Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RECHNUNG-RP0188843894.exe

Overview

General Information

Sample Name:RECHNUNG-RP0188843894.exe
Analysis ID:679140
MD5:e366f96c9b5c5528426a116eb49ef445
SHA1:8062220b613b56116d638b3d7f5dd043f3bc096e
SHA256:2a05a23d8879f9d001af335779b5102dd644b08d2f106353c28c8ce303ee9b58
Tags:exe
Infos:

Detection

NetWire
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected NetWire RAT
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • RECHNUNG-RP0188843894.exe (PID: 5900 cmdline: "C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe" MD5: E366F96C9B5C5528426A116EB49EF445)
    • powershell.exe (PID: 4684 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 4700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6136 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RECHNUNG-RP0188843894.exe (PID: 5296 cmdline: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe MD5: E366F96C9B5C5528426A116EB49EF445)
  • cleanup
{"C2 list": ["xman2.duckdns.org:4433"], "Password": "Password", "Host ID": "HostId-%Rand%", "Mutex": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
SourceRuleDescriptionAuthorStrings
00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
  • 0x9e4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
  • 0xaf8:$s3: [Log Started] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
  • 0xb2c:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
    00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Netwire_1b43df38unknownunknown
    • 0xb08:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0xb33:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0x1b1a:$a2: \Login Data
    • 0x1b99:$a2: \Login Data
    • 0x1c22:$a2: \Login Data
    • 0x1cb9:$a2: \Login Data
    • 0x1d68:$a2: \Login Data
    • 0x1e05:$a2: \Login Data
    • 0x1e5e:$a2: \Login Data
    • 0x99c:$a3: SOFTWARE\NetWire
    00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
    • 0x9e4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    • 0xaf8:$s3: [Log Started] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    • 0xb2c:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
    00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
      Click to see the 12 entries
      SourceRuleDescriptionAuthorStrings
      8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackMAL_unspecified_Jan18_1Detects unspecified malware sampleFlorian Roth
      • 0x34fe4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      • 0x350f8:$s3: [Log Started] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
      • 0x3512c:$s5: [%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
      8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
        8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackMALWARE_Win_NetWireDetects NetWire RATditekSHen
        • 0x34f9c:$x1: SOFTWARE\NetWire
        • 0x34f44:$x2: 4E 65 74 57 69 72 65 00 53 4F 46 54 57 41 52 45 5C 00
        • 0x34fe4:$s1: User-Agent: Mozilla/4.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
        • 0x34fc8:$s3: GET %s HTTP/1.1
        • 0x35108:$s4: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x35133:$s4: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x34e84:$s6: -m "%s"
        • 0x34f94:$g1: HostId
        • 0x35f7c:$g2: History
        • 0x35fcc:$g3: encrypted_key
        • 0x34fb0:$g4: Install Date
        • 0x35bd8:$g5: hostname
        • 0x35be4:$g6: encryptedUsername
        • 0x35bf8:$g7: encryptedPassword
        8.0.RECHNUNG-RP0188843894.exe.400000.0.unpackWindows_Trojan_Netwire_1b43df38unknownunknown
        • 0x35108:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x35133:$a1: [%.2d/%.2d/%d %.2d:%.2d:%.2d]
        • 0x3611a:$a2: \Login Data
        • 0x36199:$a2: \Login Data
        • 0x36222:$a2: \Login Data
        • 0x362b9:$a2: \Login Data
        • 0x36368:$a2: \Login Data
        • 0x36405:$a2: \Login Data
        • 0x3645e:$a2: \Login Data
        • 0x34f9c:$a3: SOFTWARE\NetWire
        0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpackJoeSecurity_NetWire_1Yara detected NetWire RATJoe Security
          Click to see the 23 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: RECHNUNG-RP0188843894.exeVirustotal: Detection: 21%Perma Link
          Source: RECHNUNG-RP0188843894.exeReversingLabs: Detection: 17%
          Source: xman2.duckdns.orgVirustotal: Detection: 14%Perma Link
          Source: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeVirustotal: Detection: 21%Perma Link
          Source: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeReversingLabs: Detection: 17%
          Source: RECHNUNG-RP0188843894.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJoe Sandbox ML: detected
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpackMalware Configuration Extractor: NetWire {"C2 list": ["xman2.duckdns.org:4433"], "Password": "Password", "Host ID": "HostId-%Rand%", "Mutex": "-", "Startup Name": "-", "ActiveX Key": "-", "KeyLog Directory": "-"}
          Source: RECHNUNG-RP0188843894.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: RECHNUNG-RP0188843894.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: xman2.duckdns.org:4433
          Source: unknownDNS query: name: xman2.duckdns.org
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: Joe Sandbox ViewIP Address: 154.53.40.254 154.53.40.254
          Source: global trafficTCP traffic: 192.168.2.3:49742 -> 154.53.40.254:4433
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://%s%%s%.2d-%.2d-%.4d
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: xman2.duckdns.org
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.291116918.00000000016C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputData

          System Summary

          barindex
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NetWire RAT Author: ditekSHen
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: Detects unspecified malware sample Author: Florian Roth
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 Author: unknown
          Source: RECHNUNG-RP0188843894.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NetWire author = ditekSHen, description = Detects NetWire RAT
          Source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: MAL_unspecified_Jan18_1 date = 2018-01-19, hash1 = f87879b29ff83616e9c9044bd5fb847cf5d2efdd2f01fc284d1a6ce7d464a417, author = Florian Roth, description = Detects unspecified malware sample, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Trojan_Netwire_1b43df38 reference_sample = e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254, os = windows, severity = x86, creation_date = 2021-06-28, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Netwire, fingerprint = 4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76, id = 1b43df38-886e-4f58-954a-a09f30f19907, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165C364
