    • gclean.in/decision.php?pub=mixruzki
                                                    setup(1).exeGet hashmaliciousBrowse
                                                    • gclean.in/decision.php?pub=mixnull

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    telete.inR496CkgPqa.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    qTlPus8IDT.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    phantom.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    C++ Dropper.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    rGnw6yNeQi.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    tdGFhgEQeh.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    rnd382WXs3.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.19715.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    toolspab2.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    gePWRo7op0.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    u0r63PfgIe.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    bCHfpHFeTj.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.19239.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    OpPemC578S.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SOLICITUD DE PRESUPUESTO 08-04-2021#U00b7pdf.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    vgUgvbLjyI.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware2.22480.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.16239.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.23167.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    40JHtWiswn.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    ITL-LVR496CkgPqa.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    qTlPus8IDT.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    phantom.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    output(1).exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    setup - 2021-04-09T114140.132.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    C++ Dropper.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    setup(1).exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    Tmd7W7qwQw.dllGet hashmaliciousBrowse
                                                    • 195.123.214.44
                                                    9R5WtLGEAy.dllGet hashmaliciousBrowse
                                                    • 195.123.214.44
                                                    SecuriteInfo.com.W32.AIDetect.malware1.19239.exeGet hashmaliciousBrowse
                                                    • 195.123.215.67
                                                    61444453825_03222021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.231
                                                    61444453825_03222021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.231
                                                    7728839942-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.248
                                                    7728839942-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.248
                                                    7728839942-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.248
                                                    9642351931-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.186
                                                    91844756223-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.186
                                                    9497306271-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.186
                                                    7122681326-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.248
                                                    9497306271-04012021.xlsmGet hashmaliciousBrowse
                                                    • 195.123.210.186
                                                    HETZNER-ASDESecuriteInfo.com.Trojan.Packed.24465.17731.exeGet hashmaliciousBrowse
                                                    • 148.251.48.16
                                                    SecuriteInfo.com.Trojan.Packed.24465.12290.exeGet hashmaliciousBrowse
                                                    • 148.251.48.16
                                                    SecuriteInfo.com.Trojan.Packed.24465.2847.exeGet hashmaliciousBrowse
                                                    • 148.251.48.16
                                                    Bank Details.xlsxGet hashmaliciousBrowse
                                                    • 144.76.242.196
                                                    R496CkgPqa.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    qTlPus8IDT.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    phantom.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    output(1).exeGet hashmaliciousBrowse
                                                    • 95.216.186.40
                                                    C++ Dropper.exeGet hashmaliciousBrowse
                                                    • 88.99.66.31
                                                    rGnw6yNeQi.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    89BA6CA01979A51DD5E8FEE7D80E8D69322531BA35775.exeGet hashmaliciousBrowse
                                                    • 136.243.104.235
                                                    IJht2pqbVh.exeGet hashmaliciousBrowse
                                                    • 88.99.66.31
                                                    tdGFhgEQeh.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    rnd382WXs3.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.19715.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    toolspab2.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    p96tm6y3yo.exeGet hashmaliciousBrowse
                                                    • 116.203.98.215
                                                    gePWRo7op0.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    u0r63PfgIe.exeGet hashmaliciousBrowse
                                                    • 195.201.225.248
                                                    rRobw1VVRP.exeGet hashmaliciousBrowse
                                                    • 116.203.98.109

                                                    JA3 Fingerprints

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    ce5f3254611a8c095a3d821d44539877my_attach_00968.vbsGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    R496CkgPqa.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    qTlPus8IDT.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    phantom.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    output(1).exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    ie6BqkZVg8.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    rGnw6yNeQi.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    job_documentation_11733.vbsGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    tdGFhgEQeh.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    rnd382WXs3.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    782kQ15aYm.dllGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.19715.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    gePWRo7op0.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    u0r63PfgIe.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    bCHfpHFeTj.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    ghnrope2.dllGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    mapdata.dllGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    naps.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    SecuriteInfo.com.W32.AIDetect.malware1.19239.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    OpPemC578S.exeGet hashmaliciousBrowse
                                                    • 195.123.215.115
                                                    • 195.201.225.248
                                                    37f463bf4616ecd445d4a1937da06e19V3kT2daGkz.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    faktura.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    PaymentCopy.vbsGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    PO NUMBER 3120386 3120393 SIGNED.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    RemitSwift119353 xlsx.htmGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    os9TZxfmTZ.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    SWIFT Payment Advise 39 430-25.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    malevolo.ps1Get hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    shipping document.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    Statement-ID261179932209970.vbsGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    Alexandra38.docxGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    rRobw1VVRP.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    Tmd7W7qwQw.dllGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    SecuriteInfo.com.Trojan.Agent.FFIJ.17175.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    documents-351331057.xlsmGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    documents-1819557117.xlsmGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    mail_6512365134_7863_202104108.htmlGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    Copia bancaria de swift.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    SecuriteInfo.com.Trojan.GenericKD.36659493.29456.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225
                                                    SecuriteInfo.com.Trojan.Siggen12.64197.30705.exeGet hashmaliciousBrowse
                                                    • 216.58.215.225

                                                    Dropped Files

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dllR496CkgPqa.exeGet hashmaliciousBrowse
                                                      qTlPus8IDT.exeGet hashmaliciousBrowse
                                                        phantom.exeGet hashmaliciousBrowse
                                                          output(1).exeGet hashmaliciousBrowse
                                                            C++ Dropper.exeGet hashmaliciousBrowse
                                                              rGnw6yNeQi.exeGet hashmaliciousBrowse
                                                                tdGFhgEQeh.exeGet hashmaliciousBrowse
                                                                  rnd382WXs3.exeGet hashmaliciousBrowse
                                                                    SecuriteInfo.com.W32.AIDetect.malware1.19715.exeGet hashmaliciousBrowse
                                                                      toolspab2.exeGet hashmaliciousBrowse
                                                                        gePWRo7op0.exeGet hashmaliciousBrowse
                                                                          u0r63PfgIe.exeGet hashmaliciousBrowse
                                                                            bCHfpHFeTj.exeGet hashmaliciousBrowse
                                                                              SecuriteInfo.com.W32.AIDetect.malware1.19239.exeGet hashmaliciousBrowse
                                                                                OpPemC578S.exeGet hashmaliciousBrowse
                                                                                  SOLICITUD DE PRESUPUESTO 08-04-2021#U00b7pdf.exeGet hashmaliciousBrowse
                                                                                    vgUgvbLjyI.exeGet hashmaliciousBrowse
                                                                                      SecuriteInfo.com.W32.AIDetect.malware2.22480.exeGet hashmaliciousBrowse
                                                                                        SecuriteInfo.com.W32.AIDetect.malware1.16239.exeGet hashmaliciousBrowse
                                                                                          SecuriteInfo.com.W32.AIDetect.malware1.23167.exeGet hashmaliciousBrowse

