Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RECHNUNG-RP0188843894.exe

Overview

General Information

Sample Name:RECHNUNG-RP0188843894.exe
Analysis ID:679140
MD5:e366f96c9b5c5528426a116eb49ef445
SHA1:8062220b613b56116d638b3d7f5dd043f3bc096e
SHA256:2a05a23d8879f9d001af335779b5102dd644b08d2f106353c28c8ce303ee9b58
Tags:exe
Infos:

Detection

NetWire
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected NetWire RAT
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • RECHNUNG-RP0188843894.exe (PID: 5900 cmdline: "C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe" MD5: E366F96C9B5C5528426A116EB49EF445)
    • powershell.exe (PID: 4684 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6136 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RECHNUNG-RP0188843894.exe (PID: 5296 cmdline: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe MD5: E366F96C9B5C5528426A116EB49EF445)
  • cleanup
{"C2 list": ["xman2.duckdns.org:4433"], "Password": "Password", "Host ID": "HostId-%Rand%", "Mutex": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
SourceRuleDescriptionAuthorStrings
00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
  • 0x9e4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
  • 0xaf8:$s3: [Log Started] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
  • 0xb2c:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
    00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Netwire_1b43df38unknownunknown
    • 0xb08:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0xb33:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0x1b1a:$a2: \Login Data
    • 0x1b99:$a2: \Login Data
    • 0x1c22:$a2: \Login Data
    • 0x1cb9:$a2: \Login Data
    • 0x1d68:$a2: \Login Data
    • 0x1e05:$a2: \Login Data
    • 0x1e5e:$a2: \Login Data
    • 0x99c:$a3: SOFTWARE\NetWire
    00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
    • 0x9e4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    • 0xaf8:$s3: [Log Started] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0xb2c:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
      Click to see the 12 entries
      SourceRuleDescriptionAuthorStrings
      8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
      • 0x34fe4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      • 0x350f8:$s3: [Log Started] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
      • 0x3512c:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
      8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
        8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackMALWARE_Win_NetWireDetects NetWire RATditekSHen
        • 0x34f9c:$x1: SOFTWARE\NetWire
        • 0x34f44:$x2: 4E 65 74 57 69 72 65 00 53 4F 46 54 57 41 52 45 5C 00
        • 0x34fe4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        • 0x34fc8:$s3: GET %s HTTP/1.1
        • 0x35108:$s4: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x35133:$s4: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x34e84:$s6: -m "%s"
        • 0x34f94:$g1: HostId
        • 0x35f7c:$g2: History
        • 0x35fcc:$g3: encrypted_key
        • 0x34fb0:$g4: Install Date
        • 0x35bd8:$g5: hostname
        • 0x35be4:$g6: encryptedUsername
        • 0x35bf8:$g7: encryptedPassword
        8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackWindows_Trojan_Netwire_1b43df38unknownunknown
        • 0x35108:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x35133:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x3611a:$a2: \Login Data
        • 0x36199:$a2: \Login Data
        • 0x36222:$a2: \Login Data
        • 0x362b9:$a2: \Login Data
        • 0x36368:$a2: \Login Data
        • 0x36405:$a2: \Login Data
        • 0x3645e:$a2: \Login Data
        • 0x34f9c:$a3: SOFTWARE\NetWire
        0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
          Click to see the 23 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: RECHNUNG-RP0188843894.exeVirustotal: Detection: 21%Perma Link
          Source: RECHNUNG-RP0188843894.exeReversingLabs: Detection: 17%
          Source: xman2.duckdns.orgVirustotal: Detection: 14%Perma Link
          Source: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeVirustotal: Detection: 21%Perma Link
          Source: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeReversingLabs: Detection: 17%
          Source: RECHNUNG-RP0188843894.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJoe Sandbox ML: detected
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpackMalware Configuration Extractor: NetWire {"C2 list": ["xman2.duckdns.org:4433"], "Password": "Password", "Host ID": "HostId-%Rand%", "Mutex": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
          Source: RECHNUNG-RP0188843894.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: RECHNUNG-RP0188843894.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: xman2.duckdns.org:4433
          Source: unknownDNS query: name: xman2.duckdns.org
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: Joe Sandbox ViewIP Address: 154.53.40.254 154.53.40.254
          Source: global trafficTCP traffic: 192.168.2.3:49742 -> 154.53.40.254:4433
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://%s%%s%.2d-%.2d-%.4d
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: xman2.duckdns.org
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.291116918.00000000016C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputData

          System Summary

          barindex
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: RECHNUNG-RP0188843894.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165C3640_2_0165C364
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165E7200_2_0165E720
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165E7300_2_0165E730
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB578180_2_0BB57818
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB500060_2_0BB50006
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB500400_2_0BB50040
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB58E080_2_0BB58E08
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.291116918.00000000016C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.295371420.0000000004B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.292299190.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.303787376.000000000B8C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000003.271470955.0000000007B46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBinaryWri.exe: vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000000.250787164.0000000000FFF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBinaryWri.exe: vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exeBinary or memory string: OriginalFilenameBinaryWri.exe: vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: rWWREmAZOgElhb.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: RECHNUNG-RP0188843894.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: rWWREmAZOgElhb.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: RECHNUNG-RP0188843894.exeVirustotal: Detection: 21%
          Source: RECHNUNG-RP0188843894.exeReversingLabs: Detection: 17%
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeJump to behavior
          Source: RECHNUNG-RP0188843894.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe "C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe"
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmpJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile created: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile created: C:\Users\user\AppData\Local\Temp\tmp58ED.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/8@61/2
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: RECHNUNG-RP0188843894.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5668:120:WilError_01
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeMutant created: \Sessions\1\BaseNamedObjects\-
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeMutant created: \Sessions\1\BaseNamedObjects\UGuYsqINzELkVGLDAodcCAWpBT
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4700:120:WilError_01
          Source: RECHNUNG-RP0188843894.exe, Lib_Mang_Sys/Member_Panel.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: rWWREmAZOgElhb.exe.0.dr, Lib_Mang_Sys/Member_Panel.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.RECHNUNG-RP0188843894.exe.ec0000.0.unpack, Lib_Mang_Sys/Member_Panel.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: RECHNUNG-RP0188843894.exeStatic file information: File size 1299456 > 1048576
          Source: RECHNUNG-RP0188843894.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: RECHNUNG-RP0188843894.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: RECHNUNG-RP0188843894.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

          Data Obfuscation

          barindex
          Source: RECHNUNG-RP0188843894.exe, Lib_Mang_Sys/Member_Panel.cs.Net Code: DataReturn System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: rWWREmAZOgElhb.exe.0.dr, Lib_Mang_Sys/Member_Panel.cs.Net Code: DataReturn System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.RECHNUNG-RP0188843894.exe.ec0000.0.unpack, Lib_Mang_Sys/Member_Panel.cs.Net Code: DataReturn System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165BB31 push E001AFA9h; ret 0_2_0165BB3D
          Source: RECHNUNG-RP0188843894.exeStatic PE information: 0xEDF14A3D [Sun Jul 1 20:36:13 2096 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.588133806696738
          Source: initial sampleStatic PE information: section name: .text entropy: 7.588133806696738
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile created: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTR
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 5916Thread sleep time: -45877s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 980Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5904Thread sleep time: -5534023222112862s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 5276Thread sleep count: 60 > 30Jump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 5276Thread sleep time: -4500000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9194Jump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 45877Jump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 75000Jump to behavior
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmpJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          11
          Process Injection
          1
          Masquerading
          21
          Input Capture
          21
          Security Software Discovery
          Remote Services21
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
          Virtualization/Sandbox Evasion
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer21
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common2
          Obfuscated Files or Information
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items12
          Software Packing
          DCSync12
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          RECHNUNG-RP0188843894.exe21%VirustotalBrowse
          RECHNUNG-RP0188843894.exe18%ReversingLabsByteCode-MSIL.Trojan.LokiBot
          RECHNUNG-RP0188843894.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe21%VirustotalBrowse
          C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe18%ReversingLabsByteCode-MSIL.Trojan.LokiBot
          No Antivirus matches
          SourceDetectionScannerLabelLink
          xman2.duckdns.org15%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          xman2.duckdns.org:44330%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://%s%%s%.2d-%.2d-%.4d0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          xman2.duckdns.org
          154.53.40.254
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          xman2.duckdns.org:4433true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://%s%%s%.2d-%.2d-%.4dRECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sakkal.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                154.53.40.254
                                xman2.duckdns.orgUnited States
                                174COGENT-174UStrue
                                IP
                                192.168.2.1
                                Joe Sandbox Version:35.0.0 Citrine
                                Analysis ID:679140
                                Start date and time: 05/08/202210:35:082022-08-05 10:35:08 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 6m 46s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:RECHNUNG-RP0188843894.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:31
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@9/8@61/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 87%
                                • Number of executed functions: 27
                                • Number of non-executed functions: 6
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Adjust boot time
                                • Enable AMSI
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                10:36:20API Interceptor62x Sleep call for process: RECHNUNG-RP0188843894.exe modified
                                10:36:27API Interceptor40x Sleep call for process: powershell.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                154.53.40.254SV38848934334.exeGet hashmaliciousBrowse
                                  SVD0038847748.exeGet hashmaliciousBrowse
                                    SVR00398488.exeGet hashmaliciousBrowse
                                      INV004838487834.exeGet hashmaliciousBrowse
                                        RO11039484.exeGet hashmaliciousBrowse
                                          R003823878.exeGet hashmaliciousBrowse
                                            INv002388923899.exeGet hashmaliciousBrowse
                                              NV003974844.exeGet hashmaliciousBrowse
                                                NV003974844.exeGet hashmaliciousBrowse
                                                  KrXYpDyusm.exeGet hashmaliciousBrowse
                                                    DHL0038747896.exeGet hashmaliciousBrowse
                                                      DHL0038747896.exeGet hashmaliciousBrowse
                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                          DHL0038747896.exeGet hashmaliciousBrowse
                                                            DHL0038747896.exeGet hashmaliciousBrowse
                                                              DHL0038747896.exeGet hashmaliciousBrowse
                                                                USPS0038747.exeGet hashmaliciousBrowse
                                                                  SVD79163628822.exeGet hashmaliciousBrowse
                                                                    SV019378345.exeGet hashmaliciousBrowse