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165E720
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165E730
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB57818
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB50006
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB50040
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0BB58E08
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.291116918.00000000016C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.295371420.0000000004B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.292299190.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.303787376.000000000B8C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000003.271470955.0000000007B46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBinaryWri.exe: vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000000.250787164.0000000000FFF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBinaryWri.exe: vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exeBinary or memory string: OriginalFilenameBinaryWri.exe: vs RECHNUNG-RP0188843894.exe
          Source: RECHNUNG-RP0188843894.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: rWWREmAZOgElhb.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: RECHNUNG-RP0188843894.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: rWWREmAZOgElhb.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: RECHNUNG-RP0188843894.exeVirustotal: Detection: 21%
          Source: RECHNUNG-RP0188843894.exeReversingLabs: Detection: 17%
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeJump to behavior
          Source: RECHNUNG-RP0188843894.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe "C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe"
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile created: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile created: C:\Users\user\AppData\Local\Temp\tmp58ED.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/8@61/2
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: RECHNUNG-RP0188843894.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5668:120:WilError_01
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeMutant created: \Sessions\1\BaseNamedObjects\-
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeMutant created: \Sessions\1\BaseNamedObjects\UGuYsqINzELkVGLDAodcCAWpBT
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4700:120:WilError_01
          Source: RECHNUNG-RP0188843894.exe, Lib_Mang_Sys/Member_Panel.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: rWWREmAZOgElhb.exe.0.dr, Lib_Mang_Sys/Member_Panel.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.RECHNUNG-RP0188843894.exe.ec0000.0.unpack, Lib_Mang_Sys/Member_Panel.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: RECHNUNG-RP0188843894.exeStatic file information: File size 1299456 > 1048576
          Source: RECHNUNG-RP0188843894.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: RECHNUNG-RP0188843894.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: RECHNUNG-RP0188843894.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

          Data Obfuscation

          barindex
          Source: RECHNUNG-RP0188843894.exe, Lib_Mang_Sys/Member_Panel.cs.Net Code: DataReturn System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: rWWREmAZOgElhb.exe.0.dr, Lib_Mang_Sys/Member_Panel.cs.Net Code: DataReturn System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.RECHNUNG-RP0188843894.exe.ec0000.0.unpack, Lib_Mang_Sys/Member_Panel.cs.Net Code: DataReturn System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeCode function: 0_2_0165BB31 push E001AFA9h; ret
          Source: RECHNUNG-RP0188843894.exeStatic PE information: 0xEDF14A3D [Sun Jul 1 20:36:13 2096 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.588133806696738
          Source: initial sampleStatic PE information: section name: .text entropy: 7.588133806696738
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeFile created: C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTR
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 5916Thread sleep time: -45877s >= -30000s
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 980Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5904Thread sleep time: -5534023222112862s >= -30000s
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 5276Thread sleep count: 60 > 30
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe TID: 5276Thread sleep time: -4500000s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9194
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 45877
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeThread delayed: delay time: 75000
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: RECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeProcess created: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Users\user\Desktop\RECHNUNG-RP0188843894.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 8.0.RECHNUNG-RP0188843894.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.50474e8.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.36c09e8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.36d3e80.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.36c7c34.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.5002ec8.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RECHNUNG-RP0188843894.exe.4fbaca8.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5900, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RECHNUNG-RP0188843894.exe PID: 5296, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          11
          Process Injection
          1
          Masquerading
          21
          Input Capture
          21
          Security Software Discovery
          Remote Services21
          Input Capture
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
          Virtualization/Sandbox Evasion
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer21
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common2
          Obfuscated Files or Information
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items12
          Software Packing
          DCSync12
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Timestomp
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          RECHNUNG-RP0188843894.exe21%VirustotalBrowse
          RECHNUNG-RP0188843894.exe18%ReversingLabsByteCode-MSIL.Trojan.LokiBot
          RECHNUNG-RP0188843894.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe21%VirustotalBrowse