                                                                                            Created / dropped Files

                                                                                            C:\Users\user\AppData\LocalLow\1xVPfvJcrg
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):73728
                                                                                            Entropy (8bit):1.1874185457069584
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                            MD5:72A43D390E478BA9664F03951692D109
                                                                                            SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                            SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                            SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                            Malicious:false
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\RYwTiizs2t
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):73728
                                                                                            Entropy (8bit):1.1874185457069584
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                                                                            MD5:72A43D390E478BA9664F03951692D109
                                                                                            SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                                                                            SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                                                                            SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                                                                            Malicious:false
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\frAQBc8Wsa
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):40960
                                                                                            Entropy (8bit):0.792852251086831
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                                                            MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                                                            SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                                                            SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                                                            SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                                                            Malicious:false
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleHandler.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):123344
                                                                                            Entropy (8bit):6.504957642040826
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:DkO/6RZFrpiS7ewflNGa35iOrjmwWTYP1KxBxZJByEJMBrsuLeLsWxcdaocACs0K:biRZFdBiussQ1MBjq2aocts03/7FE
                                                                                            MD5:F92586E9CC1F12223B7EEB1A8CD4323C
                                                                                            SHA1:F5EB4AB2508F27613F4D85D798FA793BB0BD04B0
                                                                                            SHA-256:A1A2BB03A7CFCEA8944845A8FC12974482F44B44FD20BE73298FFD630F65D8D0
                                                                                            SHA-512:5C047AB885A8ACCB604E58C1806C82474DC43E1F997B267F90C68A078CB63EE78A93D1496E6DD4F5A72FDF246F40EF19CE5CA0D0296BBCFCFA964E4921E68A2F
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: R496CkgPqa.exe, Detection: malicious, Browse
                                                                                            • Filename: qTlPus8IDT.exe, Detection: malicious, Browse
                                                                                            • Filename: phantom.exe, Detection: malicious, Browse
                                                                                            • Filename: output(1).exe, Detection: malicious, Browse
                                                                                            • Filename: C++ Dropper.exe, Detection: malicious, Browse
                                                                                            • Filename: rGnw6yNeQi.exe, Detection: malicious, Browse
                                                                                            • Filename: tdGFhgEQeh.exe, Detection: malicious, Browse
                                                                                            • Filename: rnd382WXs3.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.W32.AIDetect.malware1.19715.exe, Detection: malicious, Browse
                                                                                            • Filename: toolspab2.exe, Detection: malicious, Browse
                                                                                            • Filename: gePWRo7op0.exe, Detection: malicious, Browse
                                                                                            • Filename: u0r63PfgIe.exe, Detection: malicious, Browse
                                                                                            • Filename: bCHfpHFeTj.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.W32.AIDetect.malware1.19239.exe, Detection: malicious, Browse
                                                                                            • Filename: OpPemC578S.exe, Detection: malicious, Browse
                                                                                            • Filename: SOLICITUD DE PRESUPUESTO 08-04-2021#U00b7pdf.exe, Detection: malicious, Browse
                                                                                            • Filename: vgUgvbLjyI.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.W32.AIDetect.malware2.22480.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.W32.AIDetect.malware1.16239.exe, Detection: malicious, Browse
                                                                                            • Filename: SecuriteInfo.com.W32.AIDetect.malware1.23167.exe, Detection: malicious, Browse
                                                                                            Reputation:moderate, very likely benign file
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y.Z.............x.......x.......x......=z......=z......=z.......x.......x..........z.../{....../{....../{....../{b...../{......Rich............PE..L...C@.\.........."!.................b.......0......................................~p....@.................................p...........h...........................0...T................... ...........@............0..$............................text...7........................... ..`.orpc........ ...................... ..`.rdata...y...0...z..................@..@.data...............................@....rsrc...h...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\AccessibleMarshal.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):26064
                                                                                            Entropy (8bit):5.981632010321345
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:KuAjyb0Xc6JzVuLoW2XDOc3TXg1hjsvDG8A3OPLon07zS:BEygs6RV6oW2Xd38njiDG8Mj
                                                                                            MD5:A7FABF3DCE008915CEE4FFC338FA1CE6
                                                                                            SHA1:F411FB41181C79FBA0516D5674D07444E98E7C92
                                                                                            SHA-256:D368EB240106F87188C4F2AE30DB793A2D250D9344F0E0267D4F6A58E68152AD
                                                                                            SHA-512:3D2935D02D1A2756AAD7060C47DC7CABBA820CC9977957605CE9BBB44222289CBC451AD331F408317CF01A1A4D3CF8D9CFC666C4E6B4DB9DDD404C7629CEAA70
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Reputation:moderate, very likely benign file
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S......U...U...U...U...U..T...U..T...U..T...U..T...U5.T...U...U!..U..T...U..T...U...U...U..T...URich...U........PE..L...<@.\.........."!.........8......0........0.......................................7....@..........................=......0>..x....`...............H..........<...09..T............................9..@............0...............................text...f........................... ..`.orpc........ ...................... ..`.rdata.......0......................@..@.data...@....P.......(..............@....rsrc........`.......*..............@..@.reloc..<............D..............@..B........................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\IA2Marshal.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):70608
                                                                                            Entropy (8bit):5.389701090881864
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:3n8PHF564hn4wva3AVqH5PmE0SjA6QM0avrDG8MR43:38th4wvaQVE5PRl0xs
                                                                                            MD5:5243F66EF4595D9D8902069EED8777E2
                                                                                            SHA1:1FB7F82CD5F1376C5378CD88F853727AB1CC439E
                                                                                            SHA-256:621F38BD19F62C9CE6826D492ECDF710C00BBDCF1FB4E4815883F29F1431DFDA
                                                                                            SHA-512:A6AB96D73E326C7EEF75560907571AE9CAA70BA9614EB56284B863503AF53C78B991B809C0C8BAE3BCE99142018F59D42DD4BCD41376D0A30D9932BCFCAEE57A
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            • Antivirus: Metadefender, Detection: 3%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........~.....K...K...K.g.K...K4}.J...K4}.J...K4}.J...K4}.J...K...J...K...J...K...K...K&|.J...K&|.J...K&|uK...K&|.J...KRich...K........PE..L...J@.\.........."!.................$.......0...............................0............@.........................0z.......z...........v................... .......u..T...........................Hv..@............0...............................orpc...t........................... ..`.text........ ...................... ..`.rdata...Q...0...R..................@..@.data................j..............@....rsrc....v.......x...t..............@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19920
                                                                                            Entropy (8bit):6.2121285323374185
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:Y0GKgKt7QXmFJNauBT5+BjdvDG8A3OPLon6nt:aKgWc2FnnTOVDG8MSt
                                                                                            MD5:7CD244C3FC13C90487127B8D82F0B264
                                                                                            SHA1:09E1AD17F1BB3D20BD8C1F62A10569F19E838834
                                                                                            SHA-256:BCFB0E397DF40ABA8C8C5DD23C13C414345DECDD3D4B2DF946226BE97DEFBF30
                                                                                            SHA-512:C6319BB3D6CB4CABF96BD1EADB8C46A3901498AC0EB789D73867710B0D855AB28603A00647A9CF4D2F223D35ADB2CB71AB22C284EF18823BFF88D87CF31FD13D
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9...X...X...X... J..X...:...X...:...X...:...X...:...X...8...X...X...X...;...X...;...X...;&..X...;...X..Rich.X..........................PE..L....=.\.........."!................@........0............................................@.........................0:.......:..d....`..p............0.......p.......5..T...........................86..@............0...............................text...v........................... ..`.orpc...<.... ...................... ..`.rdata..r....0......................@..@.data........P.......&..............@....rsrc...p....`.......(..............@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\MapiProxy_InUse.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19920
                                                                                            Entropy (8bit):6.2121285323374185
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:Y0GKgKt7QXmFJNauBT5+BjdvDG8A3OPLon6nt:aKgWc2FnnTOVDG8MSt
                                                                                            MD5:7CD244C3FC13C90487127B8D82F0B264
                                                                                            SHA1:09E1AD17F1BB3D20BD8C1F62A10569F19E838834
                                                                                            SHA-256:BCFB0E397DF40ABA8C8C5DD23C13C414345DECDD3D4B2DF946226BE97DEFBF30
                                                                                            SHA-512:C6319BB3D6CB4CABF96BD1EADB8C46A3901498AC0EB789D73867710B0D855AB28603A00647A9CF4D2F223D35ADB2CB71AB22C284EF18823BFF88D87CF31FD13D
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9...X...X...X... J..X...:...X...:...X...:...X...:...X...8...X...X...X...;...X...;...X...;&..X...;...X..Rich.X..........................PE..L....=.\.........."!................@........0............................................@.........................0:.......:..d....`..p............0.......p.......5..T...........................86..@............0...............................text...v........................... ..`.orpc...<.... ...................... ..`.rdata..r....0......................@..@.data........P.......&..............@....rsrc...p....`.......(..............@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l1-2-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.112057846012794
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:IWIghWGJnWdsNtL/123Ouo+Uggs/nGfe4pBjSfcD63QXWh0txKdmVWQ4yW1rwqnh:IWPhWlsnhi00GftpBjnem9lD16PamFP
                                                                                            MD5:E2F648AE40D234A3892E1455B4DBBE05
                                                                                            SHA1:D9D750E828B629CFB7B402A3442947545D8D781B
                                                                                            SHA-256:C8C499B012D0D63B7AFC8B4CA42D6D996B2FCF2E8B5F94CACFBEC9E6F33E8A03
                                                                                            SHA-512:18D4E7A804813D9376427E12DAA444167129277E5FF30502A0FA29A96884BF902B43A5F0E6841EA1582981971843A4F7F928F8AECAC693904AB20CA40EE4E954
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...._.L...........!......................... ...............................0............@.............................L............ ..................8=..............T............................................................................text...<........................... ..`.rsrc........ ......................@..@....._.L........8...T...T........_.L........d................_.L....................RSDS........g"Y........api-ms-win-core-file-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg.......L....edata... ..`....rsrc$01....` .......rsrc$02........._.L....@...................(...8...l...............`.......................api-ms-win-core-file-l1-2-0.dll.CreateFile2.kernel32.CreateFile2.GetTempPathW.kernel32.GetTempPathW.GetVolumeNameForVolumeMountPointW.kernel32.GetVolumeNameForVolumeMou
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-file-l2-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.166618249693435
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:BZwWIghWG4U9ydsNtL/123Ouo+Uggs/nGfe4pBjSbUGHvNWh0txKdmVWQ4CWVU9h:UWPhWFBsnhi00GftpBjKvxemPlP55QQ7
                                                                                            MD5:E479444BDD4AE4577FD32314A68F5D28
                                                                                            SHA1:77EDF9509A252E886D4DA388BF9C9294D95498EB
                                                                                            SHA-256:C85DC081B1964B77D289AAC43CC64746E7B141D036F248A731601EB98F827719
                                                                                            SHA-512:2AFAB302FE0F7476A4254714575D77B584CD2DC5330B9B25B852CD71267CDA365D280F9AA8D544D4687DC388A2614A51C0418864C41AD389E1E847D81C3AB744
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...4..|...........!......................... ...............................0......t.....@.......................................... ..................8=..............T............................................................................text...}........................... ..`.rsrc........ ......................@..@....4..|........8...T...T.......4..|........d...............4..|....................RSDS.=.Co.P..Gd./%P....api-ms-win-core-file-l2-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02........4..|........................D...p...............#...P...................;...g...................<...m...............%...Z.........................api-ms-win-core-file-l2-1-0.dll.CopyFile2.kernel32.CopyFile2.CopyFileExW.kernel32.CopyFileExW.Crea
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-handle-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.1117101479630005
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:AWPhWXDz6i00GftpBj5FrFaemx+lDbNh/6:hroidkeppp
                                                                                            MD5:6DB54065B33861967B491DD1C8FD8595
                                                                                            SHA1:ED0938BBC0E2A863859AAD64606B8FC4C69B810A
                                                                                            SHA-256:945CC64EE04B1964C1F9FCDC3124DD83973D332F5CFB696CDF128CA5C4CBD0E5
                                                                                            SHA-512:AA6F0BCB760D449A3A82AED67CA0F7FB747CBB82E627210F377AF74E0B43A45BA660E9E3FE1AD4CBD2B46B1127108EC4A96C5CF9DE1BDEC36E993D0657A615B6
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....G...........!......................... ...............................0......V.....@............................._............ ..................8=..............T............................................................................text..._........................... ..`.rsrc........ ......................@..@......G........:...T...T.........G........d.................G....................RSDSQ..{...IS].0.> ....api-ms-win-core-handle-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg......._....edata... ..`....rsrc$01....` .......rsrc$02......................G....Z...............(...<...P...................A...|...............,.............api-ms-win-core-handle-l1-1-0.dll.CloseHandle.kernel32.CloseHandle.CompareObjectHandles.kernel32.CompareObjectHandles.DuplicateHandle.kernel32
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-heap-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.174986589968396
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:GElqWIghWGZi5edXe123Ouo+Uggs/nGfe4pBjS/PHyRWh0txKdmVWQ4GWC2w4Dj3:GElqWPhWCXYi00GftpBjP9emYXlDbNs
                                                                                            MD5:2EA3901D7B50BF6071EC8732371B821C
