Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HSBC Havale Bildirimi.exe

Overview

General Information

Sample name:HSBC Havale Bildirimi.exe
Analysis ID:1430124
MD5:bd60459b620a2eae856dcd1441c4bdec
SHA1:62b1413836683e02a024e34724c3413408a80e2f
SHA256:d644e92ab06e7ff19e5f10453d102137a2d057a0a97e6890cec905a211c7f467
Tags:AgentTeslaexegeoHSBCTUR
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • HSBC Havale Bildirimi.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe" MD5: BD60459B620A2EAE856DCD1441C4BDEC)
    • HSBC Havale Bildirimi.exe (PID: 7404 cmdline: "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe" MD5: BD60459B620A2EAE856DCD1441C4BDEC)
    • HSBC Havale Bildirimi.exe (PID: 7412 cmdline: "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe" MD5: BD60459B620A2EAE856DCD1441C4BDEC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://eu-west-1.sftpcloud.io", "Username": "8e065e20d50941049d65f96f62357139", "Password": "26esZMYm4svydFPPVNZDGTMnq25MRawd"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              0.2.HSBC Havale Bildirimi.exe.510a460.10.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.HSBC Havale Bildirimi.exe.510a460.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.HSBC Havale Bildirimi.exe.510a460.10.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x3120b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x3127d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x31307:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x31399:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x31403:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x31475:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x3150b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x3159b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.HSBC Havale Bildirimi.exe.510a460.10.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x2e6be:$s2: GetPrivateProfileString
                  • 0x2ddd3:$s3: get_OSFullName
                  • 0x2f3f8:$s5: remove_Key
                  • 0x2f5a1:$s5: remove_Key
                  • 0x30442:$s6: FtpWebRequest
                  • 0x311ed:$s7: logins
                  • 0x3175f:$s7: logins
                  • 0x344d8:$s7: logins
                  • 0x34522:$s7: logins
                  • 0x35e2a:$s7: logins
                  • 0x350c6:$s9: 1.85 (Hash, version 2, native byte-order)
                  3.2.HSBC Havale Bildirimi.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 17 entries
                    No Sigma rule has matched
                    Timestamp:04/23/24-08:00:33.745256
                    SID:2855542
                    Source Port:49734
                    Destination Port:50060
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:04/23/24-08:00:33.745256
                    SID:2851779
                    Source Port:49734
                    Destination Port:50060
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:04/23/24-08:00:33.388142
                    SID:2029927
                    Source Port:49733
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: HSBC Havale Bildirimi.exeAvira: detected
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://eu-west-1.sftpcloud.io", "Username": "8e065e20d50941049d65f96f62357139", "Password": "26esZMYm4svydFPPVNZDGTMnq25MRawd"}
                    Source: HSBC Havale Bildirimi.exeReversingLabs: Detection: 31%
                    Source: HSBC Havale Bildirimi.exeVirustotal: Detection: 35%Perma Link
                    Source: HSBC Havale Bildirimi.exeJoe Sandbox ML: detected
                    Source: HSBC Havale Bildirimi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: HSBC Havale Bildirimi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 4x nop then jmp 07E0E943h0_2_07E0EA52