          C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe18%ReversingLabsByteCode-MSIL.Trojan.LokiBot
          No Antivirus matches
          SourceDetectionScannerLabelLink
          xman2.duckdns.org15%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          xman2.duckdns.org:44330%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://%s%%s%.2d-%.2d-%.4d0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          xman2.duckdns.org
          154.53.40.254
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          xman2.duckdns.org:4433true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8RECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://%s%%s%.2d-%.2d-%.4dRECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, RECHNUNG-RP0188843894.exe, 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRECHNUNG-RP0188843894.exe, 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sakkal.comRECHNUNG-RP0188843894.exe, 00000000.00000002.300524429.00000000073C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                154.53.40.254
                                xman2.duckdns.orgUnited States
                                174COGENT-174UStrue
                                IP
                                192.168.2.1
                                Joe Sandbox Version:35.0.0 Citrine
                                Analysis ID:679140
                                Start date and time: 05/08/202210:35:082022-08-05 10:35:08 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 6m 46s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:RECHNUNG-RP0188843894.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:31
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@9/8@61/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 87%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Adjust boot time
                                • Enable AMSI
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                • TCP Packets have been reduced to 100
                                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                10:36:20API Interceptor62x Sleep call for process: RECHNUNG-RP0188843894.exe modified
                                10:36:27API Interceptor40x Sleep call for process: powershell.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):1750
                                Entropy (8bit):5.3375092442007315
                                Encrypted:false
                                SSDEEP:48:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzvFHYHKlEHUzvAHj:Pq5qXEwCYqhQnoPtIxHeqzN4qm0z4D
                                MD5:92FEE17DD9A6925BA2D1E5EF2CD6E5F2
                                SHA1:4614AE0DD188A0FE1983C5A8D82A69AF5BD13039
                                SHA-256:67351D6FA9F9E11FD21E72581AFDC8E63A284A6080D99A6390641FC11C667235
                                SHA-512:C599C633D288B845A7FAA31FC0FA86EAB8585CC2C515D68CA0DFC6AB16B27515A5D729EF535109B2CDE29FF3CF4CF725F4F920858501A2421FC7D76C804F2AA7
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):22272
                                Entropy (8bit):5.6027188324374535
                                Encrypted:false
                                SSDEEP:384:TtCD60F+x6b9TtYS0nMjsh77Y9g9SJ3xa1BMrm7Z1AV7ag464I+iyY:z65TtYTMohf9cBa4yA
                                MD5:77E6E1687BDD89C7F85A8C47BF26E0E4
                                SHA1:C8DCDA5CB81BD6D396C120DE2D9F49F0F7372AF9
                                SHA-256:612CDA6AE4D2DD8DE394FE35782450112EE8EA0853CC4AC697B68D6DE63518E1
                                SHA-512:3615659735FD74E97ECC4B6C5E78C3E426B2413AFB598DAE25EEC583118E8A6620FBC82B9ED3EEB41EC804653919F8DB6C43AFD7BCF75CD66AA64B6A486B0904
                                Malicious:false
                                Reputation:low
                                Preview:@...e...........y.........e.B.8.....@.B..............@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1
                                Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                File Type:XML 1.0 document, ASCII text
                                Category:dropped
                                Size (bytes):1601
                                Entropy (8bit):5.153566916379303
                                Encrypted:false
                                SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtgvVxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTgvrv
                                MD5:A390F07FE0E218E00223091926488958
                                SHA1:5E2D9D09FF1167925B4EF3AF96708D5CBB0574FC
                                SHA-256:FE2451F076CC5EEC42D4EED783E94A8773DBEC17BA99D23BBC3FC451346060BA
                                SHA-512:A274F6DFC7820032EDA8FA974901D7E9FF471ABE6128399770B5B2CCC0F049F4C66F63E1E030D5A243EC362DAF533863F41C6DCF6E0979329AA49D08BB6D2ABB
                                Malicious:true
                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1299456
                                Entropy (8bit):7.136675750532489
                                Encrypted:false
                                SSDEEP:24576:iTJjpjM7KzOkDwPN2XanQBOrOlaLlpxtRYNNHV3lSpWBb62:EjW77kQNaaQB6w+tR63AEbT
                                MD5:E366F96C9B5C5528426A116EB49EF445
                                SHA1:8062220B613B56116D638B3D7F5DD043F3BC096E
                                SHA-256:2A05A23D8879F9D001AF335779B5102DD644B08D2F106353C28C8CE303EE9B58
                                SHA-512:1DC21DA10C45A5FBD5058E85D775CCCEC140A0FEC067183013457D7AB87F9BFD758429A999DF2B2BF0AFD19D44B289418C6A8457689346521764A812A0430E9D
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Virustotal, Detection: 21%, Browse
                                • Antivirus: ReversingLabs, Detection: 18%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=J................0..............L... ...`....@.. .......................@............@..................................L..O....`..4.................... .......L............................................... ............... ..H............text....-... ...................... ..`.rsrc...4....`.......0..............@..@.reloc....... ......................@..B.................L......H.......@...,P......$...l....z.............................................}.....(.......(......{.....o.....*....0..w........r...p..s.......~O.....o.....r$..p..B....(.......s........o......s..........o......{......o........&........,..o......*.........Tc..........]k.......0..:.........o ........,+..{....o!...o"....o#...o$....B......(......*...0..n........r...p..s........o.....r...p..B...(%.......(&.....B...('......s......o(.....r...p()...&...&........,..o......*..........KZ..