                                                                                            SHA1:E7BE926F0F7D842271F7EDC7A4989544F4477DA7
                                                                                            SHA-256:44F6DF4280C8ECC9C6E609B1A4BFEE041332D337D84679CFE0D6678CE8F2998A
                                                                                            SHA-512:6BFFAC8E157A913C5660CD2FABD503C09B47D25F9C220DCE8615255C9524E4896EDF76FE2C2CC8BDEF58D9E736F5514A53C8E33D8325476C5F605C2421F15C7D
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....:............!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@......:.........8...T...T.........:.........d.................:.....................RSDS.K....OB;....X......api-ms-win-core-heap-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02..........:.........................X...............2...Q...q.......................C...h...........................(...E...f.......................0..._...z...............................................api-ms-win-core-heap-l1-1-0.dll.GetProcessHeap.k
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-interlocked-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):17856
                                                                                            Entropy (8bit):7.076803035880586
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:DtiYsFWWIghWGQtu7B123Ouo+Uggs/nGfe4pBjSPiZadcbWh0txKdmVWQ4mWf2FN:5iYsFWWPhWUTi00GftpBjremUBNlgC
                                                                                            MD5:D97A1CB141C6806F0101A5ED2673A63D
                                                                                            SHA1:D31A84C1499A9128A8F0EFEA4230FCFA6C9579BE
                                                                                            SHA-256:DECCD75FC3FC2BB31338B6FE26DEFFBD7914C6CD6A907E76FD4931B7D141718C
                                                                                            SHA-512:0E3202041DEF9D2278416B7826C61621DCED6DEE8269507CE5783C193771F6B26D47FEB0700BBE937D8AFF9F7489890B5263D63203B5BA99E0B4099A5699C620
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....$.............!......................... ...............................0...........@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....$..........?...T...T........$..........d................$......................RSDS#.......,.S.6.~j....api-ms-win-core-interlocked-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.................$......................(...T...............L...............!...U...................1.......p...............@...s.................................api-ms-win-core-interlocked-l1-1-0.dll.InitializeSListHead.kernel32.InitializeSLis
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-libraryloader-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18744
                                                                                            Entropy (8bit):7.131154779640255
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:yHvuBL3BmWPhWZTi00GftpBjNKnemenyAlvN9W/L:yWBL3BXYoinKne1yd
                                                                                            MD5:D0873E21721D04E20B6FFB038ACCF2F1
                                                                                            SHA1:9E39E505D80D67B347B19A349A1532746C1F7F88
                                                                                            SHA-256:BB25CCF8694D1FCFCE85A7159DCF6985FDB54728D29B021CB3D14242F65909CE
                                                                                            SHA-512:4B7F2AD9EAD6489E1EA0704CF5F1B1579BAF1061B193D54CC6201FFDDA890A8C8FACB23091DFD851DD70D7922E0C7E95416F623C48EC25137DDD66E32DF9A637
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....u*l...........!......................... ...............................0......9.....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....u*l........A...T...T........u*l........d................u*l....................RSDSU..e.j.(.wD.......api-ms-win-core-libraryloader-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.............u*l....................(...p...........R...}...............*...Y...................8..._.......................B...k...................F...u...............)...P...w...................................................api-ms-win-c
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-localization-l1-2-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):20792
                                                                                            Entropy (8bit):7.089032314841867
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:KOMw3zdp3bwjGjue9/0jCRrndbVWPhWIDz6i00GftpBj6cemjlD16Pa+4r:KOMwBprwjGjue9/0jCRrndbCOoireqv
                                                                                            MD5:EFF11130BFE0D9C90C0026BF2FB219AE
                                                                                            SHA1:CF4C89A6E46090D3D8FEEB9EB697AEA8A26E4088
                                                                                            SHA-256:03AD57C24FF2CF895B5F533F0ECBD10266FD8634C6B9053CC9CB33B814AD5D97
                                                                                            SHA-512:8133FB9F6B92F498413DB3140A80D6624A705F80D9C7AE627DFD48ADEB8C5305A61351BF27BBF02B4D3961F9943E26C55C2A66976251BB61EF1537BC8C212ADD
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...S.v............!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@....S.v.........@...T...T.......S.v.........d...............S.v.....................RSDS..pS...Z4Yr.E@......api-ms-win-core-localization-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02................S.v.....v.......;...;...(.......................<...f.......................5...]...................!...I...q...................N.............../...j.............../...^.................../...\...................8...`...........
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-memory-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18744
                                                                                            Entropy (8bit):7.101895292899441
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:+bZWPhWUsnhi00GftpBjwBemQlD16Par7:b4nhoi6BedH
                                                                                            MD5:D500D9E24F33933956DF0E26F087FD91
                                                                                            SHA1:6C537678AB6CFD6F3EA0DC0F5ABEFD1C4924F0C0
                                                                                            SHA-256:BB33A9E906A5863043753C44F6F8165AFE4D5EDB7E55EFA4C7E6E1ED90778ECA
                                                                                            SHA-512:C89023EB98BF29ADEEBFBCB570427B6DF301DE3D27FF7F4F0A098949F987F7C192E23695888A73F1A2019F1AF06F2135F919F6C606A07C8FA9F07C00C64A34B5
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....%(...........!......................... ...............................0............@.............................l............ ..................8=..............T............................................................................text...l........................... ..`.rsrc........ ......................@..@......%(........:...T...T.........%(........d.................%(....................RSDS.~....%.T.....CO....api-ms-win-core-memory-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg.......l....edata... ..`....rsrc$01....` .......rsrc$02......................%(....................(...h...........)...P...w...................C...g...................%...P...........B...g...................4...[...|...................=...................................api-ms-win-core-memory-l1-1-0.dl
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-namedpipe-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.16337963516533
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:pgWIghWGZiBeS123Ouo+Uggs/nGfe4pBjS/fE/hWh0txKdmVWQ4GWoxYyqnaj/6B:iWPhWUEi00GftpBj1temnltcwWB
                                                                                            MD5:6F6796D1278670CCE6E2D85199623E27
                                                                                            SHA1:8AA2155C3D3D5AA23F56CD0BC507255FC953CCC3
                                                                                            SHA-256:C4F60F911068AB6D7F578D449BA7B5B9969F08FC683FD0CE8E2705BBF061F507
                                                                                            SHA-512:6E7B134CA930BB33D2822677F31ECA1CB6C1DFF55211296324D2EA9EBDC7C01338F07D22A10C5C5E1179F14B1B5A4E3B0BAFB1C8D39FCF1107C57F9EAF063A7B
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L... ..............!......................... ...............................0.......-....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.... ...........=...T...T....... ...........d............... .......................RSDS...IK..XM.&......api-ms-win-core-namedpipe-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02................ .......................(...P...x...............:...w...............O...y...............&...W...............=...j.......................api-ms-win-core-namedpipe-l1-1-0.dll.ConnectNamedPipe.kernel32.ConnectNamedPipe.CreateNamedP
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processenvironment-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19248
                                                                                            Entropy (8bit):7.073730829887072
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:wXjWIghWGd4dsNtL/123Ouo+Uggs/nGfe4pBjSXcYddWh0txKdmVWQ4SW04engo5:MjWPhWHsnhi00GftpBjW7emOj5l1z6hP
                                                                                            MD5:5F73A814936C8E7E4A2DFD68876143C8
                                                                                            SHA1:D960016C4F553E461AFB5B06B039A15D2E76135E
                                                                                            SHA-256:96898930FFB338DA45497BE019AE1ADCD63C5851141169D3023E53CE4C7A483E
                                                                                            SHA-512:77987906A9D248448FA23DB2A634869B47AE3EC81EA383A74634A8C09244C674ECF9AADCDE298E5996CAFBB8522EDE78D08AAA270FD43C66BEDE24115CDBDFED
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...).r............!......................... ...............................0.......:....@.............................G............ ..................0=..............T............................................................................text...G........................... ..`.rsrc........ ......................@..@....).r.........F...T...T.......).r.........d...............).r.....................RSDS.6..~x.......'......api-ms-win-core-processenvironment-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg.......G....edata... ..`....rsrc$01....` .......rsrc$02........).r.....................(...|.......B...............$...M...{...............P...................6...k.............../...(...e...............=...f...............8...q...............!...T............... ...........................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19392
                                                                                            Entropy (8bit):7.082421046253008
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:afk1JzNcKSIJWPhW2snhi00GftpBjZqcLvemr4PlgC:RcKST+nhoi/BbeGv
                                                                                            MD5:A2D7D7711F9C0E3E065B2929FF342666
                                                                                            SHA1:A17B1F36E73B82EF9BFB831058F187535A550EB8
                                                                                            SHA-256:9DAB884071B1F7D7A167F9BEC94BA2BEE875E3365603FA29B31DE286C6A97A1D
                                                                                            SHA-512:D436B2192C4392A041E20506B2DFB593FE5797F1FDC2CDEB2D7958832C4C0A9E00D3AEA6AA1737D8A9773817FEADF47EE826A6B05FD75AB0BDAE984895C2C4EF
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!......................... ...............................0......l.....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@................B...T...T...................d.......................................RSDS..t........=j.......api-ms-win-core-processthreads-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02............................1...1...(...........K...x...............,...`...................C...q...............'...N...y..............."...I...{...............B...p...............,...c...............H...x...................9...S...p.......
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-processthreads-l1-1-1.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18744
                                                                                            Entropy (8bit):7.1156948849491055
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:xzADfIeRWPhWKEi00GftpBjj1emMVlvN0M:xzfeWeoi11ep
                                                                                            MD5:D0289835D97D103BAD0DD7B9637538A1
                                                                                            SHA1:8CEEBE1E9ABB0044808122557DE8AAB28AD14575
                                                                                            SHA-256:91EEB842973495DEB98CEF0377240D2F9C3D370AC4CF513FD215857E9F265A6A
                                                                                            SHA-512:97C47B2E1BFD45B905F51A282683434ED784BFB334B908BF5A47285F90201A23817FF91E21EA0B9CA5F6EE6B69ACAC252EEC55D895F942A94EDD88C4BFD2DAFD
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....9.............!......................... ...............................0......k.....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....9..........B...T...T........9..........d................9......................RSDS&.n....5..l....)....api-ms-win-core-processthreads-l1-1-1.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.............9......................(...`...........-...l..........."...W...................N...................P...............F...q...............3...r...................................api-ms-win-core-processthreads-l1-1-1.dll.FlushInstr
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-profile-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):17712
                                                                                            Entropy (8bit):7.187691342157284
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:w9WIghWGdUuDz7M123Ouo+Uggs/nGfe4pBjSXrw58h6Wh0txKdmVWQ4SW7QQtzko:w9WPhWYDz6i00GftpBjXPemD5l1z6hv
                                                                                            MD5:FEE0926AA1BF00F2BEC9DA5DB7B2DE56
                                                                                            SHA1:F5A4EB3D8AC8FB68AF716857629A43CD6BE63473
                                                                                            SHA-256:8EB5270FA99069709C846DB38BE743A1A80A42AA1A88776131F79E1D07CC411C
                                                                                            SHA-512:0958759A1C4A4126F80AA5CDD9DF0E18504198AEC6828C8CE8EB5F615AD33BF7EF0231B509ED6FD1304EEAB32878C5A649881901ABD26D05FD686F5EBEF2D1C3
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....&............!......................... ...............................0......0.....@.......................................... ..................0=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....&.........;...T...T........&.........d................&.....................RSDS...O.""#.n....D:....api-ms-win-core-profile-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.....................&.....<...............(...0...8...w......._...........api-ms-win-core-profile-l1-1-0.dll.QueryPerformanceCounter.kernel32.QueryPerformanceCounter.QueryPerformanceFrequency.kernel32.QueryPerformanceFrequency....................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-rtlsupport-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):17720
                                                                                            Entropy (8bit):7.19694878324007
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:61G1WPhWksnhi00GftpBjEVXremWRlP55Jk:kGiYnhoiqVXreDT5Y
                                                                                            MD5:FDBA0DB0A1652D86CD471EAA509E56EA
                                                                                            SHA1:3197CB45787D47BAC80223E3E98851E48A122EFA
                                                                                            SHA-256:2257FEA1E71F7058439B3727ED68EF048BD91DCACD64762EB5C64A9D49DF0B57
                                                                                            SHA-512:E5056D2BD34DC74FC5F35EA7AA8189AAA86569904B0013A7830314AE0E2763E95483FABDCBA93F6418FB447A4A74AB0F07712ED23F2E1B840E47A099B1E68E18
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......(...........!......................... ...............................0......}"....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.......(........>...T...T..........(........d..................(....................RSDS?.L.N.o.....=.......api-ms-win-core-rtlsupport-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...................(....F...............(...4...@...~...........l.................api-ms-win-core-rtlsupport-l1-1-0.dll.RtlCaptureContext.ntdll.RtlCaptureContext.RtlCaptureStackBackTrace.ntdll.RtlCaptureStackBackTrace.RtlUnwind.ntdll.RtlUnwind.
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-string-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.137724132900032
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:xyMvRWPhWFs0i00GftpBjwCJdemnflUG+zI4:xyMvWWoibeTnn
                                                                                            MD5:12CC7D8017023EF04EBDD28EF9558305
                                                                                            SHA1:F859A66009D1CAAE88BF36B569B63E1FBDAE9493
                                                                                            SHA-256:7670FDEDE524A485C13B11A7C878015E9B0D441B7D8EB15CA675AD6B9C9A7311
                                                                                            SHA-512:F62303D98EA7D0DDBE78E4AB4DB31AC283C3A6F56DBE5E3640CBCF8C06353A37776BF914CFE57BBB77FC94CCFA48FAC06E74E27A4333FBDD112554C646838929
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....R............!......................... ...............................0.......\....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@......R.........:...T...T.........R.........d.................R.....................RSDS..D..a..1.f....7....api-ms-win-core-string-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02......................R.....x...............(...H...h...............)...O...x...........................>...i...........................api-ms-win-core-string-l1-1-0.dll.CompareStringEx.kernel32.CompareStringEx.CompareStringOrdinal.kernel32.Compare
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):20280