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49733 -> 159.65.94.38:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49734 -> 159.65.94.38:50060
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49734 -> 159.65.94.38:50060
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49734 -> 159.65.94.38:50060
                    Source: Joe Sandbox ViewIP Address: 159.65.94.38 159.65.94.38
                    Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                    Source: unknownFTP traffic detected: 159.65.94.38:21 -> 192.168.2.4:49733 220 SSH-2.0-SFTPCloud.io
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownDNS traffic detected: queries for: eu-west-1.sftpcloud.io
                    Source: HSBC Havale Bildirimi.exe, 00000003.00000002.2877197811.0000000003328000.00000004.00000800.00020000.00000000.sdmp, HSBC Havale Bildirimi.exe, 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eu-west-1.sftpcloud.io
                    Source: HSBC Havale Bildirimi.exe, 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmp, HSBC Havale Bildirimi.exe, 00000000.00000002.1650665443.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, HSBC Havale Bildirimi.exe, 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, 7KG.cs.Net Code: cYSVhF

                    System Summary

                    barindex
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: HSBC Havale Bildirimi.exe, Form7.csLarge array initialization: : array initializer size 619594
                    Source: 0.2.HSBC Havale Bildirimi.exe.5c10000.11.raw.unpack, HomeView.csLarge array initialization: : array initializer size 33604
                    Source: 0.2.HSBC Havale Bildirimi.exe.3459a2c.2.raw.unpack, HomeView.csLarge array initialization: : array initializer size 33604
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_01A8E0440_2_01A8E044
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E01AE80_2_07E01AE8
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0A5600_2_07E0A560
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0C4680_2_07E0C468
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0C4780_2_07E0C478
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0C0400_2_07E0C040
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0CE280_2_07E0CE28
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E01AD70_2_07E01AD7
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0A9980_2_07E0A998
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07EF0EF00_2_07EF0EF0
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_030F4A603_2_030F4A60
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_030F9AE83_2_030F9AE8
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_030F3E483_2_030F3E48
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_030FCE783_2_030FCE78
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_030F41903_2_030F4190
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_068356E03_2_068356E0
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_068300403_2_06830040
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_06833F503_2_06833F50
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_0683BDE93_2_0683BDE9
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_06832AF83_2_06832AF8
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_06839AF83_2_06839AF8
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_06838B8B3_2_06838B8B
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_0683323B3_2_0683323B
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_068350003_2_06835000
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_0683AB183_2_0683AB18
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_069795983_2_06979598
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_06977BD43_2_06977BD4