                                Process:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):5805
                                Entropy (8bit):5.4162470391864685
                                Encrypted:false
                                SSDEEP:96:BZdSh7NpuqDo1Zm1ZQh7NpuqDo1Zztj1jZPh7NpuqDo1ZQIllPZs:Z63MQJ
                                MD5:B137630C24F96036570C1BAA5B9239F2
                                SHA1:6CC286C1FE58C6730CE716171D03956FA85200C4
                                SHA-256:2E371FCC58D890D819E1CCB5F669DFBCC3DCBF8E0810787FCD597BFAFB26CD40
                                SHA-512:0E85F55184B8BED1AF55AB18D3714F45A95B79C23ECA19AFE4E09095480C0DA0B70AA8DBE3C8AC4CE3975A64AEAAA24B4D5CD1D234546A02961093C267E687D9
                                Malicious:false
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220805103627..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 579569 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe..Process ID: 4684..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220805103627..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe..**********************..Windows PowerShell transcript start..Start time: 20220805104006..Username: computer\user..RunAs User: DESKTOP-716T
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.136675750532489
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:RECHNUNG-RP0188843894.exe
                                File size:1299456
                                MD5:e366f96c9b5c5528426a116eb49ef445
                                SHA1:8062220b613b56116d638b3d7f5dd043f3bc096e
                                SHA256:2a05a23d8879f9d001af335779b5102dd644b08d2f106353c28c8ce303ee9b58
                                SHA512:1dc21da10c45a5fbd5058e85d775cccec140a0fec067183013457d7ab87f9bfd758429a999df2b2bf0afd19d44b289418c6a8457689346521764a812a0430e9d
                                SSDEEP:24576:iTJjpjM7KzOkDwPN2XanQBOrOlaLlpxtRYNNHV3lSpWBb62:EjW77kQNaaQB6w+tR63AEbT
                                TLSH:9855F1D153898B42CC6A0EB8E3122524C776EC7FEAFEC6C98DC7B8A695367C31550907
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...=J................0..............L... ...`....@.. .......................@............@................................
                                Icon Hash:d72e9cb139dccfcf
                                Entrypoint:0x4d4cf2
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0xEDF14A3D [Sun Jul 1 20:36:13 2096 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                dec eax
                                xor al, 46h
                                pop edx
                                push esp
                                inc edi
                                inc ebx
                                pop eax
                                cmp byte ptr [edi], dh
                                pop eax
                                xor al, 38h
                                inc edx
                                inc esi
                                aaa
                                xor al, 47h
                                inc edx
                                xor eax, 00003838h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd4ca00x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000x6a034.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1420000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xd4c840x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xd2d100xd2e00False0.8411728475103735data7.588133806696738IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xd60000x6a0340x6a200False0.5962322401354535data5.178213553665152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1420000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xd62b00x468GLS_BINARY_LSB_FIRST
                                RT_ICON0xd67180x988data
                                RT_ICON0xd70a00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4291831602, next used block 4291766318
                                RT_ICON0xd81480x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4291963945, next used block 4291897384
                                RT_ICON0xda6f00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4291961375, next used block 4291898412
                                RT_ICON0xde9180x5488data
                                RT_ICON0xe3da00x94a8data
                                RT_ICON0xed2480x10828data
                                RT_ICON0xfda700x42028data
                                RT_GROUP_ICON0x13fa980x84data
                                RT_VERSION0x13fb1c0x32cdata
                                RT_MANIFEST0x13fe480x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Aug 5, 2022 10:36:31.656548977 CEST497424433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:31.785160065 CEST443349742154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:32.285480022 CEST497424433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:32.414148092 CEST443349742154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:32.988645077 CEST497424433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:33.117506027 CEST443349742154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:33.416806936 CEST497434433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:33.545722961 CEST443349743154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:34.098393917 CEST497434433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:34.227309942 CEST443349743154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:34.786665916 CEST497434433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:34.915574074 CEST443349743154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:35.064102888 CEST497444433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:35.192878962 CEST443349744154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:35.785737038 CEST497444433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:35.914422989 CEST443349744154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:36.598412037 CEST497444433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:36.727186918 CEST443349744154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:37.061316967 CEST497454433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:37.191855907 CEST443349745154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:37.692172050 CEST497454433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:37.822730064 CEST443349745154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:38.395467043 CEST497454433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:38.526202917 CEST443349745154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:38.803046942 CEST497464433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:38.932218075 CEST443349746154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:39.583028078 CEST497464433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:39.713824034 CEST443349746154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:40.294439077 CEST497464433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:40.423263073 CEST443349746154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:40.592158079 CEST497474433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:40.724276066 CEST443349747154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:41.286220074 CEST497474433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:41.415282011 CEST443349747154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:42.005039930 