                                                                      R01937763.exeGet hashmaliciousBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        xman2.duckdns.orgSV38848934334.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        SVD0038847748.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        SVR00398488.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        INV004838487834.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        RO11039484.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        R003823878.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        INv002388923899.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        NV003974844.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        NV003974844.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        KrXYpDyusm.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        DHL0038747896.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        USPS0038747.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        SVD79163628822.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        SV019378345.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                        COGENT-174USlY1CZxl2asGet hashmaliciousBrowse
                                                                        • 206.237.133.130
                                                                        xd.mpslGet hashmaliciousBrowse
                                                                        • 154.56.16.90
                                                                        xd.mipsGet hashmaliciousBrowse
                                                                        • 38.91.232.213
                                                                        xd.x86Get hashmaliciousBrowse
                                                                        • 69.80.237.146
                                                                        PRE-ALERT IOF22-23BLB1399.exeGet hashmaliciousBrowse
                                                                        • 38.49.8.223
                                                                        Sat#U0131n Alma Emri Metak_JJO-003, PDF.exeGet hashmaliciousBrowse
                                                                        • 38.40.247.213
                                                                        zH4aQ6xq4y.exeGet hashmaliciousBrowse
                                                                        • 38.53.100.53
                                                                        3ofFBmyS2H.exeGet hashmaliciousBrowse
                                                                        • 154.38.96.12
                                                                        QycmdYRLL0.exeGet hashmaliciousBrowse
                                                                        • 154.53.32.96
                                                                        r7QEABnuNrGet hashmaliciousBrowse
                                                                        • 149.110.96.139
                                                                        Purchase-Order737883874.exeGet hashmaliciousBrowse
                                                                        • 38.35.100.206
                                                                        home.x86_64Get hashmaliciousBrowse
                                                                        • 206.62.82.67
                                                                        SV38848934334.exeGet hashmaliciousBrowse
                                                                        • 154.53.40.254
                                                                        tjymRNVgJ6Get hashmaliciousBrowse
                                                                        • 143.241.154.80
                                                                        xLzr2Gi7QyGet hashmaliciousBrowse
                                                                        • 38.151.35.203
                                                                        t6bwEs3d5W.exeGet hashmaliciousBrowse
                                                                        • 38.26.142.239
                                                                        N9vBk22I3tGet hashmaliciousBrowse
                                                                        • 38.54.37.8
                                                                        5VOJ8ukAacGet hashmaliciousBrowse
                                                                        • 149.86.134.190
                                                                        Hz6yACOgOqGet hashmaliciousBrowse
                                                                        • 206.232.66.98
                                                                        Gc32HooE4yGet hashmaliciousBrowse
                                                                        • 154.3.74.151
                                                                        No context
                                                                        No context
                                                                        Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):1750
                                                                        Entropy (8bit):5.3375092442007315
                                                                        Encrypted:false
                                                                        SSDEEP:48:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzvFHYHKlEHUzvAHj:Pq5qXEwCYqhQnoPtIxHeqzN4qm0z4D
                                                                        MD5:92FEE17DD9A6925BA2D1E5EF2CD6E5F2
                                                                        SHA1:4614AE0DD188A0FE1983C5A8D82A69AF5BD13039
                                                                        SHA-256:67351D6FA9F9E11FD21E72581AFDC8E63A284A6080D99A6390641FC11C667235
                                                                        SHA-512:C599C633D288B845A7FAA31FC0FA86EAB8585CC2C515D68CA0DFC6AB16B27515A5D729EF535109B2CDE29FF3CF4CF725F4F920858501A2421FC7D76C804F2AA7
                                                                        Malicious:true
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):22272
                                                                        Entropy (8bit):5.6027188324374535
                                                                        Encrypted:false
                                                                        SSDEEP:384:TtCD60F+x6b9TtYS0nMjsh77Y9g9SJ3xa1BMrm7Z1AV7ag464I+iyY:z65TtYTMohf9cBa4yA
                                                                        MD5:77E6E1687BDD89C7F85A8C47BF26E0E4
                                                                        SHA1:C8DCDA5CB81BD6D396C120DE2D9F49F0F7372AF9
                                                                        SHA-256:612CDA6AE4D2DD8DE394FE35782450112EE8EA0853CC4AC697B68D6DE63518E1
                                                                        SHA-512:3615659735FD74E97ECC4B6C5E78C3E426B2413AFB598DAE25EEC583118E8A6620FBC82B9ED3EEB41EC804653919F8DB6C43AFD7BCF75CD66AA64B6A486B0904
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:@...e...........y.........e.B.8.....@.B..............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:very short file (no magic)
                                                                        Category:dropped
                                                                        Size (bytes):1
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3:U:U
                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                        Malicious:false
                                                                        Reputation:high, very likely benign file
                                                                        Preview:1
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:very short file (no magic)
                                                                        Category:dropped
                                                                        Size (bytes):1
                                                                        Entropy (8bit):0.0
                                                                        Encrypted:false
                                                                        SSDEEP:3:U:U
                                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                        Malicious:false
                                                                        Reputation:high, very likely benign file
                                                                        Preview:1
                                                                        Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        File Type:XML 1.0 document, ASCII text
                                                                        Category:dropped
                                                                        Size (bytes):1601
                                                                        Entropy (8bit):5.153566916379303
                                                                        Encrypted:false
                                                                        SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtgvVxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTgvrv
                                                                        MD5:A390F07FE0E218E00223091926488958
                                                                        SHA1:5E2D9D09FF1167925B4EF3AF96708D5CBB0574FC
                                                                        SHA-256:FE2451F076CC5EEC42D4EED783E94A8773DBEC17BA99D23BBC3FC451346060BA
                                                                        SHA-512:A274F6DFC7820032EDA8FA974901D7E9FF471ABE6128399770B5B2CCC0F049F4C66F63E1E030D5A243EC362DAF533863F41C6DCF6E0979329AA49D08BB6D2ABB
                                                                        Malicious:true
                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                                        Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):1299456
                                                                        Entropy (8bit):7.136675750532489
                                                                        Encrypted:false
                                                                        SSDEEP:24576:iTJjpjM7KzOkDwPN2XanQBOrOlaLlpxtRYNNHV3lSpWBb62:EjW77kQNaaQB6w+tR63AEbT
                                                                        MD5:E366F96C9B5C5528426A116EB49EF445
                                                                        SHA1:8062220B613B56116D638B3D7F5DD043F3BC096E
                                                                        SHA-256:2A05A23D8879F9D001AF335779B5102DD644B08D2F106353C28C8CE303EE9B58
                                                                        SHA-512:1DC21DA10C45A5FBD5058E85D775CCCEC140A0FEC067183013457D7AB87F9BFD758429A999DF2B2BF0AFD19D44B289418C6A8457689346521764A812A0430E9D
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: Virustotal, Detection: 21%, Browse
                                                                        • Antivirus: ReversingLabs, Detection: 18%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=J................0..............L... ...`....@.. .......................@............@..................................L..O....`..4.................... .......L............................................... ............... ..H............text....-... ...................... ..`.rsrc...4....`.......0..............@..@.reloc....... ......................@..B.................L......H.......@...,P......$...l....z.............................................}.....(.......(......{.....o.....*....0..w........r...p..s.......~O.....o.....r$..p..B....(.......s........o......s..........o......{......o........&........,..o......*.........Tc..........]k.......0..:.........o ........,+..{....o!...o"....o#...o$....B......(......*...0..n........r...p..s........o.....r...p..B...(%.......(&.....B...('......s......o(.....r...p()...&...&........,..o......*..........KZ..
                                                                        Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):26
                                                                        Entropy (8bit):3.95006375643621
                                                                        Encrypted:false
                                                                        SSDEEP:3:ggPYV:rPYV
                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                        Malicious:true
                                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):5805
                                                                        Entropy (8bit):5.4162470391864685
                                                                        Encrypted:false
                                                                        SSDEEP:96:BZdSh7NpuqDo1Zm1ZQh7NpuqDo1Zztj1jZPh7NpuqDo1ZQIllPZs:Z63MQJ
                                                                        MD5:B137630C24F96036570C1BAA5B9239F2
                                                                        SHA1:6CC286C1FE58C6730CE716171D03956FA85200C4
                                                                        SHA-256:2E371FCC58D890D819E1CCB5F669DFBCC3DCBF8E0810787FCD597BFAFB26CD40
                                                                        SHA-512:0E85F55184B8BED1AF55AB18D3714F45A95B79C23ECA19AFE4E09095480C0DA0B70AA8DBE3C8AC4CE3975A64AEAAA24B4D5CD1D234546A02961093C267E687D9
                                                                        Malicious:false
                                                                        Preview:.**********************..Windows PowerShell transcript start..Start time: 20220805103627..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 579569 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe..Process ID: 4684..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220805103627..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe..**********************..Windows PowerShell transcript start..Start time: 20220805104006..Username: computer\user..RunAs User: DESKTOP-716T
                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):7.136675750532489
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                        File name:RECHNUNG-RP0188843894.exe
                                                                        File size:1299456
                                                                        MD5:e366f96c9b5c5528426a116eb49ef445
                                                                        SHA1:8062220b613b56116d638b3d7f5dd043f3bc096e
                                                                        SHA256:2a05a23d8879f9d001af335779b5102dd644b08d2f106353c28c8ce303ee9b58
                                                                        SHA512:1dc21da10c45a5fbd5058e85d775cccec140a0fec067183013457d7ab87f9bfd758429a999df2b2bf0afd19d44b289418c6a8457689346521764a812a0430e9d
                                                                        SSDEEP:24576:iTJjpjM7KzOkDwPN2XanQBOrOlaLlpxtRYNNHV3lSpWBb62:EjW77kQNaaQB6w+tR63AEbT
                                                                        TLSH:9855F1D153898B42CC6A0EB8E3122524C776EC7FEAFEC6C98DC7B8A695367C31550907
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=J................0..............L... ...`....@.. .......................@............@................................