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1646007687.0000000003431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1643911980.000000000153E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1653737064.000000000BA20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000000.1622596557.0000000001072000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameKktQ.exeL vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1650315487.0000000005C10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1646007687.00000000036A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename0e5d931d-5261-42c7-a0a7-da0466d93cee.exe4 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename0e5d931d-5261-42c7-a0a7-da0466d93cee.exe4 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000003.00000002.2875412080.00000000011A8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exe, 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename0e5d931d-5261-42c7-a0a7-da0466d93cee.exe4 vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exeBinary or memory string: OriginalFilenameKktQ.exeL vs HSBC Havale Bildirimi.exe
                    Source: HSBC Havale Bildirimi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: HSBC Havale Bildirimi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, 1UT6pzc0M.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, DnQOD3M.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, 01seU.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, iUDwvr7Gz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, XUu2qKyuF6.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, aZathEIgR.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, l50VLEll22.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, l50VLEll22.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, sPgJFWg0LIKTTxN70F.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, Vh0lGERDVsax8KlZLV.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, Vh0lGERDVsax8KlZLV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, Vh0lGERDVsax8KlZLV.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, sPgJFWg0LIKTTxN70F.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, Vh0lGERDVsax8KlZLV.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, Vh0lGERDVsax8KlZLV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, Vh0lGERDVsax8KlZLV.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@1/1
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HSBC Havale Bildirimi.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMutant created: NULL
                    Source: HSBC Havale Bildirimi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: HSBC Havale Bildirimi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: HSBC Havale Bildirimi.exeReversingLabs: Detection: 31%
                    Source: HSBC Havale Bildirimi.exeVirustotal: Detection: 35%
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile read: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: HSBC Havale Bildirimi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: HSBC Havale Bildirimi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: HSBC Havale Bildirimi.exe, Form1.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                    Source: 0.2.HSBC Havale Bildirimi.exe.5c10000.11.raw.unpack, HomeView.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, Vh0lGERDVsax8KlZLV.cs.Net Code: BNIFllXsp7 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.HSBC Havale Bildirimi.exe.3459a2c.2.raw.unpack, HomeView.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, Vh0lGERDVsax8KlZLV.cs.Net Code: BNIFllXsp7 System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_01A8DA50 pushfd ; iretd 0_2_01A8DA89
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0B230 push ebx; retf 0_2_07E0B283
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 0_2_07E0A05E pushad ; retf 0_2_07E0A05F