CEST497474433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:42.133578062 CEST443349747154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:42.345221996 CEST497484433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:42.474113941 CEST443349748154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:43.083301067 CEST497484433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:43.212089062 CEST443349748154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:43.895879984 CEST497484433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:44.024575949 CEST443349748154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:46.123747110 CEST497494433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:46.252482891 CEST443349749154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:46.787447929 CEST497494433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:46.916045904 CEST443349749154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:47.599356890 CEST497494433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:47.727940083 CEST443349749154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:47.991723061 CEST497504433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:48.123805046 CEST443349750154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:48.786936045 CEST497504433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:48.917444944 CEST443349750154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:49.599488974 CEST497504433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:49.729923010 CEST443349750154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:49.982130051 CEST497534433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:50.110760927 CEST443349753154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:50.787128925 CEST497534433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:50.915821075 CEST443349753154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:51.599704027 CEST497534433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:51.729322910 CEST443349753154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:51.878688097 CEST497644433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:52.009074926 CEST443349764154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:52.521568060 CEST497644433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:52.652179956 CEST443349764154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:53.162271023 CEST497644433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:53.297802925 CEST443349764154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:53.473370075 CEST497674433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:53.601818085 CEST443349767154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:54.115428925 CEST497674433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:54.243844032 CEST443349767154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:54.756218910 CEST497674433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:54.885060072 CEST443349767154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:55.036801100 CEST497684433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:55.167428017 CEST443349768154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:55.678061008 CEST497684433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:55.808562994 CEST443349768154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:56.318871975 CEST497684433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:56.449253082 CEST443349768154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:56.702867031 CEST497694433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:56.831686974 CEST443349769154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:57.350337982 CEST497694433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:57.479219913 CEST443349769154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:57.990900040 CEST497694433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:58.120034933 CEST443349769154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:58.267262936 CEST497714433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:58.398102045 CEST443349771154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:58.928436041 CEST497714433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:59.059241056 CEST443349771154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:59.569082022 CEST497714433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:36:59.699763060 CEST443349771154.53.40.254192.168.2.3
                                Aug 5, 2022 10:36:59.879499912 CEST497724433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:37:00.006443977 CEST443349772154.53.40.254192.168.2.3
                                Aug 5, 2022 10:37:00.506665945 CEST497724433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:37:00.633924961 CEST443349772154.53.40.254192.168.2.3
                                Aug 5, 2022 10:37:01.147384882 CEST497724433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:37:01.274421930 CEST443349772154.53.40.254192.168.2.3
                                Aug 5, 2022 10:37:01.705369949 CEST497734433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:37:01.834167957 CEST443349773154.53.40.254192.168.2.3
                                Aug 5, 2022 10:37:02.334907055 CEST497734433192.168.2.3154.53.40.254
                                Aug 5, 2022 10:37:02.463685989 CEST443349773154.53.40.254192.168.2.3
                                TimestampSource PortDest PortSource IPDest IP
                                Aug 5, 2022 10:36:31.537233114 CEST6485153192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:31.644268990 CEST53648518.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:33.306726933 CEST4931653192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:33.415712118 CEST53493168.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:35.044496059 CEST5641753192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:35.061969995 CEST53564178.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:36.911396027 CEST5592353192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:37.020839930 CEST53559238.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:38.692194939 CEST5772353192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:38.801831961 CEST53577238.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:40.571228981 CEST5811653192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:40.590759039 CEST53581168.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:42.295826912 CEST5742153192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:42.315216064 CEST53574218.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:46.095731974 CEST6535853192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:46.115034103 CEST53653588.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:47.882976055 CEST4987353192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:47.989651918 CEST53498738.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:49.872052908 CEST5380253192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:49.981059074 CEST53538028.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:51.858122110 CEST4932753192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:51.877913952 CEST53493278.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:53.451700926 CEST5898153192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:53.468983889 CEST53589818.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:55.015970945 CEST6445253192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:55.035500050 CEST53644528.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:56.591095924 CEST6138053192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:56.699117899 CEST53613808.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:58.245412111 CEST5298553192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:58.264786959 CEST53529858.8.8.8192.168.2.3