                                                                                            Entropy (8bit):7.04640581473745
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:5Xdv3V0dfpkXc0vVaHWPhWXEi00GftpBj9em+4lndanJ7o:5Xdv3VqpkXc0vVa8poivex
                                                                                            MD5:71AF7ED2A72267AAAD8564524903CFF6
                                                                                            SHA1:8A8437123DE5A22AB843ADC24A01AC06F48DB0D3
                                                                                            SHA-256:5DD4CCD63E6ED07CA3987AB5634CA4207D69C47C2544DFEFC41935617652820F
                                                                                            SHA-512:7EC2E0FEBC89263925C0352A2DE8CC13DA37172555C3AF9869F9DBB3D627DD1382D2ED3FDAD90594B3E3B0733F2D3CFDEC45BC713A4B7E85A09C164C3DFA3875
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......2...........!......................... ...............................0............@.............................V............ ..................8=..............T............................................................................text...V........................... ..`.rsrc........ ......................@..@.......2........9...T...T..........2........d..................2....................RSDS...z..C...+Q_.....api-ms-win-core-synch-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg.......V....edata... ..`....rsrc$01....` .......rsrc$02.......................2............)...)...(.......p.......1...c...................!...F...m...............$...X...........$...[.......................@...i...............!...Q.......................[...............7...........O...................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-synch-l1-2-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18744
                                                                                            Entropy (8bit):7.138910839042951
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:JtZ3gWPhWFA0i00GftpBj4Z8wemFfYlP55t:j+oiVweb53
                                                                                            MD5:0D1AA99ED8069BA73CFD74B0FDDC7B3A
                                                                                            SHA1:BA1F5384072DF8AF5743F81FD02C98773B5ED147
                                                                                            SHA-256:30D99CE1D732F6C9CF82671E1D9088AA94E720382066B79175E2D16778A3DAD1
                                                                                            SHA-512:6B1A87B1C223B757E5A39486BE60F7DD2956BB505A235DF406BCF693C7DD440E1F6D65FFEF7FDE491371C682F4A8BB3FD4CE8D8E09A6992BB131ADDF11EF2BF9
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...X*uY...........!......................... ...............................0......3.....@.............................v............ ..................8=..............T............................................................................text...v........................... ..`.rsrc........ ......................@..@....X*uY........9...T...T.......X*uY........d...............X*uY....................RSDS.V..B...`..S3.....api-ms-win-core-synch-l1-2-0.pdb............T....rdata..T........rdata$zzzdbg.......v....edata... ..`....rsrc$01....` .......rsrc$02....................X*uY....................(...l...........R...................W...............&...b...............$...W.......6...w...............;...|...............H...................A.....................................api-ms-win-core-synch-
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-sysinfo-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19248
                                                                                            Entropy (8bit):7.072555805949365
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:2q25WPhWWsnhi00GftpBj1u6qXxem4l1z6hi:25+SnhoiG6IeA8
                                                                                            MD5:19A40AF040BD7ADD901AA967600259D9
                                                                                            SHA1:05B6322979B0B67526AE5CD6E820596CBE7393E4
                                                                                            SHA-256:4B704B36E1672AE02E697EFD1BF46F11B42D776550BA34A90CD189F6C5C61F92
                                                                                            SHA-512:5CC4D55350A808620A7E8A993A90E7D05B441DA24127A00B15F96AAE902E4538CA4FED5628D7072358E14681543FD750AD49877B75E790D201AB9BAFF6898C8D
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....C=...........!......................... ...............................0............@.............................E............ ..................0=..............T............................................................................text...E........................... ..`.rsrc........ ......................@..@......C=........;...T...T.........C=........d.................C=....................RSDS....T.>eD.#|.../....api-ms-win-core-sysinfo-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg.......E....edata... ..`....rsrc$01....` .......rsrc$02......................C=....................(...........:...i...............N...................7...s...............+...M...r.............../...'...V...............:...k...................X............... ...?...d..............."...................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-timezone-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18224
                                                                                            Entropy (8bit):7.17450177544266
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:SWPhWK3di00GftpBjH35Gvem2Al1z6hIu:77NoiOve7eu
                                                                                            MD5:BABF80608FD68A09656871EC8597296C
                                                                                            SHA1:33952578924B0376CA4AE6A10B8D4ED749D10688
                                                                                            SHA-256:24C9AA0B70E557A49DAC159C825A013A71A190DF5E7A837BFA047A06BBA59ECA
                                                                                            SHA-512:3FFFFD90800DE708D62978CA7B50FE9CE1E47839CDA11ED9E7723ACEC7AB5829FA901595868E4AB029CDFB12137CF8ECD7B685953330D0900F741C894B88257B
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....Y.x...........!......................... ...............................0......}3....@.......................................... ..................0=..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....Y.x........<...T...T........Y.x........d................Y.x....................RSDS.^.b. .t.H.a.......api-ms-win-core-timezone-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.....................Y.x....................(...L...p...........5...s...........+...i...................U...............I.........................api-ms-win-core-timezone-l1-1-0.dll.FileTimeToSystemTime.kernel32.FileTimeToSystemTime.GetDynamicTimeZ
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-core-util-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18232
                                                                                            Entropy (8bit):7.1007227686954275
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:pePWIghWG4U9wluZo123Ouo+Uggs/nGfe4pBjSbKT8wuxWh0txKdmVWQ4CWnFnwQ:pYWPhWFS0i00GftpBj7DudemJlP552
                                                                                            MD5:0F079489ABD2B16751CEB7447512A70D
                                                                                            SHA1:679DD712ED1C46FBD9BC8615598DA585D94D5D87
                                                                                            SHA-256:F7D450A0F59151BCEFB98D20FCAE35F76029DF57138002DB5651D1B6A33ADC86
                                                                                            SHA-512:92D64299EBDE83A4D7BE36F07F65DD868DA2765EB3B39F5128321AFF66ABD66171C7542E06272CB958901D403CCF69ED716259E0556EE983D2973FAA03C55D3E
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....f............!......................... ...............................0......`k....@.............................9............ ..................8=..............T............................................................................text...)........................... ..`.rsrc........ ......................@..@......f.........8...T...T.........f.........d.................f.....................RSDS*...$.L.Rm..l.....api-ms-win-core-util-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg.......9....edata... ..`....rsrc$01....` .......rsrc$02..........f.....J...................,...@...o...................j...}.........................api-ms-win-core-util-l1-1-0.dll.Beep.kernel32.Beep.DecodePointer.kernel32.DecodePointer.DecodeSystemPointer.kernel32.DecodeSystemPointer.EncodePointer.kernel3
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-conio-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19256
                                                                                            Entropy (8bit):7.088693688879585
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:8WPhWz4Ri00GftpBjDb7bemHlndanJ7DW:Fm0oiV7beV
                                                                                            MD5:6EA692F862BDEB446E649E4B2893E36F
                                                                                            SHA1:84FCEAE03D28FF1907048ACEE7EAE7E45BAAF2BD
                                                                                            SHA-256:9CA21763C528584BDB4EFEBE914FAAF792C9D7360677C87E93BD7BA7BB4367F2
                                                                                            SHA-512:9661C135F50000E0018B3E5C119515CFE977B2F5F88B0F5715E29DF10517B196C81694D074398C99A572A971EC843B3676D6A831714AB632645ED25959D5E3E7
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.................!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v..............................8...d...d..................d......................................RSDS....<....2..u....api-ms-win-crt-conio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...............T...............(.......................>...w.........../...W...p...........................,...L...l.......................,...L...m...............t...........'...^...............P...g...........................$...=...
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-convert-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):22328
                                                                                            Entropy (8bit):6.929204936143068
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:EuydWPhW7snhi00GftpBjd6t/emJlDbN:3tnhoi6t/eAp
                                                                                            MD5:72E28C902CD947F9A3425B19AC5A64BD
                                                                                            SHA1:9B97F7A43D43CB0F1B87FC75FEF7D9EEEA11E6F7
                                                                                            SHA-256:3CC1377D495260C380E8D225E5EE889CBB2ED22E79862D4278CFA898E58E44D1
                                                                                            SHA-512:58AB6FEDCE2F8EE0970894273886CB20B10D92979B21CDA97AE0C41D0676CC0CD90691C58B223BCE5F338E0718D1716E6CE59A106901FE9706F85C3ACF7855FF
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....NE............!.........................0...............................@............@..........................................0..................8=..............T............................................................................text............................... ..`.rsrc........0......................@..@v....................NE.........:...d...d........NE.........d................NE.....................RSDS..e.7P.g^j..[....api-ms-win-crt-convert-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02.....................NE.............z...z...8... .......(...C...^...y...........................1...N...k...............................*...E...`...y...............................5...R...o.......................,...M...n...........
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-environment-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18736
                                                                                            Entropy (8bit):7.078409479204304
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:bWIghWGd4edXe123Ouo+Uggs/nGfe4pBjSXXmv5Wh0txKdmVWQ4SWEApkqnajPBZ:bWPhWqXYi00GftpBjBemPl1z6h2
                                                                                            MD5:AC290DAD7CB4CA2D93516580452EDA1C
                                                                                            SHA1:FA949453557D0049D723F9615E4F390010520EDA
                                                                                            SHA-256:C0D75D1887C32A1B1006B3CFFC29DF84A0D73C435CDCB404B6964BE176A61382
                                                                                            SHA-512:B5E2B9F5A9DD8A482169C7FC05F018AD8FE6AE27CB6540E67679272698BFCA24B2CA5A377FA61897F328B3DEAC10237CAFBD73BC965BF9055765923ABA9478F8
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....jU............!......................... ...............................0......G.....@............................."............ ..................0=..............T............................................................................text...2........................... ..`.rsrc........ ......................@..@v....................jU.........>...d...d........jU.........d................jU.....................RSDSu..1.N....R.s,"\....api-ms-win-crt-environment-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg......."....edata... ..`....rsrc$01....` .......rsrc$02.................jU.....................8...............C...d...........................3...O...l....................... .......5...Z...w.......................)...F...a...........................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-filesystem-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):20280
                                                                                            Entropy (8bit):7.085387497246545
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:sq6nWm5C1WPhWFK0i00GftpBjB1UemKklUG+zIOd/:x6nWm5CiooiKeZnbd/
                                                                                            MD5:AEC2268601470050E62CB8066DD41A59
                                                                                            SHA1:363ED259905442C4E3B89901BFD8A43B96BF25E4
                                                                                            SHA-256:7633774EFFE7C0ADD6752FFE90104D633FC8262C87871D096C2FC07C20018ED2
                                                                                            SHA-512:0C14D160BFA3AC52C35FF2F2813B85F8212C5F3AFBCFE71A60CCC2B9E61E51736F0BF37CA1F9975B28968790EA62ED5924FAE4654182F67114BD20D8466C4B8F
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......h...........!......................... ...............................0......I.....@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v......................h........=...d...d..........h........d..................h....................RSDS.....a.'..G...A.....api-ms-win-crt-filesystem-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...................h............A...A...8...<...@...........$...=...V...q...................)...M...q......................./...O...o...........................7...X...v...........................6...U...r.......................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-heap-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19256
                                                                                            Entropy (8bit):7.060393359865728
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:+Y3vY17aFBR4WIghWG4U9CedXe123Ouo+Uggs/nGfe4pBjSbGGAPWh0txKdmVWQC:+Y3e9WPhWFsXYi00GftpBjfemnlP55s
                                                                                            MD5:93D3DA06BF894F4FA21007BEE06B5E7D
                                                                                            SHA1:1E47230A7EBCFAF643087A1929A385E0D554AD15
                                                                                            SHA-256:F5CF623BA14B017AF4AEC6C15EEE446C647AB6D2A5DEE9D6975ADC69994A113D
                                                                                            SHA-512:72BD6D46A464DE74A8DAC4C346C52D068116910587B1C7B97978DF888925216958CE77BE1AE049C3DCCF5BF3FFFB21BC41A0AC329622BC9BBC190DF63ABB25C6
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...J.o ...........!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v...................J.o ........7...d...d.......J.o ........d...............J.o ....................RSDSq.........pkQX[....api-ms-win-crt-heap-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02........J.o ....6...............(...........c...................S.......................1...V...y.......................<...c...........................U...z...............:...u...................&...E...p.......................,...U...
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-locale-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18744
                                                                                            Entropy (8bit):7.13172731865352
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:fiWIghWGZirX+4z123Ouo+Uggs/nGfe4pBjS/RFcpOWh0txKdmVWQ4GWs8ylDikh:aWPhWjO4Ri00GftpBjZOemSXlvNQ0
                                                                                            MD5:A2F2258C32E3BA9ABF9E9E38EF7DA8C9
                                                                                            SHA1:116846CA871114B7C54148AB2D968F364DA6142F
                                                                                            SHA-256:565A2EEC5449EEEED68B430F2E9B92507F979174F9C9A71D0C36D58B96051C33
                                                                                            SHA-512:E98CBC8D958E604EFFA614A3964B3D66B6FC646BDCA9AA679EA5E4EB92EC0497B91485A40742F3471F4FF10DE83122331699EDC56A50F06AE86F21FAD70953FE
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...|..O...........!......................... ...............................0......E*....@.............................e............ ..................8=..............T............................................................................text...u........................... ..`.rsrc........ ......................@..@v...................|..O........9...d...d.......|..O........d...............|..O....................RSDS.X...7.......$k....api-ms-win-crt-locale-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg.......e....edata... ..`....rsrc$01....` .......rsrc$02....................|..O....................8...........5...h...............E...................$...N...t...................$...D...b...!...R............... ...s...................:...k.......................9...X...................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-math-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):28984