                                                                        Icon Hash:d72e9cb139dccfcf
                                                                        Entrypoint:0x4d4cf2
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0xEDF14A3D [Sun Jul 1 20:36:13 2096 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        dec eax
                                                                        xor al, 46h
                                                                        pop edx
                                                                        push esp
                                                                        inc edi
                                                                        inc ebx
                                                                        pop eax
                                                                        cmp byte ptr [edi], dh
                                                                        pop eax
                                                                        xor al, 38h
                                                                        inc edx
                                                                        inc esi
                                                                        aaa
                                                                        xor al, 47h
                                                                        inc edx
                                                                        xor eax, 00003838h
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xd4ca00x4f.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000x6a034.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1420000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xd4c840x1c.text
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000xd2d100xd2e00False0.8411728475103735data7.588133806696738IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0xd60000x6a0340x6a200False0.5962322401354535data5.178213553665152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x1420000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountry
                                                                        RT_ICON0xd62b00x468GLS_BINARY_LSB_FIRST
                                                                        RT_ICON0xd67180x988data
                                                                        RT_ICON0xd70a00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4291831602, next used block 4291766318
                                                                        RT_ICON0xd81480x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4291963945, next used block 4291897384
                                                                        RT_ICON0xda6f00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4291961375, next used block 4291898412
                                                                        RT_ICON0xde9180x5488data
                                                                        RT_ICON0xe3da00x94a8data
                                                                        RT_ICON0xed2480x10828data
                                                                        RT_ICON0xfda700x42028data
                                                                        RT_GROUP_ICON0x13fa980x84data
                                                                        RT_VERSION0x13fb1c0x32cdata
                                                                        RT_MANIFEST0x13fe480x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Aug 5, 2022 10:36:31.656548977 CEST497424433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:31.785160065 CEST443349742154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:32.285480022 CEST497424433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:32.414148092 CEST443349742154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:32.988645077 CEST497424433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:33.117506027 CEST443349742154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:33.416806936 CEST497434433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:33.545722961 CEST443349743154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:34.098393917 CEST497434433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:34.227309942 CEST443349743154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:34.786665916 CEST497434433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:34.915574074 CEST443349743154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:35.064102888 CEST497444433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:35.192878962 CEST443349744154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:35.785737038 CEST497444433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:35.914422989 CEST443349744154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:36.598412037 CEST497444433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:36.727186918 CEST443349744154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:37.061316967 CEST497454433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:37.191855907 CEST443349745154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:37.692172050 CEST497454433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:37.822730064 CEST443349745154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:38.395467043 CEST497454433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:38.526202917 CEST443349745154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:38.803046942 CEST497464433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:38.932218075 CEST443349746154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:39.583028078 CEST497464433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:39.713824034 CEST443349746154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:40.294439077 CEST497464433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:40.423263073 CEST443349746154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:40.592158079 CEST497474433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:40.724276066 CEST443349747154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:41.286220074 CEST497474433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:41.415282011 CEST443349747154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:42.005039930 CEST497474433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:42.133578062 CEST443349747154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:42.345221996 CEST497484433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:42.474113941 CEST443349748154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:43.083301067 CEST497484433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:43.212089062 CEST443349748154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:43.895879984 CEST497484433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:44.024575949 CEST443349748154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:46.123747110 CEST497494433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:46.252482891 CEST443349749154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:46.787447929 CEST497494433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:46.916045904 CEST443349749154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:47.599356890 CEST497494433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:47.727940083 CEST443349749154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:47.991723061 CEST497504433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:48.123805046 CEST443349750154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:48.786936045 CEST497504433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:48.917444944 CEST443349750154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:49.599488974 CEST497504433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:49.729923010 CEST443349750154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:49.982130051 CEST497534433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:50.110760927 CEST443349753154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:50.787128925 CEST497534433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:50.915821075 CEST443349753154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:51.599704027 CEST497534433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:51.729322910 CEST443349753154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:51.878688097 CEST497644433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:52.009074926 CEST443349764154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:52.521568060 CEST497644433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:52.652179956 CEST443349764154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:53.162271023 CEST497644433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:53.297802925 CEST443349764154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:53.473370075 CEST497674433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:53.601818085 CEST443349767154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:54.115428925 CEST497674433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:54.243844032 CEST443349767154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:54.756218910 CEST497674433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:54.885060072 CEST443349767154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:55.036801100 CEST497684433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:55.167428017 CEST443349768154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:55.678061008 CEST497684433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:55.808562994 CEST443349768154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:56.318871975 CEST497684433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:56.449253082 CEST443349768154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:56.702867031 CEST497694433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:56.831686974 CEST443349769154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:57.350337982 CEST497694433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:57.479219913 CEST443349769154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:57.990900040 CEST497694433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:58.120034933 CEST443349769154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:58.267262936 CEST497714433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:58.398102045 CEST443349771154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:58.928436041 CEST497714433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:59.059241056 CEST443349771154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:59.569082022 CEST497714433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:36:59.699763060 CEST443349771154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:36:59.879499912 CEST497724433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:00.006443977 CEST443349772154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:00.506665945 CEST497724433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:00.633924961 CEST443349772154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:01.147384882 CEST497724433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:01.274421930 CEST443349772154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:01.705369949 CEST497734433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:01.834167957 CEST443349773154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:02.334907055 CEST497734433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:02.463685989 CEST443349773154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:02.975578070 CEST497734433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:03.104280949 CEST443349773154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:04.658385038 CEST497744433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:04.787095070 CEST443349774154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:05.350860119 CEST497744433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:05.479700089 CEST443349774154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:06.054013014 CEST497744433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:06.182832003 CEST443349774154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:06.337363958 CEST497754433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:06.470175982 CEST443349775154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:06.976022005 CEST497754433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:07.108855963 CEST443349775154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:07.617609978 CEST497754433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:07.750540018 CEST443349775154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:07.905627966 CEST497764433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:08.036154985 CEST443349776154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:08.538569927 CEST497764433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:08.670185089 CEST443349776154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:09.179276943 CEST497764433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:09.309839010 CEST443349776154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:09.575200081 CEST497774433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:09.706388950 CEST443349777154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:10.210583925 CEST497774433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:10.342360020 CEST443349777154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:10.851264000 CEST497774433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:10.982358932 CEST443349777154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:11.173331022 CEST497784433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:11.302063942 CEST443349778154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:11.804543972 CEST497784433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:11.933336020 CEST443349778154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:12.445126057 CEST497784433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:12.573940992 CEST443349778154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:12.720535994 CEST497794433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:12.851725101 CEST443349779154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:13.351536036 CEST497794433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:13.483083010 CEST443349779154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:13.992458105 CEST497794433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:14.123651981 CEST443349779154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:14.280563116 CEST497804433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:14.411623001 CEST443349780154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:14.914164066 CEST497804433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:15.044783115 CEST443349780154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:15.554765940 CEST497804433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:15.685312033 CEST443349780154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:15.844960928 