                                Aug 5, 2022 10:36:59.858932018 CEST5862553192.168.2.38.8.8.8
                                Aug 5, 2022 10:36:59.878209114 CEST53586258.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:01.662796021 CEST5281053192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:01.682724953 CEST53528108.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:04.619702101 CEST5077853192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:04.652460098 CEST53507788.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:06.317322016 CEST5515153192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:06.336277962 CEST53551518.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:07.881041050 CEST5979553192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:07.900559902 CEST53597958.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:09.460410118 CEST5939053192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:09.569144011 CEST53593908.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:11.152297020 CEST6481653192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:11.171711922 CEST53648168.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:12.699728966 CEST6499653192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:12.717298031 CEST53649968.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:14.259583950 CEST5381653192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:14.279328108 CEST53538168.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:15.823040962 CEST5209653192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:15.840471029 CEST53520968.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:17.631247044 CEST6064053192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:17.648741961 CEST53606408.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:19.297427893 CEST4984453192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:19.315130949 CEST53498448.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:21.475986958 CEST5151853192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:21.495111942 CEST53515188.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:23.301103115 CEST4972353192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:23.320753098 CEST53497238.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:25.064929962 CEST5015253192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:25.086270094 CEST53501528.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:26.827538967 CEST5663953192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:26.846600056 CEST53566398.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:28.562978983 CEST5045053192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:28.582564116 CEST53504508.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:30.299781084 CEST6272453192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:30.317589998 CEST53627248.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:32.129381895 CEST5540353192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:32.149024963 CEST53554038.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:33.799338102 CEST6187753192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:33.816740990 CEST53618778.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:35.426795959 CEST6462453192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:35.446317911 CEST53646248.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:37.056559086 CEST5060853192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:37.163552999 CEST53506088.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:38.849581003 CEST5849753192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:38.869132042 CEST53584978.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:41.844887972 CEST6270153192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:41.955061913 CEST53627018.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:43.851545095 CEST6155553192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:43.962873936 CEST53615558.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:45.681632996 CEST6443353192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:45.702647924 CEST53644338.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:47.396205902 CEST5409653192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:47.415527105 CEST53540968.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:48.989021063 CEST6332653192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:49.095340014 CEST53633268.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:50.657083988 CEST6011053192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:50.676486969 CEST53601108.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:52.247087002 CEST4923053192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:52.264116049 CEST53492308.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:53.914503098 CEST5744253192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:53.934427023 CEST53574428.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:55.519682884 CEST5155753192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:55.536693096 CEST53515578.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:57.280276060 CEST6533453192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:57.299637079 CEST53653348.8.8.8192.168.2.3
                                Aug 5, 2022 10:37:58.863878012 CEST5248753192.168.2.38.8.8.8
                                Aug 5, 2022 10:37:58.883487940 CEST53524878.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:00.566334963 CEST5199453192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:00.585450888 CEST53519948.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:02.394844055 CEST5165853192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:02.413980961 CEST53516588.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:04.002974033 CEST5895053192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:04.110976934 CEST53589508.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:05.913765907 CEST5388353192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:06.022942066 CEST53538838.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:07.601854086 CEST5906553192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:07.621037006 CEST53590658.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:09.176075935 CEST5568653192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:09.193387985 CEST53556868.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:10.723433018 CEST6458953192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:10.745327950 CEST53645898.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:12.292118073 CEST6493453192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:12.309509039 CEST53649348.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:13.843307018 CEST5579553192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:13.861007929 CEST53557958.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:15.391450882 CEST6463553192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:15.408987045 CEST53646358.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:17.311804056 CEST5526953192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:17.331228971 CEST53552698.8.8.8192.168.2.3