                                                                                            Entropy (8bit):6.6686462438397
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:7OTEmbM4Oe5grykfIgTmLyWPhW30i00GftpBjAKemXlDbNl:dEMq5grxfInbRoiNeSp
                                                                                            MD5:8B0BA750E7B15300482CE6C961A932F0
                                                                                            SHA1:71A2F5D76D23E48CEF8F258EAAD63E586CFC0E19
                                                                                            SHA-256:BECE7BAB83A5D0EC5C35F0841CBBF413E01AC878550FBDB34816ED55185DCFED
                                                                                            SHA-512:FB646CDCDB462A347ED843312418F037F3212B2481F3897A16C22446824149EE96EB4A4B47A903CA27B1F4D7A352605D4930DF73092C380E3D4D77CE4E972C5A
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!.........................@...............................P............@..............................+...........@...............4..8=..............T............................................................................text....,.......................... ..`.rsrc........@.......0..............@..@v...............................7...d...d...................d.......................................RSDSB...=........,....api-ms-win-crt-math-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg........+...edata...@..`....rsrc$01....`@.......rsrc$02................l.......:...:...(...................................(...@...X...q...............................4...M...g........................ ..= ..i ... ... ... ...!..E!..o!...!...!...!..."..F"..s"..."..."..."...#..E#..o#...#...#..
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-multibyte-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):26424
                                                                                            Entropy (8bit):6.712286643697659
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:kDy+Kr6aLPmIHJI6/CpG3t2G3t4odXL5WPhWFY0i00GftpBjbnMxem8hzlmTMiLV:kDZKrZPmIHJI64GoiZMxe0V
                                                                                            MD5:35FC66BD813D0F126883E695664E7B83
                                                                                            SHA1:2FD63C18CC5DC4DEFC7EA82F421050E668F68548
                                                                                            SHA-256:66ABF3A1147751C95689F5BC6A259E55281EC3D06D3332DD0BA464EFFA716735
                                                                                            SHA-512:65F8397DE5C48D3DF8AD79BAF46C1D3A0761F727E918AE63612EA37D96ADF16CC76D70D454A599F37F9BA9B4E2E38EBC845DF4C74FC1E1131720FD0DCB881431
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....u'............!.....$...................@...............................P............@.............................. ...........@...............*..8=..............T............................................................................text....".......$.................. ..`.rsrc........@.......&..............@..@v....................u'.........<...d...d........u'.........d................u'.....................RSDS7.%..5..+...+.....api-ms-win-crt-multibyte-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg........ ...edata...@..`....rsrc$01....`@.......rsrc$02.....................u'.....................8...X...x...;...`.......................1...T...w...................'...L...q.......................B...e.......................7...Z...}...................+...L...m.......................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-private-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):73016
                                                                                            Entropy (8bit):5.838702055399663
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:VAHEGlVDe5c4bFE2Jy2cvxXWpD9d3334BkZnkPFZo6kt:Vc7De5c4bFE2Jy2cvxXWpD9d3334BkZj
                                                                                            MD5:9910A1BFDC41C5B39F6AF37F0A22AACD
                                                                                            SHA1:47FA76778556F34A5E7910C816C78835109E4050
                                                                                            SHA-256:65DED8D2CE159B2F5569F55B2CAF0E2C90F3694BD88C89DE790A15A49D8386B9
                                                                                            SHA-512:A9788D0F8B3F61235EF4740724B4A0D8C0D3CF51F851C367CC9779AB07F208864A7F1B4A44255E0DE8E030D84B63B1BDB58F12C8C20455FF6A55EF6207B31A91
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....^1...........!................................................................R.....@.............................................................8=..............T............................................................................text............................... ..`.rsrc...............................@..@v.....................^1........:...d...d.........^1........d.................^1....................RSDS.J..w/.8..bu..3.....api-ms-win-crt-private-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg............edata......`....rsrc$01....`........rsrc$02......................^1.....>..............8...h#...5...>...?..7?.._?...?...?...?...@..V@...@...@...@..+A..\A...A...A...A...B..LB...B...B...C..HC...C...C...C...C...D..HD...D...D...E..eE...E...E...F..1F..gF...F...F...G..BG..uG...G..
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-process-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):19256
                                                                                            Entropy (8bit):7.076072254895036
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:aRQqjd7dWIghWG4U9kuDz7M123Ouo+Uggs/nGfe4pBjSbAURWh0txKdmVWQ4CW+6:aKcWPhWFkDz6i00GftpBjYemZlUG+zIU
                                                                                            MD5:8D02DD4C29BD490E672D271700511371
                                                                                            SHA1:F3035A756E2E963764912C6B432E74615AE07011
                                                                                            SHA-256:C03124BA691B187917BA79078C66E12CBF5387A3741203070BA23980AA471E8B
                                                                                            SHA-512:D44EF51D3AAF42681659FFFFF4DD1A1957EAF4B8AB7BB798704102555DA127B9D7228580DCED4E0FC98C5F4026B1BAB242808E72A76E09726B0AF839E384C3B0
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L...l.h............!......................... ...............................0.......U....@.............................x............ ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v...................l.h.........:...d...d.......l.h.........d...............l.h.....................RSDSZ\.qM..I....3.....api-ms-win-crt-process-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg.......x....edata... ..`....rsrc$01....` .......rsrc$02....................l.h.............$...$...8.......X...................&...@...Y...q...........................*...E..._...z.......................!...<...V...q...........................9...V...t.......................7...R...i...
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-runtime-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):22840
                                                                                            Entropy (8bit):6.942029615075195
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:7b7hrKwWPhWFlsnhi00GftpBj+6em90lmTMiLzrF7:7bNrKxZnhoig6eQN7
                                                                                            MD5:41A348F9BEDC8681FB30FA78E45EDB24
                                                                                            SHA1:66E76C0574A549F293323DD6F863A8A5B54F3F9B
                                                                                            SHA-256:C9BBC07A033BAB6A828ECC30648B501121586F6F53346B1CD0649D7B648EA60B
                                                                                            SHA-512:8C2CB53CCF9719DE87EE65ED2E1947E266EC7E8343246DEF6429C6DF0DC514079F5171ACD1AA637276256C607F1063144494B992D4635B01E09DDEA6F5EEF204
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L.....L............!.........................0...............................@.......i....@..........................................0..................8=..............T............................................................................text............................... ..`.rsrc........0......................@..@v.....................L.........:...d...d.........L.........d.................L.....................RSDS6..>[d.=. ....C....api-ms-win-crt-runtime-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02......................L.....f.......k...k...8...............................4...S...s.......................E...g.......................)...N...n...................&...E...f...................'...D...j.......................>.......
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-stdio-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):24368
                                                                                            Entropy (8bit):6.873960147000383
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:GZpFVhjWPhWxEi00GftpBjmjjem3Cl1z6h1r:eCfoi0espbr
                                                                                            MD5:FEFB98394CB9EF4368DA798DEAB00E21
                                                                                            SHA1:316D86926B558C9F3F6133739C1A8477B9E60740
                                                                                            SHA-256:B1E702B840AEBE2E9244CD41512D158A43E6E9516CD2015A84EB962FA3FF0DF7
                                                                                            SHA-512:57476FE9B546E4CAFB1EF4FD1CBD757385BA2D445D1785987AFB46298ACBE4B05266A0C4325868BC4245C2F41E7E2553585BFB5C70910E687F57DAC6A8E911E8
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L..................!.........................0...............................@.......)....@.............................a............0..............."..0=..............T............................................................................text...a........................... ..`.rsrc........0......................@..@v...............................8...d...d...................d.......................................RSDS...iS#.hg.....j....api-ms-win-crt-stdio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg.......a....edata...0..`....rsrc$01....`0.......rsrc$02................^...............(....... ...................<...y...........)...h........... ...]...............H...............)...D...^...v...............................T...u.......................9...Z...{...................0...Q...
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-string-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):23488
                                                                                            Entropy (8bit):6.840671293766487
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:5iFMx0C5yguNvZ5VQgx3SbwA7yMVIkFGlnWPhWGTi00GftpBjslem89lgC:56S5yguNvZ5VQgx3SbwA71IkFv5oialj
                                                                                            MD5:404604CD100A1E60DFDAF6ECF5BA14C0
                                                                                            SHA1:58469835AB4B916927B3CABF54AEE4F380FF6748
                                                                                            SHA-256:73CC56F20268BFB329CCD891822E2E70DD70FE21FC7101DEB3FA30C34A08450C
                                                                                            SHA-512:DA024CCB50D4A2A5355B7712BA896DF850CEE57AA4ADA33AAD0BAE6960BCD1E5E3CEE9488371AB6E19A2073508FBB3F0B257382713A31BC0947A4BF1F7A20BE4
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L......S...........!.........................0...............................@......B.....@..........................................0..............."...9..............T............................................................................text............................... ..`.rsrc........0......................@..@v......................S........9...d...d..........S........d..................S....................RSDSI.......$[~f..5....api-ms-win-crt-string-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02.......................S....,...............8...........W...s.......................#...B...a...........................<...[...z.......................;...[...{................... ...A...b...........................<...X...r.......
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-time-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):20792
                                                                                            Entropy (8bit):7.018061005886957
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:8ZSWWVgWPhWFe3di00GftpBjnlfemHlUG+zITA+0:XRNoibernAA+0
                                                                                            MD5:849F2C3EBF1FCBA33D16153692D5810F
                                                                                            SHA1:1F8EDA52D31512EBFDD546BE60990B95C8E28BFB
                                                                                            SHA-256:69885FD581641B4A680846F93C2DD21E5DD8E3BA37409783BC5B3160A919CB5D
                                                                                            SHA-512:44DC4200A653363C9A1CB2BDD3DA5F371F7D1FB644D1CE2FF5FE57D939B35130AC8AE27A3F07B82B3428233F07F974628027B0E6B6F70F7B2A8D259BE95222F5
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....OI...........!......................... ...............................0............@.......................................... ..................8=..............T............................................................................text............................... ..`.rsrc........ ......................@..@v....................OI........7...d...d........OI........d................OI....................RSDS...s..,E.w.9I..D....api-ms-win-crt-time-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........OI............H...H...(...H...h... ...=...\...z.......................8...V...s.......................&...D...a...~.......................?...b.......................!...F...k.......................0...N...k...................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\api-ms-win-crt-utility-l1-1-0.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):18744
                                                                                            Entropy (8bit):7.127951145819804
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:QqfHQdu3WIghWG4U9lYdsNtL/123Ouo+Uggs/nGfe4pBjSb8Z9Wh0txKdmVWQ4Cg:/fBWPhWF+esnhi00GftpBjLBemHlP55q
                                                                                            MD5:B52A0CA52C9C207874639B62B6082242
                                                                                            SHA1:6FB845D6A82102FF74BD35F42A2844D8C450413B
                                                                                            SHA-256:A1D1D6B0CB0A8421D7C0D1297C4C389C95514493CD0A386B49DC517AC1B9A2B0
                                                                                            SHA-512:18834D89376D703BD461EDF7738EB723AD8D54CB92ACC9B6F10CBB55D63DB22C2A0F2F3067FE2CC6FEB775DB397030606608FF791A46BF048016A1333028D0A4
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m....e...e...e..ne...e..na...e..n....e..ng...e.Rich..e.PE..L....!5............!......................... ...............................0.......4....@.............................^............ ..................8=..............T............................................................................text...n........................... ..`.rsrc........ ......................@..@v....................!5.........:...d...d........!5.........d................!5.....................RSDS............k.....api-ms-win-crt-utility-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg.......^....edata... ..`....rsrc$01....` .......rsrc$02.....................!5.....d...............8.......(...................#...<...U...l...............................+...@...[...r...................................4...I..._.......................3...N...e...|.......................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\breakpadinjector.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):117712
                                                                                            Entropy (8bit):6.598338256653691
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:9b9ffsTV5n8cSQQtys6FXCVnx+IMD6eN07e:P25V/QQs6WTMex7e
                                                                                            MD5:A436472B0A7B2EB2C4F53FDF512D0CF8
                                                                                            SHA1:963FE8AE9EC8819EF2A674DBF7C6A92DBB6B46A9
                                                                                            SHA-256:87ED943D2F06D9CA8824789405B412E770FE84454950EC7E96105F756D858E52
                                                                                            SHA-512:89918673ADDC0501746F24EC9A609AC4D416A4316B27BF225974E898891699B630BB18DB32432DA2F058DC11D9AF7BAF95D067B29FB39052EE7C6F622718271B
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s..y7.{*7.{*7.{*..x+>.{*..~+I.{*...+%.{*.x+$.{*..+'.{*.~+..{*..z+4.{*7.z*A.{*..~+>.{*..{+6.{*...*6.{*..y+6.{*Rich7.{*........PE..L....@.\.........."!................t........0.......................................S....@.........................P...P.......(...................................`...T...............................@............0..D............................text............................... ..`.rdata...l...0...n... ..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\freebl3.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):334288
                                                                                            Entropy (8bit):6.808908775107082
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:6cYBCU/bEPU6Rc5xUqc+z75nv4F0GHrIraqqDL6XPSed:67WRCB7zl4F0I4qn6R
                                                                                            MD5:60ACD24430204AD2DC7F148B8CFE9BDC
                                                                                            SHA1:989F377B9117D7CB21CBE92A4117F88F9C7693D9
                                                                                            SHA-256:9876C53134DBBEC4DCCA67581F53638EBA3FEA3A15491AA3CF2526B71032DA97
                                                                                            SHA-512:626C36E9567F57FA8EC9C36D96CBADEDE9C6F6734A7305ECFB9F798952BBACDFA33A1B6C4999BA5B78897DC2EC6F91870F7EC25B2CEACBAEE4BE942FE881DB01
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........./...AV..AV..AV...V..AV].@W..AV.1.V..AV].BW..AV].DW..AV].EW..AV..@W..AVO.@W..AV..@V.AVO.BW..AVO.EW..AVO.AW..AVO.V..AVO.CW..AVRich..AV........................PE..L....@.\.........."!.........f...............................................p............@.........................p...P............@..x....................P......0...T...............................@...............8............................text...d........................... ..`.rdata..............................@..@.data...,H..........................@....rsrc...x....@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldap60.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):132048