CEST497814433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:15.973751068 CEST443349781154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:16.607917070 CEST497814433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:16.736345053 CEST443349781154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:17.267687082 CEST497814433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:17.396090031 CEST443349781154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:17.656250954 CEST497824433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:17.783998966 CEST443349782154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:18.348736048 CEST497824433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:18.477971077 CEST443349782154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:19.039454937 CEST497824433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:19.166321039 CEST443349782154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:19.316148996 CEST497844433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:19.444782019 CEST443349784154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:19.992758989 CEST497844433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:20.121486902 CEST443349784154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:20.806801081 CEST497844433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:20.935457945 CEST443349784154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:21.495964050 CEST497904433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:21.622832060 CEST443349790154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:22.211669922 CEST497904433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:22.338762045 CEST443349790154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:22.992924929 CEST497904433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:23.120253086 CEST443349790154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:23.323466063 CEST497934433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:23.452195883 CEST443349793154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:23.993026018 CEST497934433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:24.121704102 CEST443349793154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:24.790093899 CEST497934433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:24.919195890 CEST443349793154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:25.093261003 CEST498034433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:25.224592924 CEST443349803154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:25.805629969 CEST498034433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:25.936713934 CEST443349803154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:26.493243933 CEST498034433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:26.624393940 CEST443349803154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:26.848504066 CEST498124433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:26.975282907 CEST443349812154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:27.493295908 CEST498124433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:27.620256901 CEST443349812154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:28.305890083 CEST498124433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:28.432775021 CEST443349812154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:28.584311008 CEST498154433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:28.711153984 CEST443349815154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:29.305943012 CEST498154433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:29.432812929 CEST443349815154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:29.995913982 CEST498154433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:30.122737885 CEST443349815154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:30.318543911 CEST498174433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:30.446197987 CEST443349817154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:31.040513039 CEST498174433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:31.167706966 CEST443349817154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:31.853117943 CEST498174433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:31.980221033 CEST443349817154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:32.150131941 CEST498194433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:32.278745890 CEST443349819154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:32.806243896 CEST498194433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:32.935014009 CEST443349819154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:33.493906021 CEST498194433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:33.622569084 CEST443349819154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:33.818504095 CEST498214433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:33.948954105 CEST443349821154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:34.494019032 CEST498214433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:34.624429941 CEST443349821154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:35.134601116 CEST498214433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:35.265119076 CEST443349821154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:35.447604895 CEST498224433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:35.575499058 CEST443349822154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:36.087800980 CEST498224433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:36.214945078 CEST443349822154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:36.728446960 CEST498224433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:36.855496883 CEST443349822154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:37.164393902 CEST498254433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:37.291414022 CEST443349825154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:37.806674004 CEST498254433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:37.934684038 CEST443349825154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:38.447329998 CEST498254433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:38.574726105 CEST443349825154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:38.870157957 CEST498304433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:38.998656034 CEST443349830154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:39.514955997 CEST498304433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:39.643563032 CEST443349830154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:40.322653055 CEST498304433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:40.451481104 CEST443349830154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:41.956026077 CEST498314433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:42.087080002 CEST443349831154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:42.712785006 CEST498314433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:42.843776941 CEST443349831154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:43.525923967 CEST498314433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:43.657179117 CEST443349831154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:43.963910103 CEST498364433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:44.093147993 CEST443349836154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:44.713619947 CEST498364433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:44.842487097 CEST443349836154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:45.364474058 CEST498364433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:45.493073940 CEST443349836154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:45.710284948 CEST498374433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:45.838922024 CEST443349837154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:46.416832924 CEST498374433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:46.545469999 CEST443349837154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:47.120166063 CEST498374433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:47.248915911 CEST443349837154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:47.417505026 CEST498394433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:47.546143055 CEST443349839154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:48.057820082 CEST498394433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:48.186456919 CEST443349839154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:48.698267937 CEST498394433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:48.826992035 CEST443349839154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:49.097378016 CEST498414433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:49.227612019 CEST443349841154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:49.729685068 CEST498414433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:49.860145092 CEST443349841154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:50.370290995 CEST498414433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:50.500881910 CEST443349841154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:50.677459002 CEST498424433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:50.804567099 CEST443349842154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:51.307955980 CEST498424433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:51.435283899 CEST443349842154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:51.948532104 CEST498424433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:52.075707912 CEST443349842154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:52.265064955 CEST498444433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:52.397952080 CEST443349844154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:52.901715040 CEST498444433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:53.034604073 CEST443349844154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:53.542421103 CEST498444433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:53.676027060 CEST443349844154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:53.935425997 CEST498454433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:54.062477112 CEST443349845154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:54.581975937 CEST498454433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:54.709301949 CEST443349845154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:55.214474916 CEST498454433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:55.341484070 CEST443349845154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:55.539741039 CEST498474433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:55.668210983 CEST443349847154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:56.183331013 CEST498474433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:56.311853886 CEST443349847154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:56.823954105 CEST498474433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:56.952574015 CEST443349847154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:57.300528049 CEST498554433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:57.430982113 CEST443349855154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:57.933432102 CEST498554433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:58.064222097 CEST443349855154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:58.574095964 CEST498554433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:58.704469919 CEST443349855154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:58.936326027 CEST498584433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:59.067399025 CEST443349858154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:37:59.606154919 CEST498584433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:37:59.737215042 CEST443349858154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:00.293059111 CEST498584433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:00.424359083 CEST443349858154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:00.586455107 CEST498604433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:00.715795040 CEST443349860154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:01.402535915 CEST498604433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:01.531219006 CEST443349860154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:02.105724096 CEST498604433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:02.234435081 CEST443349860154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:02.414971113 CEST498684433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:02.541877031 CEST443349868154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:03.043219090 CEST498684433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:03.170177937 CEST443349868154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:03.683898926 CEST498684433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:03.810787916 CEST443349868154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:04.116154909 CEST498744433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:04.248992920 CEST443349874154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:04.902801991 CEST498744433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:05.035618067 CEST443349874154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:05.594774008 CEST498744433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:05.727633953 CEST443349874154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:06.025523901 CEST498754433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:06.158190012 CEST443349875154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:06.668554068 CEST498754433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:06.801399946 CEST443349875154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:07.309216022 CEST498754433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:07.442257881 CEST443349875154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:07.622494936 CEST498774433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:07.753041029 CEST443349877154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:08.262490034 CEST498774433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:08.393136978 CEST443349877154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:08.903460979 CEST498774433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:09.034053087 CEST443349877154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:09.194487095 CEST498804433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:09.323427916 CEST443349880154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:09.825226068 CEST498804433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:09.954114914 CEST443349880154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:10.465872049 CEST498804433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:10.595038891 CEST443349880154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:10.746316910 CEST498814433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:10.875200987 CEST443349881154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:11.387815952 CEST498814433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:11.516805887 CEST443349881154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:12.032099009 