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_0697F4D3 pushad ; ret 3_2_0697F4DD
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeCode function: 3_2_0697DD50 push es; ret 3_2_0697DD60
                    Source: HSBC Havale Bildirimi.exeStatic PE information: section name: .text entropy: 7.880013247472283
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, TCDSbJFy2extBEQBLh.csHigh entropy of concatenated method names: 'iO2a3PgJFW', 'SLIaRKTTxN', 'meSaGULtc6', 'XwJawxdOyB', 'dIKa8179oc', 'tFEaZRR6D5', 'is8WASSD8WC1URry3q', 'NXcgcIuyjlkMFnaDtd', 'ks3aaeCTv1', 'IRgaOnE2RX'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, sUNlA1AQDmAIe9SWfS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'roXmXvx57V', 'hkam7kAnZG', 'EWQmz3OnMh', 'jYYO5AHt1X', 'UMgOa8C443', 'HDqOmQlapO', 'tMwOOGorim', 'AQrmxR65Du0DayPuaOy'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, sPgJFWg0LIKTTxN70F.csHigh entropy of concatenated method names: 'A2M4voS5eV', 'y9w4ehy4xV', 'nim40rqMgO', 'R8u4juGoEk', 'YZ24i61GKZ', 'Hnq4hB0KHL', 'K8e4slP8A6', 'OHY4n8nvj0', 'YvC4X1xPbn', 'srU47msExZ'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, t8AQRAjUftIDFW1DQX.csHigh entropy of concatenated method names: 'vbLSGp1w4N', 'TahSwnpZLo', 'ToString', 'AbdSbQWBEb', 'VBLS4H3O1E', 'MMwSAiXcX8', 'AQjSB6w53l', 'zbxS99DWcZ', 'fYeS3mNqdR', 'RkgSRayhCk'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, dfcA9wWeSULtc6XwJx.csHigh entropy of concatenated method names: 'SHMATZ1LvO', 'XI4AfIhDf6', 'H2lAgXUTKt', 'viDAWgMdon', 'pCKA8O9AY9', 'GeAAZax7YV', 'zV1AS8OOHW', 'v7sALQcqpm', 'xCxAY8sYkV', 'I2qA2xd6Q2'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, xOyBRV1j8lyZUOIK17.csHigh entropy of concatenated method names: 'QRnBcZ6WO5', 'V0VBJNBdt1', 'RSqAxthbjc', 'jR6Auy8CRG', 'RuXAkBbI3v', 'Cv0AV75fTZ', 'yR1ArYnIsE', 'gWeANTdwiM', 'KqnAQRv2J8', 'UncAChFdGo'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, UmAMcqEKFG0jWUHESc.csHigh entropy of concatenated method names: 'h54ogfLfXF', 'eZyoWfIfnx', 'NpnoPgxluV', 'DIBoKjv05G', 'g0Nouu1prD', 'nNPokIsYvt', 'wlworGbBKX', 'sURoNxSWNi', 'ieCoCv8SBI', 'mkyotnAJWi'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, hySlqhnZZ4gj77rIgR.csHigh entropy of concatenated method names: 'go0LbA3yG7', 'AGSL42EyWe', 'JeTLAlCgMh', 'vKJLBGTrFg', 'n6HL90KqVX', 'FqML31eHau', 'p3cLRt4B0W', 'oUWLMQXSGg', 'qYKLGc8w22', 'YZ5Lwufkq0'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, d0I6FCQPhVG7bZ79bW.csHigh entropy of concatenated method names: 'LNd3dnfeK6', 'BHK3qTpJxu', 'HDX3lMRy0d', 'gaW3TTMMyq', 'h4k3c14RT6', 'kOF3fuM1QJ', 'XhP3JI4aAD', 'boo3guyXA2', 'AJP3WXmr9f', 'oZG31yMopU'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, ioc2FEPRR6D5dWc7Yj.csHigh entropy of concatenated method names: 'hUd9IBZ8pI', 'vbx94O4fFh', 'XKy9B3UGOB', 'sb493rheKe', 'EY19Rqb0LG', 'AeKBivbqN4', 'x59Bhh4Z5O', 'RLyBsNHTbR', 'ACTBnEan50', 'x6aBXTuHJy'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, u4jr8nrvvcc1Krsh0j.csHigh entropy of concatenated method names: 'NeK3bHYlnR', 'J4s3Atshkn', 'xw739Ne4hN', 'Nxw97OhRtj', 'NUi9zjvRrU', 'RUh35Ebk1n', 'HZ33au1AsT', 'gj33mvtw8U', 'Vro3OfjMpG', 'GAi3FnEJVZ'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, Vh0lGERDVsax8KlZLV.csHigh entropy of concatenated method names: 'X54OIP1RFA', 'M6RObdvXY0', 'qy0O4A6Woq', 'DctOAWw3TE', 'QfKOBwZCli', 'OTOO9GIF6O', 'pZ3O34a80d', 'MDoORleerV', 'KG1OMhrpKF', 'C1pOGkKvxL'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, OyhVpNX9vvlMA9i8tv.csHigh entropy of concatenated method names: 'F1NLPqpbhK', 'akiLKovnCX', 'GhQLxNWaWC', 'j1SLuFv440', 'ALsLvLu2tt', 'OpwLkpZ77u', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, EnlqP2mvt0LTA0qg0B.csHigh entropy of concatenated method names: 'Ir3l5RrCQ', 'LOKTjrEWy', 'R1Lfb6v0F', 'nXwJF4u4Q', 'H0JWb97nL', 'Fyc1sLW5I', 'oEdWHHdJZonj7gVybX', 'GRCjiVp24rigtKOZqq', 'rPFLJh8MZ', 'VGH2Xju4h'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, Igykv4h6Y6ywpKeygy.csHigh entropy of concatenated method names: 'RQiSnSu3qX', 'zfSS7Kw7qa', 'OAuL5caIeb', 'MiHLaglegm', 'lJBStdeSSC', 'tp4SHLLDQo', 'aYWSE0PPka', 'Jl0Sv9EFrU', 'ws8Se4Y5N7', 'BLkS0yFWXP'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, P32R92aOLBjV09FUrUm.