                                                                                            Entropy (8bit):6.627391684128337
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:qgXCFTvwqiiynFa6zqeqQZ06DdEH4sq9gHNaIkIQhEwe:qdvwqMFbOePIP/zkIQ2h
                                                                                            MD5:5A49EBF1DA3D5971B62A4FD295A71ECF
                                                                                            SHA1:40917474EF7914126D62BA7CDBF6CF54D227AA20
                                                                                            SHA-256:2B128B3702F8509F35CAD0D657C9A00F0487B93D70336DF229F8588FBA6BA926
                                                                                            SHA-512:A6123BA3BCF9DE6AA8CE09F2F84D6D3C79B0586F9E2FD0C8A6C3246A91098099B64EDC2F5D7E7007D24048F10AE9FC30CCF7779171F3FD03919807EE6AF76809
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q...?S..?S..?S..S..?S|.>R..?S;..S..?S|.<R..?S|.:R..?S|.;R..?S..>R..?S..>S..?Sn.;R.?Sn.?R..?Sn..S..?Sn.=R..?SRich..?S........................PE..L....@.\.........."!.........f...... ........................................0............@.............................................x.................... ......p...T..............................@...............\............................text...:........................... ..`.rdata...@.......B..................@..@.data...l...........................@....rsrc...x...........................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ldif60.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):20432
                                                                                            Entropy (8bit):6.337521751154348
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:YxfML3ALxK0AZEuzOJKRsIFYvDG8A3OPLonw4S:0fMmxFyO4RpGDG8MjS
                                                                                            MD5:4FE544DFC7CDAA026DA6EDA09CAD66C4
                                                                                            SHA1:85D21E5F5F72A4808F02F4EA14AA65154E52CE99
                                                                                            SHA-256:3AABBE0AA86CE8A91E5C49B7DE577AF73B9889D7F03AF919F17F3F315A879B0F
                                                                                            SHA-512:5C78C5482E589AF7D609318A6705824FD504136AEAAC63F373E913DA85FA03AF868669534496217B05D74364A165D7E08899437FCC0E3017F02D94858BA814BB
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........9..j..j..j...j..j^..k..j^..k..j^..k..j^..k..j...k..j..j..jL..k..jL..k..jL.bj..jL..k..jRich..j........................PE..L....<.\.........."!................Y........0...............................p......r.....@..........................5.......6.......P..x............2.......`..x....0..T...........................(1..@............0...............................text............................... ..`.rdata.......0......................@..@.data........@.......&..............@....rsrc...x....P.......,..............@..@.reloc..x....`.......0..............@..B................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\lgpllibs.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):55760
                                                                                            Entropy (8bit):6.738700405402967
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:LxsBS3Q6j+37mWT7DT/GszGrn7iBCmjFCOu:LxTBcmWT7X/Gszen7icmjFtu
                                                                                            MD5:56E982D4C380C9CD24852564A8C02C3E
                                                                                            SHA1:F9031327208176059CD03F53C8C5934C1050897F
                                                                                            SHA-256:7F93B70257D966EA1C1A6038892B19E8360AADD8E8AE58E75EBB0697B9EA8786
                                                                                            SHA-512:92ADC4C905A800F8AB5C972B166099382F930435694D5F9A45D1FDE3FEF94FAC57FD8FAFF56FFCFCFDBC61A43E6395561B882966BE0C814ECC7E672C67E6765A
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$...........l...l...l.......l..~....l..9...l..~....l..~....l..~....l.......l..l....l...l...l...l...l..l....l..l....l..l....l..l..l..l....l..Rich.l..........................PE..L...z@.\.........."!.........2......................................................t.....@...........................................x...............................T...............................@............................................text.............................. ..`.rdata..>...........................@..@.data...............................@....rodata.8...........................@..@.rsrc...x...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\libEGL.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):22480
                                                                                            Entropy (8bit):6.528357540966124
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:INZ9mLVDAffJJKAtn0mLAb8X3FbvDG8A3OPLonzvGb:4mx+fXvn4YFrDG8MKb
                                                                                            MD5:96B879B611B2BBEE85DF18884039C2B8
                                                                                            SHA1:00794796ACAC3899C1FB9ABBF123FEF3CC641624
                                                                                            SHA-256:7B9FC6BE34F43D39471C2ADD872D5B4350853DB11CC66A323EF9E0C231542FB9
                                                                                            SHA-512:DF8F1AA0384A5682AE47F212F3153D26EAFBBF12A8C996428C3366BEBE16850D0BDA453EC5F4806E6A62C36D312D37B8BBAFF549968909415670C9C61A6EC49A
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../...N{.N{.N{.6..N{.F,z.N{.F,x.N{.F,~.N{.F,..N{..z.N{.T-z.N{.Nz..N{.T-~.N{.T-{.N{.T-..N{.T-y.N{.Rich.N{.........................PE..L...aA.\.........."!.........(............... ...............................p......~.....@..........................%..........d....P..x............:.......`.......!..T............................"..@............ ...............................text... ........................... ..`.rdata....... ......................@..@.data........@.......2..............@....rsrc...x....P.......4..............@..@.reloc.......`.......8..............@..B........................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):83408
                                                                                            Entropy (8bit):6.436278889454398
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:CNr03+TtFKytqB0EeCsu1sW+cdQOTki9jHiU:CNrDKHBBjXQSki9OU
                                                                                            MD5:385A92719CC3A215007B83947922B9B5
                                                                                            SHA1:38DE6CA70CEE1BAD84BED29CE7620A15E6ABCD10
                                                                                            SHA-256:06EF2010B738FBE99BCDEBBF162473A4EE090678BB6862EEB0D4C7A8C3F225BB
                                                                                            SHA-512:9F0DFF00C7E72D7017AECE3FA5C31A9C2C2AA0CCC6606D2561CE8D36A4A1F0AB8DC452E2C65E9F4B6CD32BBB8ADA1FF7C865126A5F318719579DB763E4C4183F
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........mR;...;...;.......2.......G.......).......*.......".......4.......>...;...n.......:.......:.......:.......:...Rich;...........................PE..L....=.\.........."!.........................................................`......>.....@.............................l.......<....@..P............(.......P..d...0...T...............................@............................................text............................... ..`.rdata..Z[.......\..................@..@.data........ ......................@....rsrc...P....@......................@..@.reloc..d....P......................@..B........................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozMapi32_InUse.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):83408
                                                                                            Entropy (8bit):6.436278889454398
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:CNr03+TtFKytqB0EeCsu1sW+cdQOTki9jHiU:CNrDKHBBjXQSki9OU
                                                                                            MD5:385A92719CC3A215007B83947922B9B5
                                                                                            SHA1:38DE6CA70CEE1BAD84BED29CE7620A15E6ABCD10
                                                                                            SHA-256:06EF2010B738FBE99BCDEBBF162473A4EE090678BB6862EEB0D4C7A8C3F225BB
                                                                                            SHA-512:9F0DFF00C7E72D7017AECE3FA5C31A9C2C2AA0CCC6606D2561CE8D36A4A1F0AB8DC452E2C65E9F4B6CD32BBB8ADA1FF7C865126A5F318719579DB763E4C4183F
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........mR;...;...;.......2.......G.......).......*.......".......4.......>...;...n.......:.......:.......:.......:...Rich;...........................PE..L....=.\.........."!.........................................................`......>.....@.............................l.......<....@..P............(.......P..d...0...T...............................@............................................text............................... ..`.rdata..Z[.......\..................@..@.data........ ......................@....rsrc...P....@......................@..@.reloc..d....P......................@..B........................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\mozglue.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):137168
                                                                                            Entropy (8bit):6.784614237836286
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:Z6s2DIGLXlNJJcPoN0j/kVqhp1qt/TXTv7q1D2JJJvPhrSeXZ5dR:MszGLXlNrE/kVqhp12/TXTjSD2JJJvPt
                                                                                            MD5:EAE9273F8CDCF9321C6C37C244773139
                                                                                            SHA1:8378E2A2F3635574C106EEA8419B5EB00B8489B0
                                                                                            SHA-256:A0C6630D4012AE0311FF40F4F06911BCF1A23F7A4762CE219B8DFFA012D188CC
                                                                                            SHA-512:06E43E484A89CEA9BA9B9519828D38E7C64B040F44CDAEB321CBDA574E7551B11FEA139CE3538F387A0A39A3D8C4CBA7F4CF03E4A3C98DB85F8121C2212A9097
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..;..;..;.....;.W....;...8..;...?..;...:..;...>..;...:...;..:.w.;...?..;...>..;...;..;......;...9..;.Rich.;.........................PE..L...{>.\.........."!.....z...................................................@......j.....@A........................@...t.......,.... ..x....................0..l.......T...................T.......h...@...................l........................text....x.......z.................. ..`.rdata..^e.......f...~..............@..@.data...............................@....didat..8...........................@....rsrc...x.... ......................@..@.reloc..l....0......................@..B........................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\msvcp140.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):440120
                                                                                            Entropy (8bit):6.652844702578311
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:Mlp4PwrPTlZ+/wKzY+dM+gjZ+UGhUgiW6QR7t5s03Ooc8dHkC2es9oV:Mlp4PePozGMA03Ooc8dHkC2ecI
                                                                                            MD5:109F0F02FD37C84BFC7508D4227D7ED5
                                                                                            SHA1:EF7420141BB15AC334D3964082361A460BFDB975
                                                                                            SHA-256:334E69AC9367F708CE601A6F490FF227D6C20636DA5222F148B25831D22E13D4
                                                                                            SHA-512:46EB62B65817365C249B48863D894B4669E20FCB3992E747CD5C9FDD57968E1B2CF7418D1C9340A89865EADDA362B8DB51947EB4427412EB83B35994F932FD39
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A.........V5=......A.....;........."...;......;......;.......;.......;......;.-....;......Rich...........PE..L....8'Y.........."!................P........ ......................................az....@A.........................C.......R..,....................x..8?......4:...f..8............................(..@............P.......@..@....................text...r........................... ..`.data....(... ......................@....idata..6....P....... ..............@..@.didat..4....p.......6..............@....rsrc................8..............@..@.reloc..4:.......<...<..............@..B........................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nss3.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1245136
                                                                                            Entropy (8bit):6.766715162066988
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:ido5Js2a56/+VwJebKj5KYFsRjzx5ZxKV6D1Z4Go/LCiytoxq2Zwn5hCM4MSRdY8:Q2aY4w6aozx5ZWMM7yew8MSRK1y
                                                                                            MD5:02CC7B8EE30056D5912DE54F1BDFC219
                                                                                            SHA1:A6923DA95705FB81E368AE48F93D28522EF552FB
                                                                                            SHA-256:1989526553FD1E1E49B0FEA8036822CA062D3D39C4CAB4A37846173D0F1753D5
                                                                                            SHA-512:0D5DFCF4FB19B27246FA799E339D67CD1B494427783F379267FB2D10D615FFB734711BAB2C515062C078F990A44A36F2D15859B1DACD4143DCC35B5C0CEE0EF5
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c.4.'.Z.'.Z.'.Z.....3.Z...[.%.Z.B..#.Z...Y.*.Z..._.-.Z...^.,.Z...[./.Z..[.$.Z.'.[...Z..^.-.Z..Z.&.Z...&.Z..X.&.Z.Rich'.Z.........................PE..L....@.\.........."!.........................................................@......Q.....@................................x=..T.......p........................|......T...........................h...@............................................text............................... ..`.rdata...Q.......R..................@..@.data...tG...`..."...>..............@....rsrc...p............`..............@..@.reloc...|.......~...d..............@..B................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssckbi.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):336336
                                                                                            Entropy (8bit):7.0315399874711995
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:8bndzEL04gF85K9autIMyEhZ/V3psPyHa9tBe1:8bndzEL04pnutIMyAp2z9tBe1
                                                                                            MD5:BDAF9852F588C86B055C846B53D4C144
                                                                                            SHA1:03B739430CF9EADE21C977B5B416C4DD94528C3B
                                                                                            SHA-256:2481DA1C459A2429A933D19AD6AE514BD2AE59818246DDB67B0EF44146CED3D8
                                                                                            SHA-512:19D9A952A3DF5703542FA52A5A780C2E04D6A132059F30715954EAC40CD1C3F3B119A29736D4A911BE85086AFE08A54A7482FA409DFD882BAC39037F9EECD7EF
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pi.Pi.Pi.(..Pi.F2h.Pi.F2j.Pi.F2l.Pi.F2m.Pi.0h.Pi.T3h.Pi.Ph.Pi.T3m.Pi.T3i.Pi.T3..Pi.T3k.Pi.Rich.Pi.........PE..L....@.\.........."!.........`......q........................................@...........@.............................P.......d.......x.......................t)..p...T..............................@............................................text.............................. ..`.rdata..>...........................@..@.data....N.......L..................@....rsrc...x...........................@..@.reloc..t).......*..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\nssdbm3.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):92624
                                                                                            Entropy (8bit):6.639527605275762
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:YvNGVOt0VjOJkbH8femxfRVMNKBDuOQWL1421GlkxERC+ANcFZoZ/6tNRCwI41Pc:+NGVOiBZbcGmxXMcBqmzoCUZoZebHPAT
                                                                                            MD5:94919DEA9C745FBB01653F3FDAE59C23
                                                                                            SHA1:99181610D8C9255947D7B2134CDB4825BD5A25FF
                                                                                            SHA-256:BE3987A6CD970FF570A916774EB3D4E1EDCE675E70EDAC1BAF5E2104685610B0
                                                                                            SHA-512:1A3BB3ECADD76678A65B7CB4EBE3460D0502B4CA96B1399F9E56854141C8463A0CFCFFEDF1DEFFB7470DDFBAC3B608DC10514ECA196D19B70803FBB02188E15E
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z.Y.4.Y.4.Y.4.P...U.4...5.[.4..y.Q.4...7.X.4...1.S.4...0.R.4.{.5.[.4...5.Z.4.Y.5...4...0.A.4...4.X.4....X.4...6.X.4.RichY.4.........................PE..L....@.\.........."!.........0...............0......................................*q....@......................... ?......(@.......`..x............L.......p.......:..T...........................(;..@............0..X............................text............................... ..`.rdata..D....0... ..................@..@.data........P.......>..............@....rsrc...x....`.......@..............@..@.reloc.......p.......D..............@..B................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\pY4zE3fX7h.zip
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:Zip archive data, at least v2.0 to extract
                                                                                            Category:dropped
                                                                                            Size (bytes):2828315
                                                                                            Entropy (8bit):7.998625956067725
                                                                                            Encrypted:true
                                                                                            SSDEEP:49152:tiGLaX5/cgbRETlc0EqgSVAx07XZiEi4qiefeEJGt5ygL0+6/qax:t9OX9alwJSVP1fnefekGt5CP
                                                                                            MD5:1117CD347D09C43C1F2079439056ADA3
                                                                                            SHA1:93C2CE5FC4924314318554E131CFBCD119F01AB6