CEST498814433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:12.160923958 CEST443349881154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:12.310781002 CEST498824433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:12.439503908 CEST443349882154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:12.950443029 CEST498824433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:13.079489946 CEST443349882154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:13.591197968 CEST498824433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:13.720206976 CEST443349882154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:13.862446070 CEST498834433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:13.991386890 CEST443349883154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:14.497495890 CEST498834433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:14.626431942 CEST443349883154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:15.138077021 CEST498834433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:15.267425060 CEST443349883154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:15.410926104 CEST498844433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:15.543698072 CEST443349884154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:16.044378042 CEST498844433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:16.177124023 CEST443349884154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:16.685082912 CEST498844433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:16.817895889 CEST443349884154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:17.332250118 CEST498854433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:17.460779905 CEST443349885154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:17.966566086 CEST498854433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:18.095242023 CEST443349885154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:18.622836113 CEST498854433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:18.751528978 CEST443349885154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:19.008055925 CEST498864433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:19.138425112 CEST443349886154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:19.716592073 CEST498864433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:19.847492933 CEST443349886154.53.40.254192.168.2.3
                                                                        Aug 5, 2022 10:38:20.529109001 CEST498864433192.168.2.3154.53.40.254
                                                                        Aug 5, 2022 10:38:20.659811020 CEST443349886154.53.40.254192.168.2.3
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Aug 5, 2022 10:36:31.537233114 CEST6485153192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:31.644268990 CEST53648518.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:33.306726933 CEST4931653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:33.415712118 CEST53493168.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:35.044496059 CEST5641753192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:35.061969995 CEST53564178.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:36.911396027 CEST5592353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:37.020839930 CEST53559238.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:38.692194939 CEST5772353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:38.801831961 CEST53577238.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:40.571228981 CEST5811653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:40.590759039 CEST53581168.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:42.295826912 CEST5742153192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:42.315216064 CEST53574218.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:46.095731974 CEST6535853192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:46.115034103 CEST53653588.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:47.882976055 CEST4987353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:47.989651918 CEST53498738.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:49.872052908 CEST5380253192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:49.981059074 CEST53538028.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:51.858122110 CEST4932753192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:51.877913952 CEST53493278.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:53.451700926 CEST5898153192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:53.468983889 CEST53589818.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:55.015970945 CEST6445253192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:55.035500050 CEST53644528.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:56.591095924 CEST6138053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:56.699117899 CEST53613808.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:58.245412111 CEST5298553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:58.264786959 CEST53529858.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:36:59.858932018 CEST5862553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:36:59.878209114 CEST53586258.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:01.662796021 CEST5281053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:01.682724953 CEST53528108.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:04.619702101 CEST5077853192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:04.652460098 CEST53507788.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:06.317322016 CEST5515153192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:06.336277962 CEST53551518.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:07.881041050 CEST5979553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:07.900559902 CEST53597958.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:09.460410118 CEST5939053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:09.569144011 CEST53593908.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:11.152297020 CEST6481653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:11.171711922 CEST53648168.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:12.699728966 CEST6499653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:12.717298031 CEST53649968.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:14.259583950 CEST5381653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:14.279328108 CEST53538168.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:15.823040962 CEST5209653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:15.840471029 CEST53520968.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:17.631247044 CEST6064053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:17.648741961 CEST53606408.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:19.297427893 CEST4984453192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:19.315130949 CEST53498448.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:21.475986958 CEST5151853192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:21.495111942 CEST53515188.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:23.301103115 CEST4972353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:23.320753098 CEST53497238.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:25.064929962 CEST5015253192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:25.086270094 CEST53501528.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:26.827538967 CEST5663953192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:26.846600056 CEST53566398.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:28.562978983 CEST5045053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:28.582564116 CEST53504508.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:30.299781084 CEST6272453192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:30.317589998 CEST53627248.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:32.129381895 CEST5540353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:32.149024963 CEST53554038.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:33.799338102 CEST6187753192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:33.816740990 CEST53618778.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:35.426795959 CEST6462453192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:35.446317911 CEST53646248.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:37.056559086 CEST5060853192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:37.163552999 CEST53506088.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:38.849581003 CEST5849753192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:38.869132042 CEST53584978.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:41.844887972 CEST6270153192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:41.955061913 CEST53627018.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:43.851545095 CEST6155553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:43.962873936 CEST53615558.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:45.681632996 CEST6443353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:45.702647924 CEST53644338.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:47.396205902 CEST5409653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:47.415527105 CEST53540968.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:48.989021063 CEST6332653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:49.095340014 CEST53633268.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:50.657083988 CEST6011053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:50.676486969 CEST53601108.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:52.247087002 CEST4923053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:52.264116049 CEST53492308.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:53.914503098 CEST5744253192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:53.934427023 CEST53574428.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:55.519682884 CEST5155753192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:55.536693096 CEST53515578.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:57.280276060 CEST6533453192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:57.299637079 CEST53653348.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:37:58.863878012 CEST5248753192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:37:58.883487940 CEST53524878.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:00.566334963 CEST5199453192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:00.585450888 CEST53519948.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:02.394844055 CEST5165853192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:02.413980961 CEST53516588.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:04.002974033 CEST5895053192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:04.110976934 CEST53589508.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:05.913765907 CEST5388353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:06.022942066 CEST53538838.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:07.601854086 CEST5906553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:07.621037006 CEST53590658.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:09.176075935 CEST5568653192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:09.193387985 CEST53556868.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:10.723433018 CEST6458953192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:10.745327950 CEST53645898.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:12.292118073 CEST6493453192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:12.309509039 CEST53649348.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:13.843307018 CEST5579553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:13.861007929 CEST53557958.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:15.391450882 CEST6463553192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:15.408987045 CEST53646358.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:17.311804056 CEST5526953192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:17.331228971 CEST53552698.8.8.8192.168.2.3
                                                                        Aug 5, 2022 10:38:18.986835957 CEST6308353192.168.2.38.8.8.8
                                                                        Aug 5, 2022 10:38:19.007206917 CEST53630838.8.8.8192.168.2.3
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                        Aug 5, 2022 10:36:31.537233114 CEST192.168.2.38.8.8.80xc79fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:33.306726933 CEST192.168.2.38.8.8.80xc00eStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:35.044496059 CEST192.168.2.38.8.8.80xfcc6Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:36.911396027 CEST192.168.2.38.8.8.80x6221Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:38.692194939 CEST192.168.2.38.8.8.80xbacaStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:40.571228981 CEST192.168.2.38.8.8.80x9cb8Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:42.295826912 CEST192.168.2.38.8.8.80x99caStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:46.095731974 CEST192.168.2.38.8.8.80xc292Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:47.882976055 CEST192.168.2.38.8.8.80xf4fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:49.872052908 CEST192.168.2.38.8.8.80xee1fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:51.858122110 CEST192.168.2.38.8.8.80x3d8cStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:53.451700926 CEST192.168.2.38.8.8.80x280aStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:55.015970945 CEST192.168.2.38.8.8.80xacf4Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:56.591095924 CEST192.168.2.38.8.8.80x20f1Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:58.245412111 CEST192.168.2.38.8.8.80xafb7Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:59.858932018 CEST192.168.2.38.8.8.80xf7f7Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:01.662796021 CEST192.168.2.38.8.8.80x697eStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:04.619702101 CEST192.168.2.38.8.8.80x120dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:06.317322016 CEST192.168.2.38.8.8.80x5c89Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:07.881041050 CEST192.168.2.38.8.8.80x16d2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:09.460410118 CEST192.168.2.38.8.8.80xa4a0Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:11.152297020 CEST192.168.2.38.8.8.80xe7a2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:12.699728966 CEST192.168.2.38.8.8.80x46cbStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:14.259583950 CEST192.168.2.38.8.8.80x3685Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:15.823040962 CEST192.168.2.38.8.8.80x6d0cStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:17.631247044 CEST192.168.2.38.8.8.80xfe86Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:19.297427893 CEST192.168.2.38.8.8.80xc9bStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:21.475986958 CEST192.168.2.38.8.8.80x7be2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:23.301103115 CEST192.168.2.38.8.8.80x371fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:25.064929962 