                                Aug 5, 2022 10:38:18.986835957 CEST6308353192.168.2.38.8.8.8
                                Aug 5, 2022 10:38:19.007206917 CEST53630838.8.8.8192.168.2.3
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Aug 5, 2022 10:36:31.537233114 CEST192.168.2.38.8.8.80xc79fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:33.306726933 CEST192.168.2.38.8.8.80xc00eStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:35.044496059 CEST192.168.2.38.8.8.80xfcc6Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:36.911396027 CEST192.168.2.38.8.8.80x6221Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:38.692194939 CEST192.168.2.38.8.8.80xbacaStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:40.571228981 CEST192.168.2.38.8.8.80x9cb8Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:42.295826912 CEST192.168.2.38.8.8.80x99caStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:46.095731974 CEST192.168.2.38.8.8.80xc292Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:47.882976055 CEST192.168.2.38.8.8.80xf4fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:49.872052908 CEST192.168.2.38.8.8.80xee1fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:51.858122110 CEST192.168.2.38.8.8.80x3d8cStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:53.451700926 CEST192.168.2.38.8.8.80x280aStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:55.015970945 CEST192.168.2.38.8.8.80xacf4Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:56.591095924 CEST192.168.2.38.8.8.80x20f1Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:58.245412111 CEST192.168.2.38.8.8.80xafb7Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:59.858932018 CEST192.168.2.38.8.8.80xf7f7Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:01.662796021 CEST192.168.2.38.8.8.80x697eStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:04.619702101 CEST192.168.2.38.8.8.80x120dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:06.317322016 CEST192.168.2.38.8.8.80x5c89Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:07.881041050 CEST192.168.2.38.8.8.80x16d2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:09.460410118 CEST192.168.2.38.8.8.80xa4a0Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:11.152297020 CEST192.168.2.38.8.8.80xe7a2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:12.699728966 CEST192.168.2.38.8.8.80x46cbStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:14.259583950 CEST192.168.2.38.8.8.80x3685Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:15.823040962 CEST192.168.2.38.8.8.80x6d0cStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:17.631247044 CEST192.168.2.38.8.8.80xfe86Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:19.297427893 CEST192.168.2.38.8.8.80xc9bStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:21.475986958 CEST192.168.2.38.8.8.80x7be2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:23.301103115 CEST192.168.2.38.8.8.80x371fStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:25.064929962 CEST192.168.2.38.8.8.80x66a9Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:26.827538967 CEST192.168.2.38.8.8.80x3d67Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:28.562978983 CEST192.168.2.38.8.8.80xa765Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:30.299781084 CEST192.168.2.38.8.8.80x71d3Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:32.129381895 CEST192.168.2.38.8.8.80xf5dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:33.799338102 CEST192.168.2.38.8.8.80x4585Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:35.426795959 CEST192.168.2.38.8.8.80x9206Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:37.056559086 CEST192.168.2.38.8.8.80x63c8Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:38.849581003 CEST192.168.2.38.8.8.80xa6f2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:41.844887972 CEST192.168.2.38.8.8.80xa866Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:43.851545095 CEST192.168.2.38.8.8.80xcd5dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:45.681632996 CEST192.168.2.38.8.8.80xea78Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:47.396205902 CEST192.168.2.38.8.8.80xd829Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:48.989021063 CEST192.168.2.38.8.8.80xdee0Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:50.657083988 CEST192.168.2.38.8.8.80x879Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:52.247087002 CEST192.168.2.38.8.8.80x2e5Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:53.914503098 CEST192.168.2.38.8.8.80x5609Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:55.519682884 CEST192.168.2.38.8.8.80xbbfeStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:57.280276060 CEST192.168.2.38.8.8.80x724eStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:58.863878012 CEST192.168.2.38.8.8.80x34f5Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:00.566334963 CEST192.168.2.38.8.8.80x592cStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:02.394844055 CEST192.168.2.38.8.8.80x83c0Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:04.002974033 CEST192.168.2.38.8.8.80x1903Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:05.913765907 CEST192.168.2.38.8.8.80xc26Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:07.601854086 CEST192.168.2.38.8.8.80x81bStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:09.176075935 CEST192.168.2.38.8.8.80xd68dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:10.723433018 CEST192.168.2.38.8.8.80xbf16Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:12.292118073 CEST192.168.2.38.8.8.80xd601Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:13.843307018 CEST192.168.2.38.8.8.80xff6aStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:15.391450882 CEST192.168.2.38.8.8.80x360dStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:17.311804056 CEST192.168.2.38.8.8.80x7f6bStandard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:18.986835957 CEST192.168.2.38.8.8.80x1ea2Standard query (0)xman2.duckdns.orgA (IP address)IN (0x0001)
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Aug 5, 2022 10:36:31.644268990 CEST8.8.8.8192.168.2.30xc79fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:33.415712118 CEST8.8.8.8192.168.2.30xc00eNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:35.061969995 CEST8.8.8.8192.168.2.30xfcc6No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:37.020839930 CEST8.8.8.8192.168.2.30x6221No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:38.801831961 CEST8.8.8.8192.168.2.30xbacaNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:40.590759039 CEST8.8.8.8192.168.2.30x9cb8No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:42.315216064 CEST8.8.8.8192.168.2.30x99caNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:46.115034103 CEST8.8.8.8192.168.2.30xc292No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:47.989651918 CEST8.8.8.8192.168.2.30xf4fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:49.981059074 CEST8.8.8.8192.168.2.30xee1fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:51.877913952 CEST8.8.8.8192.168.2.30x3d8cNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:53.468983889 CEST8.8.8.8192.168.2.30x280aNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:55.035500050 CEST8.8.8.8192.168.2.30xacf4No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:56.699117899 