                                                                                            SHA-256:4CFADA7EB51A6C0CB26283F9C86784B2B2587C59C46A5D3DC0F06CAD2C55EE97
                                                                                            SHA-512:FC3F85B50176C0F96898B7D744370E2FF0AA2024203B936EB1465304C1C7A56E1AC078F3FDF751F4384536602F997E745BFFF97F1D8FF2288526883185C08FAF
                                                                                            Malicious:false
                                                                                            Preview: PK.........znN<..{r....i......nssdbm3.dll...|...8...N..Y..6.$J.....$1...D .a.....jL.V..C...N.;....}./............$...Z,T.R.qc...Ec.=................;..{..s....p.`..A.?M.....W!.....a..?N...~e.A..W.o.....[.}...,...;.+\....Jw.|...k.......<yR.^.E.o.nxs.c...=V....,..F....cu.....w.O..[..u.{..<.w....7P...{..K~..E..w...c...z^..[Z....6.G.V.2..+.n4......1M.......w{f..nJL..{. d......M..+.. ......./.)..$X!......L..K.`.M...w.I..LA8r.IX...r...87..}........<.].r.....TWm......b6/._....a..W.lB...3.n.._...j....o.Mz.._Q........8....K.*...........gr..L..*H...v....6[*...4I...{.1g..<..>M..$G.&Y........-.....O..9\...,t..W.m.X ..Y.3.*...S<#}.".>.0RBg,...lh.s..o.....r.p8...)..3..K.v....ds.n3.+]....+....krMu._.Y\..../8T......&.BC.".u..;..e.k u$......~`.{.!.M...\W.Y.37+nQ.Z.*...3\G..5d....Z.hVL..Z.|k.5...XF.Y..lVVW..C..|.....b..\.Z...m. ..0...P.F8{].U.p..RW,n...MM.....s..._@..>Q.. ...N.>.T?WM....)9B.............mVW.......b.6{..|!......O....M....>.>.$\.%..L.zF.l...3
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\prldap60.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):24016
                                                                                            Entropy (8bit):6.532540890393685
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:TQJMOeAdiNcNUO3qgpw6MnTmJk0llEEHAnDl3vDG8A3OPLondJJs2z:KMaNqb6MTmVllEK2p/DG8MlsQ
                                                                                            MD5:6099C438F37E949C4C541E61E88098B7
                                                                                            SHA1:0AD03A6F626385554A885BD742DFE5B59BC944F5
                                                                                            SHA-256:46B005817868F91CF60BAA052EE96436FC6194CE9A61E93260DF5037CDFA37A5
                                                                                            SHA-512:97916C72BF75C11754523E2BC14318A1EA310189807AC8059C5F3DC1049321E5A3F82CDDD62944EA6688F046EE02FF10B7DDF8876556D1690729E5029EA414A9
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:`wq[.$q[.$q[.$x#.$s[.$.9.%s[.$.9.%p[.$.9.%{[.$.9.%z[.$S;.%s[.$.8.%t[.$q[.$=[.$.8.%t[.$.8.%p[.$.8.$p[.$.8.%p[.$Richq[.$........PE..L....@.\.........."!..... ... .......%.......0...............................p......./....@..........................5......p7..x....P..x............@.......`..$...`1..T............................1..@............0..,............................text...2........ .................. ..`.rdata.......0.......$..............@..@.data...4....@.......4..............@....rsrc...x....P.......8..............@..@.reloc..$....`.......<..............@..B........................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\qipcap.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):16336
                                                                                            Entropy (8bit):6.437762295038996
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:aPgr1ZCb2vGJ7b20qKvFej7x0KDWpH3vUA397Ae+PjPonZwC7Qm:aYpZPGJP209F4vDG8A3OPLonZwC7X
                                                                                            MD5:F3A355D0B1AB3CC8EFFCC90C8A7B7538
                                                                                            SHA1:1191F64692A89A04D060279C25E4779C05D8C375
                                                                                            SHA-256:7A589024CF0EEB59F020F91BE4FE7EE0C90694C92918A467D5277574AC25A5A2
                                                                                            SHA-512:6A9DB921156828BCE7063E5CDC5EC5886A13BD550BA8ED88C99FA6E7869ECFBA0D0B7953A4932EB8381243CD95E87C98B91C90D4EB2B0ACD7EE87BE114A91A9E
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s6.7W..7W..7W..>/..5W...5..5W...5..6W...5..>W...5..<W...7..4W..7W..*W...4..6W...4`.6W...4..6W..Rich7W..................PE..L....B.\.........."!......................... ...............................`.......r....@..................................$..P....@..x............".......P.. .... ..T............................ ..@............ ..h............................text...P........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...x....@......................@..@.reloc.. ....P....... ..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\softokn3.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):144848
                                                                                            Entropy (8bit):6.54005414297208
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:8Af6suip+I7FEk/oJz69sFaXeu9CoT2nIVFetBW3D2xkEMk:B6POsF4CoT2OeYMzMk
                                                                                            MD5:4E8DF049F3459FA94AB6AD387F3561AC
                                                                                            SHA1:06ED392BC29AD9D5FC05EE254C2625FD65925114
                                                                                            SHA-256:25A4DAE37120426AB060EBB39B7030B3E7C1093CC34B0877F223B6843B651871
                                                                                            SHA-512:3DD4A86F83465989B2B30C240A7307EDD1B92D5C1D5C57D47EFF287DC9DAA7BACE157017908D82E00BE90F08FF5BADB68019FFC9D881440229DCEA5038F61CD6
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l$...JO..JO..JO.u.O..JO?oKN..JO?oIN..JO?oON..JO?oNN..JO.mKN..JO-nKN..JO..KO~.JO-nNN..JO-nJN..JO-n.O..JO-nHN..JORich..JO........PE..L....@.\.........."!.........b...............................................P.......|....@..........................................0..x....................@..`.......T...........................(...@...............l............................text.............................. ..`.rdata...D.......F..................@..@.data........ ......................@....rsrc...x....0......................@..@.reloc..`....@......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\ucrtbase.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1142072
                                                                                            Entropy (8bit):6.809041027525523
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:bZBmnrh2YVAPROs7Bt/tX+/APcmcvIZPoy4TbK:FBmF2lIeaAPgb
                                                                                            MD5:D6326267AE77655F312D2287903DB4D3
                                                                                            SHA1:1268BEF8E2CA6EBC5FB974FDFAFF13BE5BA7574F
                                                                                            SHA-256:0BB8C77DE80ACF9C43DE59A8FD75E611CC3EB8200C69F11E94389E8AF2CEB7A9
                                                                                            SHA-512:11DB71D286E9DF01CB05ACEF0E639C307EFA3FEF8442E5A762407101640AC95F20BAD58F0A21A4DF7DBCDA268F934B996D9906434BF7E575C4382281028F64D4
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........E..............o........p..................................................................Rich............................PE..L....3............!.....Z...........=.......p...............................p............@A........................`................................0..8=......$... ...T...........................H...@............................................text....Z.......Z.................. ..`.data........p.......^..............@....idata..6............l..............@..@.rsrc...............................@..@.reloc..$...........................@..B........................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\gC9tT2iQ3s\vcruntime140.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):83784
                                                                                            Entropy (8bit):6.890347360270656
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:AQXQNgAuCDeHFtg3uYQkDqiVsv39niI35kU2yecbVKHHwhbfugbZyk:AQXQNVDeHFtO5d/A39ie6yecbVKHHwJF
                                                                                            MD5:7587BF9CB4147022CD5681B015183046
                                                                                            SHA1:F2106306A8F6F0DA5AFB7FC765CFA0757AD5A628
                                                                                            SHA-256:C40BB03199A2054DABFC7A8E01D6098E91DE7193619EFFBD0F142A7BF031C14D
                                                                                            SHA-512:0B63E4979846CEBA1B1ED8470432EA6AA18CCA66B5F5322D17B14BC0DFA4B2EE09CA300A016E16A01DB5123E4E022820698F46D9BAD1078BD24675B4B181E91F
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........NE...E...E.....".G...L.^.N...E...l.......U.......V.......A......._.......D.....2.D.......D...RichE...........PE..L....8'Y.........."!......... ...............................................@............@A......................................... ..................H?...0..........8...............................@............................................text............................... ..`.data...D...........................@....idata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\machineinfo.txt
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:ASCII text, with CRLF, CR line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1105
                                                                                            Entropy (8bit):5.28003162862424
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:DlAS7fH/l3ezy53Net5IZdBqhKQa7/CGik/R8RAuLTvqzh:BAS7f93d3NetCBgeCGik/R0As0h
                                                                                            MD5:B1169B9F4FA76ED942818F829D6D354D
                                                                                            SHA1:1FEA6B4FCDB5BC6679A0C62FD26502EE54089253
                                                                                            SHA-256:EB67C403ECC4B46C3C5E9F3EB099461F27FC9C1B0D87BCE7591D505AF455DD45
                                                                                            SHA-512:7F0727C408372A899E0245238D958ACF42B98F53160770569C0B2C434A6309A63F2EDCA34CAB5ECF4A704AB5EAA6D1D0463353C2EF4B9B8D0F502671503F5731
                                                                                            Malicious:false
                                                                                            Preview: Raccoon | 1.7.3...Build compile date: Sat Feb 27 21:25:06 2021...Launched at: 2021.04.12 - 11:46:46 GMT...Bot_ID: D06ED635-68F6-4E9A-955C-4899F5F57B9A_user...Running on a desktop......-------------...... - Cookies: 1... - Passwords: 0... - Files: 0......System Information:... - System Language: English... - System TimeZone: +1 hrs... - IP: 84.17.52.3... - Location: 47.431702, 8.575900 | Zurich, Zurich, Switzerland (8152)... - ComputerName: 128757... - Username: user... - Windows version: NT 10.0... - Product name: Windows 10 Pro... - System arch: x64... - CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (4 cores)... - RAM: 8191 MB (5413 MB used)... - Screen resolution: 1280x1024... - Display devices:....0) Microsoft Basic Display Adapter......-------------......Installed Apps: ....Adobe Acrobat Reader DC (19.012.20035)....Adobe Refresh Manager (1.8.0)....Google Chrome (85.0.4183.121)....Google Update Helper (1.3.35.451)....Java 8 Update 211 (8.0.2110.12)....Java Auto Updat
                                                                                            C:\Users\user\AppData\LocalLow\oftDgkJOkNj.zip
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:Zip archive data, at least v2.0 to extract
                                                                                            Category:dropped
                                                                                            Size (bytes):1189
                                                                                            Entropy (8bit):7.483857114359707
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:9cjnbAJa0JDVW7FD0bIOHqCq6HJDE3CW2QD+aAsl:9cjnMPJZCNVqqfXL3DHl
                                                                                            MD5:DE4C84F52402A0B42BE2A86D66314955
                                                                                            SHA1:594B0EBD2EF659442D2203A762D5A07BF0C20E23
                                                                                            SHA-256:F13633256ED4691EB86B4B9CED65A92E6480BC58AE81540EB68CE708815EDB31
                                                                                            SHA-512:F64881AE605602FE52DC86DDADD9A6DAF6AD056D606DBFAFC80F52E8DA398501CD22836585C8F9B6217A1F0CA4F0F798BBF9085686B1C307C8CFA1ED22C28238
                                                                                            Malicious:false
                                                                                            Preview: PK.........m.RH.._........*...browsers/cookies/Google Chrome_Default.txtUT...@Ot`@Ot`@Ot`%..r.0...5..hCR.a.E.."J}.N....WBu..~}.=..T...<j';~..........4...^.2..y...V...~..h....|.2 }...9L@J..D=.F...^'......u.............i.%o.*J1B...Fr..._.!.%..`....e:....Q;.~....x{.....O.PK.........m.Rs2......Q.......System Info.txtUT...FOt`FOt`FOt`uS.n.0.}.......$...i....A.b@_..V...eHvo..N.^....|xH...Jf.1%..FB.|.7..!3.J..rY.........g.....S.~).2..d..0B}.8........b..5...4.).f.... ..#....X....x.."...._S*.N..,u...PB..Cm*..>.....c..r...XJ.....4..O<..W.=\....e.M.t..r).m#.(.....>.7z.n0..~0.Y.Y/..D.DH.?...&;..~H|....BDD(bJ..7..........We.Y.0....2.US+{%..0.Q(..t.-.p/b...en..<*...\m.Q.K..&o....=....\i.]...g..NP.Z.....j.Y.y.C.`U?......+.|.+.\_.*].H,f...@..k/.Sy.XgV......Q9,.>3.....U.|..x.....ot...Y..}.c.t.FKsY.p_..E.jY.8.iU.....)H1....J.\Y.N`.bB.'.RO..+u...`!K...<..z .......+. ..,.pe.G.u.n....:...'./.._.QB.8c....b.wJ..ca..Y .gt.8..~x...q.4N..Uf..~.}?.y.....a..._...
                                                                                            C:\Users\user\AppData\LocalLow\rQF69AzBla
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                                            Category:dropped
                                                                                            Size (bytes):20480
                                                                                            Entropy (8bit):0.7006690334145785
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                                                                            MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                                                                            SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                                                                            SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                                                                            SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                                                                            Malicious:false
                                                                                            Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            C:\Users\user\AppData\LocalLow\sqlite3.dll
                                                                                            Process:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):916735
                                                                                            Entropy (8bit):6.514932604208782
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:BJDwWdxW2SBNTjlY24eJoyGttl3+FZVpsq/2W:BJDvx0BY24eJoyctl3+FTX
                                                                                            MD5:F964811B68F9F1487C2B41E1AEF576CE
                                                                                            SHA1:B423959793F14B1416BC3B7051BED58A1034025F
                                                                                            SHA-256:83BC57DCF282264F2B00C21CE0339EAC20FCB7401F7C5472C0CD0C014844E5F7
                                                                                            SHA-512:565B1A7291C6FCB63205907FCD9E72FC2E11CA945AFC4468C378EDBA882E2F314C2AC21A7263880FF7D4B84C2A1678024C1AC9971AC1C1DE2BFA4248EC0F98C4
                                                                                            Malicious:false
                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....t\...........!.....Z...................p.....a.......................................... .......................... ......H.... .......................0...3...................................................................................text...XX.......Z..................`.P`.data........p.......`..............@.`..rdata........... ...|..............@.`@.bss....(.............................`..edata... ......."..................@.0@.idata..H...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc...3...0...4..................@.0B/4...........p......................@.@B/19................................@..B/31.......... ......................@..B/45..........@......................@..B/57..........`......................@.0B/70.....i....p..........
                                                                                            \Device\Null
                                                                                            Process:C:\Windows\SysWOW64\timeout.exe
                                                                                            File Type:ASCII text, with CRLF line terminators, with overstriking
                                                                                            Category:dropped
                                                                                            Size (bytes):92
                                                                                            Entropy (8bit):4.300553674183507
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:hYFEHgARcWmFsFJQZtctFst3g4t32vov:hYFE1mFSQZi3MXt3X
                                                                                            MD5:F74899957624A2837F2F86E8E62E92D4
                                                                                            SHA1:1FCDAC5DEC5B0B1E00CF0247DA2A5F18566F1431
                                                                                            SHA-256:507992A303C447D1D40D36E2E5163A237077B94F23A7089AC90A2F08682AE9BC
                                                                                            SHA-512:E3FD14728633614B6552A75C15079AC8B04C0E8B3F49535B522C73312B1C812E30A934099AB18B507A0B4878068987D5545E90FA3747F7E7B10360EE324DB435
                                                                                            Malicious:false
                                                                                            Preview: ..Waiting for 10 seconds, press CTRL+C to quit ..... 9.. 8.. 7.. 6.. 5.. 4.. 3.. 2.. 1.. 0..