CEST192.168.2.38.8.8.80x66a9Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:26.827538967 CEST192.168.2.38.8.8.80x3d67Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:28.562978983 CEST192.168.2.38.8.8.80xa765Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:30.299781084 CEST192.168.2.38.8.8.80x71d3Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:32.129381895 CEST192.168.2.38.8.8.80xf5dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:33.799338102 CEST192.168.2.38.8.8.80x4585Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:35.426795959 CEST192.168.2.38.8.8.80x9206Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:37.056559086 CEST192.168.2.38.8.8.80x63c8Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:38.849581003 CEST192.168.2.38.8.8.80xa6f2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:41.844887972 CEST192.168.2.38.8.8.80xa866Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:43.851545095 CEST192.168.2.38.8.8.80xcd5dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:45.681632996 CEST192.168.2.38.8.8.80xea78Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:47.396205902 CEST192.168.2.38.8.8.80xd829Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:48.989021063 CEST192.168.2.38.8.8.80xdee0Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:50.657083988 CEST192.168.2.38.8.8.80x879Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:52.247087002 CEST192.168.2.38.8.8.80x2e5Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:53.914503098 CEST192.168.2.38.8.8.80x5609Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:55.519682884 CEST192.168.2.38.8.8.80xbbfeStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:57.280276060 CEST192.168.2.38.8.8.80x724eStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:58.863878012 CEST192.168.2.38.8.8.80x34f5Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:00.566334963 CEST192.168.2.38.8.8.80x592cStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:02.394844055 CEST192.168.2.38.8.8.80x83c0Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:04.002974033 CEST192.168.2.38.8.8.80x1903Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:05.913765907 CEST192.168.2.38.8.8.80xc26Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:07.601854086 CEST192.168.2.38.8.8.80x81bStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:09.176075935 CEST192.168.2.38.8.8.80xd68dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:10.723433018 CEST192.168.2.38.8.8.80xbf16Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:12.292118073 CEST192.168.2.38.8.8.80xd601Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:13.843307018 CEST192.168.2.38.8.8.80xff6aStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:15.391450882 CEST192.168.2.38.8.8.80x360dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:17.311804056 CEST192.168.2.38.8.8.80x7f6bStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:18.986835957 CEST192.168.2.38.8.8.80x1ea2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                        Aug 5, 2022 10:36:31.644268990 CEST8.8.8.8192.168.2.30xc79fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:33.415712118 CEST8.8.8.8192.168.2.30xc00eNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:35.061969995 CEST8.8.8.8192.168.2.30xfcc6No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:37.020839930 CEST8.8.8.8192.168.2.30x6221No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:38.801831961 CEST8.8.8.8192.168.2.30xbacaNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:40.590759039 CEST8.8.8.8192.168.2.30x9cb8No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:42.315216064 CEST8.8.8.8192.168.2.30x99caNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:46.115034103 CEST8.8.8.8192.168.2.30xc292No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:47.989651918 CEST8.8.8.8192.168.2.30xf4fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:49.981059074 CEST8.8.8.8192.168.2.30xee1fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:51.877913952 CEST8.8.8.8192.168.2.30x3d8cNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:53.468983889 CEST8.8.8.8192.168.2.30x280aNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:55.035500050 CEST8.8.8.8192.168.2.30xacf4No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:56.699117899 CEST8.8.8.8192.168.2.30x20f1No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:58.264786959 CEST8.8.8.8192.168.2.30xafb7No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:36:59.878209114 CEST8.8.8.8192.168.2.30xf7f7No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:01.682724953 CEST8.8.8.8192.168.2.30x697eNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:04.652460098 CEST8.8.8.8192.168.2.30x120dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:06.336277962 CEST8.8.8.8192.168.2.30x5c89No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:07.900559902 CEST8.8.8.8192.168.2.30x16d2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:09.569144011 CEST8.8.8.8192.168.2.30xa4a0No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:11.171711922 CEST8.8.8.8192.168.2.30xe7a2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:12.717298031 CEST8.8.8.8192.168.2.30x46cbNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:14.279328108 CEST8.8.8.8192.168.2.30x3685No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:15.840471029 CEST8.8.8.8192.168.2.30x6d0cNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:17.648741961 CEST8.8.8.8192.168.2.30xfe86No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:19.315130949 CEST8.8.8.8192.168.2.30xc9bNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:21.495111942 CEST8.8.8.8192.168.2.30x7be2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:23.320753098 CEST8.8.8.8192.168.2.30x371fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:25.086270094 CEST8.8.8.8192.168.2.30x66a9No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:26.846600056 CEST8.8.8.8192.168.2.30x3d67No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:28.582564116 CEST8.8.8.8192.168.2.30xa765No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:30.317589998 CEST8.8.8.8192.168.2.30x71d3No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:32.149024963 CEST8.8.8.8192.168.2.30xf5dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:33.816740990 CEST8.8.8.8192.168.2.30x4585No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:35.446317911 CEST8.8.8.8192.168.2.30x9206No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:37.163552999 CEST8.8.8.8192.168.2.30x63c8No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:38.869132042 CEST8.8.8.8192.168.2.30xa6f2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:41.955061913 CEST8.8.8.8192.168.2.30xa866No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:43.962873936 CEST8.8.8.8192.168.2.30xcd5dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:45.702647924 CEST8.8.8.8192.168.2.30xea78No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:47.415527105 CEST8.8.8.8192.168.2.30xd829No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:49.095340014 CEST8.8.8.8192.168.2.30xdee0No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:50.676486969 CEST8.8.8.8192.168.2.30x879No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:52.264116049 CEST8.8.8.8192.168.2.30x2e5No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:53.934427023 CEST8.8.8.8192.168.2.30x5609No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:55.536693096 CEST8.8.8.8192.168.2.30xbbfeNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:57.299637079 CEST8.8.8.8192.168.2.30x724eNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:37:58.883487940 CEST8.8.8.8192.168.2.30x34f5No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:00.585450888 CEST8.8.8.8192.168.2.30x592cNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:02.413980961 CEST8.8.8.8192.168.2.30x83c0No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:04.110976934 CEST8.8.8.8192.168.2.30x1903No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:06.022942066 CEST8.8.8.8192.168.2.30xc26No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:07.621037006 CEST8.8.8.8192.168.2.30x81bNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:09.193387985 CEST8.8.8.8192.168.2.30xd68dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:10.745327950 CEST8.8.8.8192.168.2.30xbf16No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:12.309509039 CEST8.8.8.8192.168.2.30xd601No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:13.861007929 CEST8.8.8.8192.168.2.30xff6aNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:15.408987045 CEST8.8.8.8192.168.2.30x360dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:17.331228971 CEST8.8.8.8192.168.2.30x7f6bNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                                                        Aug 5, 2022 10:38:19.007206917 CEST8.8.8.8192.168.2.30x1ea2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:10:36:12
                                                                        Start date:05/08/2022
                                                                        Path:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe"
                                                                        Imagebase:0xec0000
                                                                        File size:1299456 bytes
                                                                        MD5 hash:E366F96C9B5C5528426A116EB49EF445
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                        Reputation:low

                                                                        Target ID:4
                                                                        Start time:10:36:24
                                                                        Start date:05/08/2022
                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
                                                                        Imagebase:0xc40000
                                                                        File size:430592 bytes
                                                                        MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Reputation:high

                                                                        Target ID:5
                                                                        Start time:10:36:24
                                                                        Start date:05/08/2022
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7c9170000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        Target ID:6
                                                                        Start time:10:36:24
                                                                        Start date:05/08/2022
                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
                                                                        Imagebase:0xe30000
                                                                        File size:185856 bytes
                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        Target ID:7
                                                                        Start time:10:36:26
                                                                        Start date:05/08/2022
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7c9170000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        Target ID:8
                                                                        Start time:10:36:28
                                                                        Start date:05/08/2022
                                                                        Path:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                                                        Imagebase:0xa20000
                                                                        File size:1299456 bytes
                                                                        MD5 hash:E366F96C9B5C5528426A116EB49EF445
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                        • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                        • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                        Reputation:low

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:11.5%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:102
                                                                          Total number of Limit Nodes:10
                                                                          execution_graph 14030 165ba70 DuplicateHandle 14031 165bb06 14030->14031 14032 16540d0 14033 16540e2 14032->14033 14034 16540ee 14033->14034 14038 16541e0 14033->14038 14043 1653868 14034->14043 14036 165410d 14039 1654205 14038->14039 14047 16542d1 14039->14047 14051 16542e0 14039->14051 14044 1653873 14043->14044 14059 1655818 14044->14059 14046 1656af5 14046->14036 14049 16542e0 14047->14049 14048 16543e4 14048->14048 14049->14048 14055 16538a8 14049->14055 14053 1654307 14051->14053 14052 16543e4 14053->14052 14054 16538a8 CreateActCtxA 14053->14054 14054->14052 14056 1655370 CreateActCtxA 14055->14056 14058 1655433 14056->14058 14058->14058 14060 1655823 14059->14060 14063 1655838 14060->14063 14062 1656be5 14062->14046 14064 1655843 14063->14064 14066 1656cc2 14064->14066 14067 1655868 14064->14067 14066->14062 14068 1655873 14067->14068 14071 1655898 14068->14071 14070 1656dc2 14070->14066 14072 16558a3 14071->14072 14074 1657289 14072->14074 14077 165752a 14072->14077 14073 165751c 14073->14070 14074->14073 14082 165b572 14074->14082 14078 165752f 14077->14078 14079 16574de 14077->14079 14078->14074 14080 165751c 14079->14080 14081 165b572 2 API calls 14079->14081 14080->14074 14081->14080 14083 165b5a1 14082->14083 14084 165b5c5 14083->14084 14087 165b730 14083->14087 14091 165b722 14083->14091 14084->14073 14088 165b73d 14087->14088 14090 165b777 14088->14090 14095 165abf4 14088->14095 14090->14084 14092 165b73d 14091->14092 14093 165b777 14092->14093 14094 165abf4 2 API calls 14092->14094 14093->14084 14094->14093 14096 165abff 14095->14096 14098 165c068 14096->14098 14099 165acdc 14096->14099 14098->14098 14100 165ace7 14099->14100 14101 1655898 2 API calls 14100->14101 14102 165c4d7 14100->14102 14101->14102 14106 165de5e 14102->14106 14111 165de68 14102->14111 14103 165c510 14103->14098 14107 165de68 14106->14107 14108 165dea5 14107->14108 14109 165e6e8 LoadLibraryExW GetModuleHandleW 14107->14109 14110 165e6d8 LoadLibraryExW GetModuleHandleW 14107->14110 14108->14103 14109->14108 14110->14108 14113 165dee5 14111->14113 14114 165de99 14111->14114 14112 165dea5 14112->14103 14113->14103 14114->14112 14115 165e6e8 LoadLibraryExW GetModuleHandleW 14114->14115 14116 165e6d8 LoadLibraryExW GetModuleHandleW 14114->14116 14115->14113 14116->14113 14022 165b848 GetCurrentProcess 14023 165b8c2 GetCurrentThread 14022->14023 14024 165b8bb 14022->14024 14025 165b8ff GetCurrentProcess 14023->14025 14026 165b8f8 14023->14026 14024->14023 14027 165b935 14025->14027 14026->14025 14028 165b95d GetCurrentThreadId 14027->14028 14029 165b98e 14028->14029 14117 1659458 14121 1659540 14117->14121 14129 1659550 14117->14129 14118 1659467 14122 165954d 14121->14122 14123 165957b 14122->14123 14137 16597d8 14122->14137 14141 16597c9 14122->14141 14123->14118 14124 1659573 14124->14123 14125 1659778 GetModuleHandleW 14124->14125 14126 16597a5 14125->14126 14126->14118 14130 1659563 14129->14130 14131 165957b 14130->14131 14135 16597c9 LoadLibraryExW 14130->14135 14136 16597d8 LoadLibraryExW 14130->14136 14131->14118 14132 1659573 14132->14131 14133 1659778 GetModuleHandleW 14132->14133 14134 16597a5 14133->14134 14134->14118 14135->14132 14136->14132 14138 16597ec 14137->14138 14140 1659811 14138->14140 14145 1658ab0 14138->14145 14140->14124 14143 16597d8 14141->14143 14142 1659811 14142->14124 14143->14142 14144 1658ab0 LoadLibraryExW 14143->14144 14144->14142 14146 16599b8 LoadLibraryExW 14145->14146 14148 1659a31 14146->14148 14148->14140