CEST8.8.8.8192.168.2.30x20f1No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:58.264786959 CEST8.8.8.8192.168.2.30xafb7No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:36:59.878209114 CEST8.8.8.8192.168.2.30xf7f7No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:01.682724953 CEST8.8.8.8192.168.2.30x697eNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:04.652460098 CEST8.8.8.8192.168.2.30x120dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:06.336277962 CEST8.8.8.8192.168.2.30x5c89No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:07.900559902 CEST8.8.8.8192.168.2.30x16d2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:09.569144011 CEST8.8.8.8192.168.2.30xa4a0No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:11.171711922 CEST8.8.8.8192.168.2.30xe7a2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:12.717298031 CEST8.8.8.8192.168.2.30x46cbNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:14.279328108 CEST8.8.8.8192.168.2.30x3685No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:15.840471029 CEST8.8.8.8192.168.2.30x6d0cNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:17.648741961 CEST8.8.8.8192.168.2.30xfe86No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:19.315130949 CEST8.8.8.8192.168.2.30xc9bNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:21.495111942 CEST8.8.8.8192.168.2.30x7be2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:23.320753098 CEST8.8.8.8192.168.2.30x371fNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:25.086270094 CEST8.8.8.8192.168.2.30x66a9No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:26.846600056 CEST8.8.8.8192.168.2.30x3d67No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:28.582564116 CEST8.8.8.8192.168.2.30xa765No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:30.317589998 CEST8.8.8.8192.168.2.30x71d3No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:32.149024963 CEST8.8.8.8192.168.2.30xf5dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:33.816740990 CEST8.8.8.8192.168.2.30x4585No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:35.446317911 CEST8.8.8.8192.168.2.30x9206No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:37.163552999 CEST8.8.8.8192.168.2.30x63c8No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:38.869132042 CEST8.8.8.8192.168.2.30xa6f2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:41.955061913 CEST8.8.8.8192.168.2.30xa866No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:43.962873936 CEST8.8.8.8192.168.2.30xcd5dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:45.702647924 CEST8.8.8.8192.168.2.30xea78No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:47.415527105 CEST8.8.8.8192.168.2.30xd829No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:49.095340014 CEST8.8.8.8192.168.2.30xdee0No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:50.676486969 CEST8.8.8.8192.168.2.30x879No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:52.264116049 CEST8.8.8.8192.168.2.30x2e5No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:53.934427023 CEST8.8.8.8192.168.2.30x5609No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:55.536693096 CEST8.8.8.8192.168.2.30xbbfeNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:57.299637079 CEST8.8.8.8192.168.2.30x724eNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:37:58.883487940 CEST8.8.8.8192.168.2.30x34f5No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:00.585450888 CEST8.8.8.8192.168.2.30x592cNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:02.413980961 CEST8.8.8.8192.168.2.30x83c0No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:04.110976934 CEST8.8.8.8192.168.2.30x1903No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:06.022942066 CEST8.8.8.8192.168.2.30xc26No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:07.621037006 CEST8.8.8.8192.168.2.30x81bNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:09.193387985 CEST8.8.8.8192.168.2.30xd68dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:10.745327950 CEST8.8.8.8192.168.2.30xbf16No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:12.309509039 CEST8.8.8.8192.168.2.30xd601No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:13.861007929 CEST8.8.8.8192.168.2.30xff6aNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:15.408987045 CEST8.8.8.8192.168.2.30x360dNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:17.331228971 CEST8.8.8.8192.168.2.30x7f6bNo error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)
                                Aug 5, 2022 10:38:19.007206917 CEST8.8.8.8192.168.2.30x1ea2No error (0)xman2.duckdns.org154.53.40.254A (IP address)IN (0x0001)

                                Click to jump to process

                                Target ID:0
                                Start time:10:36:12
                                Start date:05/08/2022
                                Path:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe"
                                Imagebase:0xec0000
                                File size:1299456 bytes
                                MD5 hash:E366F96C9B5C5528426A116EB49EF445
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000002.294293877.00000000035D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000000.00000002.298287612.0000000004FBA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:4
                                Start time:10:36:24
                                Start date:05/08/2022
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rWWREmAZOgElhb.exe
                                Imagebase:0xc40000
                                File size:430592 bytes
                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:high

                                Target ID:5
                                Start time:10:36:24
                                Start date:05/08/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7c9170000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:6
                                Start time:10:36:24
                                Start date:05/08/2022
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rWWREmAZOgElhb" /XML "C:\Users\user\AppData\Local\Temp\tmp58ED.tmp
                                Imagebase:0xe30000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:7
                                Start time:10:36:26
                                Start date:05/08/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7c9170000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:8
                                Start time:10:36:28
                                Start date:05/08/2022
                                Path:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\RECHNUNG-RP0188843894.exe
                                Imagebase:0xa20000
                                File size:1299456 bytes
                                MD5 hash:E366F96C9B5C5528426A116EB49EF445
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000008.00000000.287368211.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: MAL_unspecified_Jan18_1, Description: Detects unspecified malware sample, Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                • Rule: JoeSecurity_NetWire_1, Description: Yara detected NetWire RAT, Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Netwire_1b43df38, Description: unknown, Source: 00000008.00000002.520435968.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                No disassembly