                                                                                            Static File Info

                                                                                            General

                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):5.9851814401155865
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 99.15%
                                                                                            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            File size:86016
                                                                                            MD5:ff684bf547b6f692c53f80779dc5ee7b
                                                                                            SHA1:fe4116a2cfa9cadde500c900f605742d5ddabf10
                                                                                            SHA256:5cc3fcd6bc68db6107493ae5a1d9adfaa4cc210195c2c5f05d3059cd35ba2e09
                                                                                            SHA512:20a375965f8ea1650b18f2fbf093eb8a2cdfe33361600e97f385a439e02788ee178a0a400cff7da2bfabf59e792c7b9275257c584f2e6b4d72a92dd5af8dc160
                                                                                            SSDEEP:768:glTzXt3zSxhjTphA8Es0svVd1ZZv/Nyr61dVWHCuMvdvckklVGDIvoK:0t3zSxbHv3nZnn1dVWiukdvr3Df
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.......0...~...0.......0...Rich1...........PE..L....d.S................. ... ......(........0....@................

                                                                                            File Icon

                                                                                            Icon Hash:78e88eb2b2968e00

                                                                                            Static PE Info

                                                                                            General

                                                                                            Entrypoint:0x401428
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                                            DLL Characteristics:
                                                                                            Time Stamp:0x538D64E1 [Tue Jun 3 06:02:09 2014 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:03caa17dce14fbc05445954edc0329b9

                                                                                            Entrypoint Preview

                                                                                            Instruction
                                                                                            push 0040CDA0h
                                                                                            call 00007F0BEC759393h
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            xor byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            inc eax
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [ecx+20h], dh
                                                                                            jmp 00007F0BEC75941Eh
                                                                                            xchg eax, ebp
                                                                                            mov bl, 8Eh
                                                                                            inc edx
                                                                                            mov ecx, ebx
                                                                                            push FFFFFFC4h
                                                                                            bound esp, dword ptr [esp]
                                                                                            jo 00007F0BEC75940Ah
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add dword ptr [eax], eax
                                                                                            add byte ptr [eax], al
                                                                                            inc edx
                                                                                            imul ebp, dword ptr [bp+20h], 736C6568h
                                                                                            jnc 00007F0BEC759416h
                                                                                            jc 00007F0BEC759407h
                                                                                            add byte ptr [ecx+6Dh], cl
                                                                                            popad
                                                                                            xor dword ptr [bx+si], esp
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            dec esp
                                                                                            xor dword ptr [eax], eax
                                                                                            sub dword ptr [edi-3034D7ABh], edx
                                                                                            mov ebx, E8A44049h
                                                                                            sar dword ptr [eax+7BD69744h], 1
                                                                                            out 25h, eax
                                                                                            xchg eax, ebx
                                                                                            xor esi, eax
                                                                                            push eax
                                                                                            jnbe 00007F0BEC7593ECh
                                                                                            mov ebp, CA0B8BBFh
                                                                                            call 00007F0C3BAFFAC2h
                                                                                            lodsd
                                                                                            xor ebx, dword ptr [ecx-48EE309Ah]
                                                                                            or al, 00h
                                                                                            stosb
                                                                                            add byte ptr [eax-2Dh], ah
                                                                                            xchg eax, ebx
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            inc esp
                                                                                            mov eax, 0A4A0000h
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [edi], al
                                                                                            add byte ptr [ebp+6Bh], ah
                                                                                            jne 00007F0BEC759412h
                                                                                            jc 00007F0BEC759403h
                                                                                            add byte ptr [4D000901h], cl
                                                                                            popad
                                                                                            jc 00007F0BEC75940Dh
                                                                                            jnc 00007F0BEC75940Fh

                                                                                            Data Directories

                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x129940x28.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000xd6a.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x128.text
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                            Sections

                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x11eb40x12000False0.365003797743data6.55269497332IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                            .data0x130000xa840x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0x140000xd6a0x1000False0.215087890625data2.80571139189IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                            Resources

                                                                                            NameRVASizeTypeLanguageCountry
                                                                                            RT_ICON0x148020x568GLS_BINARY_LSB_FIRST
                                                                                            RT_ICON0x1439a0x468GLS_BINARY_LSB_FIRST
                                                                                            RT_GROUP_ICON0x143780x22data
                                                                                            RT_VERSION0x141200x258dataEnglishUnited States

                                                                                            Imports

                                                                                            DLLImport
                                                                                            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaVarForInit, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaAryConstruct2, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, __vbaStrComp, __vbaFpI4, _CIatan, __vbaStrMove, __vbaAryCopy, _allmul, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

                                                                                            Version Infos

                                                                                            DescriptionData
                                                                                            Translation0x0409 0x04b0
                                                                                            InternalNameEleciv
                                                                                            FileVersion3.00
                                                                                            CompanyNameSalty
                                                                                            CommentsSalty
                                                                                            ProductNameSalty
                                                                                            ProductVersion3.00
                                                                                            FileDescriptionSalty
                                                                                            OriginalFilenameEleciv.exe

                                                                                            Possible Origin

                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States

                                                                                            Network Behavior

                                                                                            Network Port Distribution

                                                                                            TCP Packets

                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 12, 2021 13:46:35.355374098 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.403286934 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.403453112 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.404239893 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.449498892 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.463149071 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.463193893 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.463221073 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.463246107 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.463296890 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.463330030 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.483303070 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.528862953 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.529005051 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.530431032 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.580280066 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.809793949 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.809844017 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.809866905 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.809883118 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.809910059 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.809917927 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.809964895 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.809972048 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.810106039 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.812912941 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.812942982 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.813009977 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.813034058 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.816040039 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.816082001 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.816214085 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.819293976 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.819375992 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.819427013 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.819469929 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.822422028 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.822484970 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.822491884 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.822542906 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.825640917 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.825699091 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.825748920 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.825766087 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.855245113 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.855321884 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.855354071 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.855422020 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.856708050 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.856762886 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.856833935 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.856977940 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.859898090 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.859956980 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.860004902 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.860025883 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.863085032 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.863145113 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.863181114 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.863224983 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.866276979 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.866331100 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.866379023 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.866400003 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.869472027 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.869530916 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.869612932 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.869663000 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.872642040 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.872701883 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.872756958 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.872797012 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.875857115 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.875910997 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.876022100 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.878969908 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.879021883 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.879064083 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.879090071 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.881815910 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.881874084 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.881946087 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.881992102 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.884684086 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.884742975 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.884862900 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.887542009 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.887636900 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.887645006 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.887695074 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.890506029 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.890587091 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.890645981 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.890692949 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.893255949 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.893317938 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.893357038 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.893405914 CEST49760443192.168.2.4216.58.215.225
                                                                                            Apr 12, 2021 13:46:35.896123886 CEST44349760216.58.215.225192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.896178007 CEST44349760216.58.215.225192.168.2.4

                                                                                            UDP Packets

                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 12, 2021 13:44:51.982223988 CEST4925753192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:44:52.032768965 CEST53492578.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:44:52.357666016 CEST6238953192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:44:52.423392057 CEST53623898.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:44:53.077202082 CEST4991053192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:44:53.128851891 CEST53499108.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:44:53.958153963 CEST5585453192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:44:54.019855976 CEST53558548.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:07.646945000 CEST6454953192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:07.695929050 CEST53645498.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:09.371076107 CEST6315353192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:09.425558090 CEST53631538.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:19.818453074 CEST5299153192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:19.870038986 CEST53529918.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:20.649601936 CEST5370053192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:20.700190067 CEST53537008.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:24.515872002 CEST5172653192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:24.567379951 CEST53517268.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:25.574709892 CEST5679453192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:25.623337030 CEST53567948.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:26.458292961 CEST5653453192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:26.506928921 CEST53565348.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:26.912539005 CEST5662753192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:26.969578028 CEST53566278.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:27.303339958 CEST5662153192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:27.352294922 CEST53566218.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:35.621349096 CEST6311653192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:35.670145988 CEST53631168.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:36.642209053 CEST6311653192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:36.691006899 CEST53631168.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:37.645951033 CEST6311653192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:37.709942102 CEST53631168.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:43.910093069 CEST6407853192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:43.959032059 CEST53640788.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:51.195035934 CEST6480153192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:51.245913982 CEST53648018.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:52.419703960 CEST6172153192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:52.481066942 CEST53617218.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:56.100053072 CEST5125553192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:56.152636051 CEST53512558.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:45:56.998831987 CEST6152253192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:45:57.051172018 CEST53615228.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:00.067297935 CEST5233753192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:00.125669956 CEST53523378.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:23.559746027 CEST5504653192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:23.608792067 CEST53550468.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:27.923116922 CEST4961253192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:27.997172117 CEST53496128.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:30.554230928 CEST4928553192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:30.605772972 CEST53492858.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:31.610992908 CEST5060153192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:31.671179056 CEST53506018.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:33.173959017 CEST6087553192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:33.225608110 CEST53608758.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:34.082685947 CEST5644853192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:34.147787094 CEST53564488.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:35.282506943 CEST5917253192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:35.352575064 CEST53591728.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:36.147361040 CEST6242053192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:36.209517956 CEST53624208.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:46:36.581806898 CEST6057953192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:46:36.639439106 CEST53605798.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:47:00.111402988 CEST5018353192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:47:00.165400982 CEST53501838.8.8.8192.168.2.4
                                                                                            Apr 12, 2021 13:47:01.812514067 CEST6153153192.168.2.48.8.8.8
                                                                                            Apr 12, 2021 13:47:01.879749060 CEST53615318.8.8.8192.168.2.4

                                                                                            DNS Queries

                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                            Apr 12, 2021 13:46:35.282506943 CEST192.168.2.48.8.8.80x5b60Standard query (0)doc-00-7g-docs.googleusercontent.comA (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 13:46:36.147361040 CEST192.168.2.48.8.8.80xf2daStandard query (0)telete.inA (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 13:46:36.581806898 CEST192.168.2.48.8.8.80xec47Standard query (0)belochkaneprihoditodna.topA (IP address)IN (0x0001)

                                                                                            DNS Answers

                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                            Apr 12, 2021 13:46:35.352575064 CEST8.8.8.8192.168.2.40x5b60No error (0)doc-00-7g-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)
                                                                                            Apr 12, 2021 13:46:35.352575064 CEST8.8.8.8192.168.2.40x5b60No error (0)googlehosted.l.googleusercontent.com216.58.215.225A (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 13:46:36.209517956 CEST8.8.8.8192.168.2.40xf2daNo error (0)telete.in195.201.225.248A (IP address)IN (0x0001)
                                                                                            Apr 12, 2021 13:46:36.639439106 CEST8.8.8.8192.168.2.40xec47No error (0)belochkaneprihoditodna.top195.123.215.115A (IP address)IN (0x0001)

                                                                                            HTTPS Packets

                                                                                            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                                            Apr 12, 2021 13:46:35.463246107 CEST216.58.215.225443192.168.2.449760CN=*.googleusercontent.com, O=Google LLC, L=Mountain View, ST=California, C=US CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GTS CA 1O1, O=Google Trust Services, C=US CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Tue Mar 16 20:32:57 CET 2021 Thu Jun 15 02:00:42 CEST 2017Tue Jun 08 21:32:56 CEST 2021 Wed Dec 15 01:00:42 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                                                            CN=GTS CA 1O1, O=Google Trust Services, C=USCN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2Thu Jun 15 02:00:42 CEST 2017Wed Dec 15 01:00:42 CET 2021
                                                                                            Apr 12, 2021 13:46:36.356210947 CEST195.201.225.248443192.168.2.449761CN=telecut.in CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Wed Feb 17 11:17:19 CET 2021 Wed Oct 07 21:21:40 CEST 2020Tue May 18 12:17:19 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                                                                                            CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                                                                                            Apr 12, 2021 13:46:36.787753105 CEST195.123.215.115443192.168.2.449762CN=belochkaneprihoditodna.top CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sat Apr 10 18:07:01 CEST 2021 Wed Oct 07 21:21:40 CEST 2020Fri Jul 09 18:07:01 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                                                                                            CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                                                                                            Code Manipulations

                                                                                            Statistics

                                                                                            Behavior

                                                                                            Click to jump to process

                                                                                            System Behavior

                                                                                            General

                                                                                            Start time:13:44:54
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
                                                                                            Imagebase:0x400000
                                                                                            File size:86016 bytes
                                                                                            MD5 hash:FF684BF547B6F692C53F80779DC5EE7B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:Visual Basic
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:13:46:01
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
                                                                                            Imagebase:0x400000
                                                                                            File size:86016 bytes
                                                                                            MD5 hash:FF684BF547B6F692C53F80779DC5EE7B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 0000000C.00000002.877495152.0000000000561000.00000040.00000001.sdmp, Author: Joe Security
                                                                                            Reputation:low

                                                                                            General

                                                                                            Start time:13:46:47
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q 'C:\Users\user\Desktop\Anmodning om tilbud 12-04-2021#U00b7pdf.exe'
                                                                                            Imagebase:0x11d0000
                                                                                            File size:232960 bytes
                                                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:13:46:48
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff724c50000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:13:46:48
                                                                                            Start date:12/04/2021
                                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:timeout /T 10 /NOBREAK
                                                                                            Imagebase:0x8a0000
                                                                                            File size:26112 bytes
                                                                                            MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Disassembly

                                                                                            Code Analysis

                                                                                            Reset < >