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 41 bb57818-bb57839 42 bb57840-bb57934 41->42 43 bb5783b 41->43 45 bb5803c-bb58064 42->45 46 bb5793a-bb57a91 42->46 43->42 49 bb5874d-bb58756 45->49 90 bb57a97-bb57af2 46->90 91 bb5800a-bb58039 46->91 51 bb58072-bb5807b 49->51 52 bb5875c-bb58773 49->52 53 bb58082-bb58176 51->53 54 bb5807d 51->54 73 bb581a0 53->73 74 bb58178-bb58184 53->74 54->53 77 bb581a6-bb581c6 73->77 75 bb58186-bb5818c 74->75 76 bb5818e-bb58194 74->76 79 bb5819e 75->79 76->79 81 bb58226-bb582a0 77->81 82 bb581c8-bb58221 77->82 79->77 101 bb582f7-bb5833a 81->101 102 bb582a2-bb582f5 81->102 95 bb5874a 82->95 98 bb57af4 90->98 99 bb57af7-bb57b02 90->99 91->45 95->49 98->99 103 bb57f1c-bb57f22 99->103 131 bb58345-bb5834b 101->131 102->131 104 bb57b07-bb57b25 103->104 105 bb57f28-bb57fa5 103->105 108 bb57b27-bb57b2b 104->108 109 bb57b7c-bb57b91 104->109 144 bb57ff4-bb57ffa 105->144 108->109 111 bb57b2d-bb57b38 108->111 113 bb57b93 109->113 114 bb57b98-bb57bae 109->114 118 bb57b6e-bb57b74 111->118 113->114 115 bb57bb5-bb57bcc 114->115 116 bb57bb0 114->116 120 bb57bd3-bb57be9 115->120 121 bb57bce 115->121 116->115 123 bb57b76-bb57b77 118->123 124 bb57b3a-bb57b3e 118->124 128 bb57bf0-bb57bf7 120->128 129 bb57beb 120->129 121->120 130 bb57bfa-bb57e20 123->130 126 bb57b44-bb57b5c 124->126 127 bb57b40 124->127 132 bb57b63-bb57b6b 126->132 133 bb57b5e 126->133 127->126 128->130 129->128 141 bb57e84-bb57e99 130->141 142 bb57e22-bb57e26 130->142 135 bb583a2-bb583ae 131->135 132->118 133->132 136 bb583b0-bb58438 135->136 137 bb5834d-bb5836f 135->137 172 bb585bd-bb585c6 136->172 139 bb58376-bb5839f 137->139 140 bb58371 137->140 139->135 140->139 145 bb57ea0-bb57ec1 141->145 146 bb57e9b 141->146 142->141 148 bb57e28-bb57e37 142->148 151 bb57fa7-bb57ff1 144->151 152 bb57ffc-bb58002 144->152 153 bb57ec3 145->153 154 bb57ec8-bb57ee7 145->154 146->145 149 bb57e76-bb57e7c 148->149 155 bb57e7e-bb57e7f 149->155 156 bb57e39-bb57e3d 149->156 151->144 152->91 153->154 158 bb57eee-bb57f0e 154->158 159 bb57ee9 154->159 166 bb57f19 155->166 160 bb57e47-bb57e68 156->160 161 bb57e3f-bb57e43 156->161 163 bb57f15 158->163 164 bb57f10 158->164 159->158 167 bb57e6f-bb57e73 160->167 168 bb57e6a 160->168 161->160 163->166 164->163 166->103 167->149 168->167 174 bb5843d-bb58452 172->174 175 bb585cc-bb58627 172->175 176 bb58454 174->176 177 bb5845b-bb585b1 174->177 190 bb5865e-bb58688 175->190 191 bb58629-bb5865c 175->191 176->177 179 bb584a6-bb584e6 176->179 180 bb58461-bb584a1 176->180 181 bb58530-bb58570 176->181 182 bb584eb-bb5852b 176->182 195 bb585b7 177->195 179->195 180->195 181->195 182->195 199 bb58691-bb58743 190->199 191->199 195->172 199->95
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: UUUU
                                                                          • API String ID: 0-1798160573
                                                                          • Opcode ID: a0a58e35164d8cf832e6d267e87defaee12bcc5bd75bac5f4b5c1992938e1f6d
                                                                          • Instruction ID: 16abf1a2c4174214478b10771af459114cf46f0f1cb11cc532b76f98dd194d79
                                                                          • Opcode Fuzzy Hash: a0a58e35164d8cf832e6d267e87defaee12bcc5bd75bac5f4b5c1992938e1f6d
                                                                          • Instruction Fuzzy Hash: F0A2B274A00628CFDB64CF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81CF51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32 ref: 0165B8A8
                                                                          • GetCurrentThread.KERNEL32 ref: 0165B8E5
                                                                          • GetCurrentProcess.KERNEL32 ref: 0165B922
                                                                          • GetCurrentThreadId.KERNEL32 ref: 0165B97B
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: Current$ProcessThread
                                                                          • String ID:
                                                                          • API String ID: 2063062207-0
                                                                          • Opcode ID: 399919b65aca44405c62fa2d1cb03edd8ac243cb2b78f5772718403128905ed5
                                                                          • Instruction ID: f2cde9270c0d7bf434b061bbbc475a7566ff7856ed6fb3077d9501b5ceadc86c
                                                                          • Opcode Fuzzy Hash: 399919b65aca44405c62fa2d1cb03edd8ac243cb2b78f5772718403128905ed5
                                                                          • Instruction Fuzzy Hash: C35151B09017099FDB54CFA9D9887DEBBF1EF88314F208459E409A77A0C7349944CB65
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32 ref: 0165B8A8
                                                                          • GetCurrentThread.KERNEL32 ref: 0165B8E5
                                                                          • GetCurrentProcess.KERNEL32 ref: 0165B922
                                                                          • GetCurrentThreadId.KERNEL32 ref: 0165B97B
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: Current$ProcessThread
                                                                          • String ID:
                                                                          • API String ID: 2063062207-0
                                                                          • Opcode ID: fd952d6d4aa4b8b7f4821c951d7b3116b5ef9b48a98d40f77dfea0b6f13f84d8
                                                                          • Instruction ID: fef685be0cd50f5a8d55e042bf2a30d46e2c85952788ad485d33d9270f710e07
                                                                          • Opcode Fuzzy Hash: fd952d6d4aa4b8b7f4821c951d7b3116b5ef9b48a98d40f77dfea0b6f13f84d8
                                                                          • Instruction Fuzzy Hash: 045152B0D006099FDB54CFA9D988BEEBBF1FF88304F248459E409A77A0C734A944CB65
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 204 1659550-1659558 205 1659563-1659565 204->205 206 165955e call 1658a48 204->206 207 1659567 205->207 208 165957b-165957f 205->208 206->205 261 165956d call 16597c9 207->261 262 165956d call 16597d8 207->262 209 1659581-165958b 208->209 210 1659593-16595d4 208->210 209->210 215 16595d6-16595de 210->215 216 16595e1-16595ef 210->216 211 1659573-1659575 211->208 214 16596b0-16596bd 211->214 220 16596bf-1659728 214->220 215->216 217 16595f1-16595f6 216->217 218 1659613-1659615 216->218 221 1659601 217->221 222 16595f8-16595ff call 1658a54 217->222 223 1659618-165961f 218->223 254 165972a-1659770 220->254 224 1659603-1659611 221->224 222->224 226 1659621-1659629 223->226 227 165962c-1659633 223->227 224->223 226->227 228 1659635-165963d 227->228 229 1659640-1659649 call 1658a64 227->229 228->229 235 1659656-165965b 229->235 236 165964b-1659653 229->236 237 165965d-1659664 235->237 238 1659679-1659686 235->238 236->235 237->238 240 1659666-1659676 call 1658a74 call 1658a84 237->240 245 16596a9-16596af 238->245 246 1659688-16596a6 238->246 240->238 246->245 256 1659772-1659775 254->256 257 1659778-16597a3 GetModuleHandleW 254->257 256->257 258 16597a5-16597ab 257->258 259 16597ac-16597c0 257->259 258->259 261->211 262->211
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 01659796
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: e03a64c08c6ce964dfb2a8986d2dfbad579e86e1773b87ec94e3a2efec72029d
                                                                          • Instruction ID: 68a8bc483f6fa2eead5e9e30dc59fe58f6757f7f1f298e73daeea7b55217156f
                                                                          • Opcode Fuzzy Hash: e03a64c08c6ce964dfb2a8986d2dfbad579e86e1773b87ec94e3a2efec72029d
                                                                          • Instruction Fuzzy Hash: 7B711770A00B058FEB64DF29D44469ABBF5BF88318F10892DD856D7B50D735E849CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 263 16538a8-1655431 CreateActCtxA 266 1655433-1655439 263->266 267 165543a-1655494 263->267 266->267 274 1655496-1655499 267->274 275 16554a3-16554a7 267->275 274->275 276 16554a9-16554b5 275->276 277 16554b8 275->277 276->277 278 16554b9 277->278 278->278
                                                                          APIs
                                                                          • CreateActCtxA.KERNEL32(?), ref: 01655421
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: c1776119da44181f178bef25e99d7b2e80479bb8316689519e194072728bf638
                                                                          • Instruction ID: d01ac98eb0fc48825aa3f7d1822f2adf4002e55308e9b734cc789bf8c9b316d0
                                                                          • Opcode Fuzzy Hash: c1776119da44181f178bef25e99d7b2e80479bb8316689519e194072728bf638
                                                                          • Instruction Fuzzy Hash: 6B41C1B1D0061CCBDB24DFA9C884BDEBBB5FF49308F208169D409AB251DB75694ACF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 280 165536c 281 1655370-1655431 CreateActCtxA 280->281 283 1655433-1655439 281->283 284 165543a-1655494 281->284 283->284 291 1655496-1655499 284->291 292 16554a3-16554a7 284->292 291->292 293 16554a9-16554b5 292->293 294 16554b8 292->294 293->294 295 16554b9 294->295 295->295
                                                                          APIs
                                                                          • CreateActCtxA.KERNEL32(?), ref: 01655421
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: a78f97821fcf45c95c5c3709ddd373ce4e07a74fbf5986fd6adf51444b95672c
                                                                          • Instruction ID: 3210f3b05894e93325b7192efec6cf5a7cc61d2faa6f62e3d9b067a265fda785
                                                                          • Opcode Fuzzy Hash: a78f97821fcf45c95c5c3709ddd373ce4e07a74fbf5986fd6adf51444b95672c
                                                                          • Instruction Fuzzy Hash: 6F41C0B1D0061CCEDB24DFA9C884BDEBBB5FF48308F208169D409AB251DB75694ACF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 297 165ba68-165ba6e 298 165ba70-165bb04 DuplicateHandle 297->298 299 165bb06-165bb0c 298->299 300 165bb0d-165bb2a 298->300 299->300
                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0165BAF7
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: dc260e616c9c2c1822d74006d64effd59a1130f3502f9356fab4de6efc577f96
                                                                          • Instruction ID: 56e7e9785e59230465e5607df9b041fe90ca03109b3b4a9e4825836ff815082e
                                                                          • Opcode Fuzzy Hash: dc260e616c9c2c1822d74006d64effd59a1130f3502f9356fab4de6efc577f96
                                                                          • Instruction Fuzzy Hash: F521E6B5900209AFDB10CF9AD884ADEFBF5EF48320F14841AE915A7710D775A945CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 303 165ba70-165bb04 DuplicateHandle 304 165bb06-165bb0c 303->304 305 165bb0d-165bb2a 303->305 304->305
                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0165BAF7
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: c1b0b3a516173569e2ef4cd68812f1165f5c2a55f1e9b0d33a1cd709531e8391
                                                                          • Instruction ID: 6ced9790deb3d9a275c54021632bb353e7a57ce879ae5df8d50b549eb0fb6dbf
                                                                          • Opcode Fuzzy Hash: c1b0b3a516173569e2ef4cd68812f1165f5c2a55f1e9b0d33a1cd709531e8391
                                                                          • Instruction Fuzzy Hash: 9721E4B5900208AFDB10CF9AD884ADEFBF4EB48320F14801AE915A3710D378A944CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 308 1658ab0-16599f8 310 1659a00-1659a2f LoadLibraryExW 308->310 311 16599fa-16599fd 308->311 312 1659a31-1659a37 310->312 313 1659a38-1659a55 310->313 311->310 312->313
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,01659811,00000800,00000000,00000000), ref: 01659A22
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: fa05c8875419b0c2efc901680857b828d5c05748cd39a9937c417d78eefd3dce
                                                                          • Instruction ID: 637a672e874c93c78fb7a136e1a4333b3aed3a2a7fc53c847f09d68dec267262
                                                                          • Opcode Fuzzy Hash: fa05c8875419b0c2efc901680857b828d5c05748cd39a9937c417d78eefd3dce
                                                                          • Instruction Fuzzy Hash: C311D3B6900249DFDB10CFAAD844ADEFBF4EB48364F14842AE915A7700C379A945CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 316 16599b0-16599f8 317 1659a00-1659a2f LoadLibraryExW 316->317 318 16599fa-16599fd 316->318 319 1659a31-1659a37 317->319 320 1659a38-1659a55 317->320 318->317 319->320
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,01659811,00000800,00000000,00000000), ref: 01659A22
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: a901edf508c80d6c626732adc28d3022cbe8e070926da4f4ee472f5b57f48a27
                                                                          • Instruction ID: 72c2147aa922c3da8d211dfc335e3b6ffa69d5d38d3a45164fdfb4ff9c946a49
                                                                          • Opcode Fuzzy Hash: a901edf508c80d6c626732adc28d3022cbe8e070926da4f4ee472f5b57f48a27
                                                                          • Instruction Fuzzy Hash: 7711D6B6D002499FDB10CFA9D884ADEFBF4EB48324F14852EE815A7650C379A545CFA4
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 323 1659730-1659770 324 1659772-1659775 323->324 325 1659778-16597a3 GetModuleHandleW 323->325 324->325 326 16597a5-16597ab 325->326 327 16597ac-16597c0 325->327 326->327
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 01659796
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: 01947093335052503ef598e167564d75640203c01cc88132463c2a0ef8211f33
                                                                          • Instruction ID: 7e404b9b89c9dd661278b31bdbf7b5c2c24c1ed1da1055b28c4bf94eb3473e55
                                                                          • Opcode Fuzzy Hash: 01947093335052503ef598e167564d75640203c01cc88132463c2a0ef8211f33
                                                                          • Instruction Fuzzy Hash: FE11C0B58006499FDB10CF9AD844BDEFBF4EB88324F14842AD819A7610D379A545CFA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: D0k
                                                                          • API String ID: 0-1329582393
                                                                          • Opcode ID: c957cd73f0150210824fba2990e7e1b81e4b22976400660a038b97601d1e20fe
                                                                          • Instruction ID: 32dbf1ba50d1ffda8edaede296b79bdbc05ca1b161ad160e2089f61c32812b9c
                                                                          • Opcode Fuzzy Hash: c957cd73f0150210824fba2990e7e1b81e4b22976400660a038b97601d1e20fe
                                                                          • Instruction Fuzzy Hash: 69217730E041189FDB14EBB4D854BEEB7F6EF88354F108469D906AB284DF389D46CB62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290791237.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15ad000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 399a37fb841d741ed68bf283f3abe9f77026d844052df242ecc568963f7977d4
                                                                          • Instruction ID: 5544e226906ee1a42bb106a06a170e94892a410e210aae8ccbe5191699040dbd
                                                                          • Opcode Fuzzy Hash: 399a37fb841d741ed68bf283f3abe9f77026d844052df242ecc568963f7977d4
                                                                          • Instruction Fuzzy Hash: C72136B1544200DFDB01EF44D8C0B9EBBB5FB88324F20C569D8090FA06C37AE846C6A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290813361.00000000015BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015BD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15bd000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7a26d5e3eb39e44e0f1e7574a87ef88a159b264d837f11a0c5fe6f7c9b873225
                                                                          • Instruction ID: 6018a9f33229531cdc89c5c14e000d3967a5dc126a2d191c0188d303e20c1c44
                                                                          • Opcode Fuzzy Hash: 7a26d5e3eb39e44e0f1e7574a87ef88a159b264d837f11a0c5fe6f7c9b873225
                                                                          • Instruction Fuzzy Hash: 1E210375504248DFDB15CF54D8C0B66BBB5FB84358F24C969D8094F246D33AD806CA61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290813361.00000000015BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015BD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15bd000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7f7b1d73a9ccb03287b998f569277be4baa3245a07287a42b36b1db8b7fba5cd
                                                                          • Instruction ID: bee0690d052037d460e45f78ea383174cd6896bfb929227628d742b5635612dc
                                                                          • Opcode Fuzzy Hash: 7f7b1d73a9ccb03287b998f569277be4baa3245a07287a42b36b1db8b7fba5cd
                                                                          • Instruction Fuzzy Hash: A421B375504280DFDB15DF94D9C0B6AFBB5FB84328F24C96DD8094F646C33AD846CA61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290813361.00000000015BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015BD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15bd000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 71f95eca0d768c7fa6a90c8a25b48faff2adb6c8fe18af3ac4e73c1d2c1623ff
                                                                          • Instruction ID: 6c963805ece4d0f311fe42d14e4dcb75655ab0bd708abbfef678efb6220008cd
                                                                          • Opcode Fuzzy Hash: 71f95eca0d768c7fa6a90c8a25b48faff2adb6c8fe18af3ac4e73c1d2c1623ff
                                                                          • Instruction Fuzzy Hash: F4217C755093848FDB02CF24D9D0B55BF71FB46214F28C5EAD8498F6A7C33A980ACB62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 072819a65bd147f78b9d188748331fab588ed326ce3eec3c2ee73a9c5ed9aef6
                                                                          • Instruction ID: cbb6bba6dd99a0347e437625689b54ed4fdbf85cafc46ba08761927035f4e7ce
                                                                          • Opcode Fuzzy Hash: 072819a65bd147f78b9d188748331fab588ed326ce3eec3c2ee73a9c5ed9aef6
                                                                          • Instruction Fuzzy Hash: 53119130F011159BEB54AB7588147FFF6A6FFC8654F048169EC1ACB340EB38994587D2
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290791237.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15ad000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8fbef4a1e70deff03197093d81f521a6a7c6ef6ce65c584de2f463e24d10b77d
                                                                          • Instruction ID: d7217e7dd7eee5b00ce12525a9f593bf06959f8090661bc51fcc2aea9518ed5a
                                                                          • Opcode Fuzzy Hash: 8fbef4a1e70deff03197093d81f521a6a7c6ef6ce65c584de2f463e24d10b77d
                                                                          • Instruction Fuzzy Hash: E611DF76404280CFDB02DF44D9C4B5ABF71FB84320F2482A9D8090BA17C33AE456CBA2
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290813361.00000000015BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015BD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15bd000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b12f6e5284a8006670de04e8acf0eae73a3b637b28784ce6af087747e0efce52
                                                                          • Instruction ID: ce743a67192e404e81842c68afe7d6657a35ff0942c6caeb0c725c6448c05892
                                                                          • Opcode Fuzzy Hash: b12f6e5284a8006670de04e8acf0eae73a3b637b28784ce6af087747e0efce52
                                                                          • Instruction Fuzzy Hash: 7C11BB75904280DFDB02CF54D5C0B59FFB1FB84228F28C6A9D8494B656C33AD84ACB62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290791237.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15ad000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5d718ca76e3fdb925f0d2166ff4367479ca97d4f1d4e51f02bb89df06576fcb7
                                                                          • Instruction ID: f82f9e68f5d57ae16126bf6b4b1ede3a9c5d44e6c423532f08fd6fbd823caa3f
                                                                          • Opcode Fuzzy Hash: 5d718ca76e3fdb925f0d2166ff4367479ca97d4f1d4e51f02bb89df06576fcb7
                                                                          • Instruction Fuzzy Hash: 1601D4725042C09AE7246A55DC84BAEFFF8FB41264F58851AE9050FA46D3799844C6B1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290791237.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_15ad000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 293429db44f518db6b42fdee956717bd5501d234d5c35faa0a22fe14674a09a4
                                                                          • Instruction ID: 858e5b519c286851e38689472c6e380de23d30e4320496527927f18c5ed9d526
                                                                          • Opcode Fuzzy Hash: 293429db44f518db6b42fdee956717bd5501d234d5c35faa0a22fe14674a09a4
                                                                          • Instruction Fuzzy Hash: CDF0F6724043849EE7149E19DCC4BABFFA8EB81334F18C45AED080FA87C3799844CAB1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e1a5f792c63b94bf97bd76737d3321e37e64557f5a71bb194444b424eb869fc2
                                                                          • Instruction ID: 411be7db52dd6cd7eefdde4867ac10cf52ae14d4357f81622f548d0462b079b9
                                                                          • Opcode Fuzzy Hash: e1a5f792c63b94bf97bd76737d3321e37e64557f5a71bb194444b424eb869fc2
                                                                          • Instruction Fuzzy Hash: AEF0A575D04208EFCB44DFA8D841A9DFBB1EB58310F10C0AAAD1897350D736AA61DF41
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 687aad5be08081e732ac6de7f418af71be6184a93e244073652c67f84e41fb55
                                                                          • Instruction ID: 12b485d3b1825199342208deb06ca6ca3a7828ef80eab7329fee8b7826b4a308
                                                                          • Opcode Fuzzy Hash: 687aad5be08081e732ac6de7f418af71be6184a93e244073652c67f84e41fb55
                                                                          • Instruction Fuzzy Hash: 18E07E74E15208EFCB84DFA9D589A9DBBF4EF48314F1081EAE808A7354D635AA54CF81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d42b474dddae7c58c1c7cce18aa72e5fecdd859fb9ce60af067e25c906d510fd
                                                                          • Instruction ID: b712242fbffac06ec13d0a35efbf92465498883d13a74a59897a339e79b35016
                                                                          • Opcode Fuzzy Hash: d42b474dddae7c58c1c7cce18aa72e5fecdd859fb9ce60af067e25c906d510fd
                                                                          • Instruction Fuzzy Hash: 56E01270D05308EFCB84DFA8E44929DBBB0FB88304F1080AAD808A3340D7399A80DF81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 03175abcd18ef484247d7a9b744b2482b4d70e4a8286b2a15ccc49fd3f8d9c62
                                                                          • Instruction ID: b3ed075271cc31ca40809db447633c8930443694db43ec3cb306698921d8e891
                                                                          • Opcode Fuzzy Hash: 03175abcd18ef484247d7a9b744b2482b4d70e4a8286b2a15ccc49fd3f8d9c62
                                                                          • Instruction Fuzzy Hash: ECE08CB180210CEFCB80EBA0E80579A77BCDB09205F1000EAD509A7610EF351E5497A2
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e1fb2cc3e4f764c615ad301f781f4c34e0c1062949777fb51588389fc226fe9b
                                                                          • Instruction ID: c698f1649db25c943fec483fa98a6766196c7352b66c55ee8b4aac9aee4b11b3
                                                                          • Opcode Fuzzy Hash: e1fb2cc3e4f764c615ad301f781f4c34e0c1062949777fb51588389fc226fe9b
                                                                          • Instruction Fuzzy Hash: 11E0B634D05208EFCB44DF98D5816ADFBB4EB88314F2481EADC08A7345D776AA56CB85
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ee3bdfa81677544719ba0abcc5d3bc9c45087071dc7e5bbe3ba32b23ea11d534
                                                                          • Instruction ID: deec01a0d3f8149d456c5596f1d15ecaa93589d680cf222784a4e214f438d717
                                                                          • Opcode Fuzzy Hash: ee3bdfa81677544719ba0abcc5d3bc9c45087071dc7e5bbe3ba32b23ea11d534
                                                                          • Instruction Fuzzy Hash: 74D0A730506108DBC744DB94D841B6AB778DB45314F1040DD9C0857340CB73AD42C791
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: +
                                                                          • API String ID: 0-2126386893
                                                                          • Opcode ID: f53705df0eb1a5a8cac4e0fd945c423880727bb8377154912cbde0fd49026a41
                                                                          • Instruction ID: 7bbac04231d5dc43f87f6816259b13c54ffb8bb94576bb08574f16fe15da7f68
                                                                          • Opcode Fuzzy Hash: f53705df0eb1a5a8cac4e0fd945c423880727bb8377154912cbde0fd49026a41
                                                                          • Instruction Fuzzy Hash: DA412271E15A188BEB6CCF6BCD4079AFAF7BFC9201F14C5BA880DA6255DB3015858F11
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b15e6e31b513231e0bc644b88c6f7f8fdf7d03039c4c3662f295dc70668d4c25
                                                                          • Instruction ID: ddd8ef3123fa60f91cf238dfac6be11344ce94ca416db8b6c77f5572fa03f497
                                                                          • Opcode Fuzzy Hash: b15e6e31b513231e0bc644b88c6f7f8fdf7d03039c4c3662f295dc70668d4c25
                                                                          • Instruction Fuzzy Hash: D51293F16117468EEB34CF6AF8981897BA1F755328F904308D2612BAD9D7B8334ACF54
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8b5b3e605b044a0f19eb7c4da2cd44171d9d29cdc881623dd353bf69ba8e50f9
                                                                          • Instruction ID: cf7bdfb80c77095d2bb0a3504a374de4fb9672418f349ebe2829c1bb53d0a65c
                                                                          • Opcode Fuzzy Hash: 8b5b3e605b044a0f19eb7c4da2cd44171d9d29cdc881623dd353bf69ba8e50f9
                                                                          • Instruction Fuzzy Hash: B6A16132E0061A8FCF15DFA5C8449EEBBB7FF94300F15856AE905AB261EB31A915CF40
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.290913473.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_1650000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 196390e5b087d1a4de0ae4ec059b9b22b05a9bffe6228583eec9ba5cd596de9c
                                                                          • Instruction ID: 33b604215f99d4a1fd39959410cd7f54173b79444a4b400b5c3ae7fd9a707976
                                                                          • Opcode Fuzzy Hash: 196390e5b087d1a4de0ae4ec059b9b22b05a9bffe6228583eec9ba5cd596de9c
                                                                          • Instruction Fuzzy Hash: F0C119B1A117468FDB20CF6AF8981897BB1FB95328F504308D1616BAD9D7B4334ACF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0b57744e76927d494c89f6af382a2e13963c25d99c973552ae0811cae951bfb7
                                                                          • Instruction ID: 3ca9e8f5570c323ec55e1051e8b182a79a5b0039dc0f33aab7074cc1bfe5f0e9
                                                                          • Opcode Fuzzy Hash: 0b57744e76927d494c89f6af382a2e13963c25d99c973552ae0811cae951bfb7
                                                                          • Instruction Fuzzy Hash: 9341C7B1D056588FEB59CF66C85478ABBF3AFC5300F14C1EAC44CAB265DB3509868F51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.304644823.000000000BB50000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BB50000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_bb50000_RECHNUNG-RP0188843894.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bb308cd07a35382196b310e10ec4cb27d207fad4132e02c9d4e8541aa13c8d61
                                                                          • Instruction ID: 68bbf5e19fe346c7d13a87d820583f01347084b6304eb8ed88b7598da0e51998
                                                                          • Opcode Fuzzy Hash: bb308cd07a35382196b310e10ec4cb27d207fad4132e02c9d4e8541aa13c8d61
                                                                          • Instruction Fuzzy Hash: F13187B1D056188BEB68CF5BDC4479AFAF3AFC8314F14C1EAC40CA6264DB750A968F11
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%