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FGf2vUCG8I', 'M9L2eJ5fZr', 'YyN201J4wm', 'XQE2jDbudG', 'od62iDSvJe', 'e9C2hK6kPP', 'fQ42s6Lp9T'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, L4uJGia5wbZAevBfo3P.csHigh entropy of concatenated method names: 'UGJYdjRan1', 'QfIYqwyQal', 'dZdYlXpXwO', 'L8rYTwhlCc', 'qwHYca39A1', 'ykSYfW24Td', 'xiZYJ9ZURb', 'fieYgcwxCb', 'OaNYWwFly3', 'QigY12XSjM'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, VtxG5Z7YrkqvFdtTc1.csHigh entropy of concatenated method names: 'aWmYa4A13n', 'xIIYOw6h1I', 'vcPYFVR22t', 'e2QYbYmSO9', 'T3cY4T7oBT', 'JxSYB3y5J3', 'o3qY9YDEBa', 'WTTLsGI8P1', 'QvnLnhUuyf', 'Jy9LXSrPq4'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, tEgjRG4Gr0tGRbcNHG.csHigh entropy of concatenated method names: 'Dispose', 'Vw5aXHfvAw', 'zyBmKD5MTr', 'rIHZZ5m2PF', 'CBya7SlqhZ', 'p4gazj77rI', 'ProcessDialogKey', 'DRtm5yhVpN', 'ivvmalMA9i', 'otvmmhtxG5'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, pY3sh3vgaeIfbaJour.csHigh entropy of concatenated method names: 'W1O8CvDVT8', 'f6P8HODuyZ', 'ac08vRU1YX', 'HI08eu1wdM', 'hwV8KkOGQX', 'V848xgHeMt', 'DfT8uInt1h', 'pwI8kcxi4I', 'zyf8VoksfM', 'hXm8rglr8r'
                    Source: 0.2.HSBC Havale Bildirimi.exe.ba20000.15.raw.unpack, FQvYhOam5679JJSWxg2.csHigh entropy of concatenated method names: 'ahh2dpG1F3', 'CI52q9YOsw', 'F1b2lAIQo0', 's7BruRwuAGsAMtgTaqS', 'z3qvXFwFWkws62y4Mce', 'nlu287wHy09MbNLeW0n', 'IWLLhWwegWD3r262Krj', 'yZZ8ffwYKpKlQFOFXng'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, TCDSbJFy2extBEQBLh.csHigh entropy of concatenated method names: 'iO2a3PgJFW', 'SLIaRKTTxN', 'meSaGULtc6', 'XwJawxdOyB', 'dIKa8179oc', 'tFEaZRR6D5', 'is8WASSD8WC1URry3q', 'NXcgcIuyjlkMFnaDtd', 'ks3aaeCTv1', 'IRgaOnE2RX'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, sUNlA1AQDmAIe9SWfS.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'roXmXvx57V', 'hkam7kAnZG', 'EWQmz3OnMh', 'jYYO5AHt1X', 'UMgOa8C443', 'HDqOmQlapO', 'tMwOOGorim', 'AQrmxR65Du0DayPuaOy'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, sPgJFWg0LIKTTxN70F.csHigh entropy of concatenated method names: 'A2M4voS5eV', 'y9w4ehy4xV', 'nim40rqMgO', 'R8u4juGoEk', 'YZ24i61GKZ', 'Hnq4hB0KHL', 'K8e4slP8A6', 'OHY4n8nvj0', 'YvC4X1xPbn', 'srU47msExZ'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, t8AQRAjUftIDFW1DQX.csHigh entropy of concatenated method names: 'vbLSGp1w4N', 'TahSwnpZLo', 'ToString', 'AbdSbQWBEb', 'VBLS4H3O1E', 'MMwSAiXcX8', 'AQjSB6w53l', 'zbxS99DWcZ', 'fYeS3mNqdR', 'RkgSRayhCk'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, dfcA9wWeSULtc6XwJx.csHigh entropy of concatenated method names: 'SHMATZ1LvO', 'XI4AfIhDf6', 'H2lAgXUTKt', 'viDAWgMdon', 'pCKA8O9AY9', 'GeAAZax7YV', 'zV1AS8OOHW', 'v7sALQcqpm', 'xCxAY8sYkV', 'I2qA2xd6Q2'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, xOyBRV1j8lyZUOIK17.csHigh entropy of concatenated method names: 'QRnBcZ6WO5', 'V0VBJNBdt1', 'RSqAxthbjc', 'jR6Auy8CRG', 'RuXAkBbI3v', 'Cv0AV75fTZ', 'yR1ArYnIsE', 'gWeANTdwiM', 'KqnAQRv2J8', 'UncAChFdGo'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, UmAMcqEKFG0jWUHESc.csHigh entropy of concatenated method names: 'h54ogfLfXF', 'eZyoWfIfnx', 'NpnoPgxluV', 'DIBoKjv05G', 'g0Nouu1prD', 'nNPokIsYvt', 'wlworGbBKX', 'sURoNxSWNi', 'ieCoCv8SBI', 'mkyotnAJWi'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, hySlqhnZZ4gj77rIgR.csHigh entropy of concatenated method names: 'go0LbA3yG7', 'AGSL42EyWe', 'JeTLAlCgMh', 'vKJLBGTrFg', 'n6HL90KqVX', 'FqML31eHau', 'p3cLRt4B0W', 'oUWLMQXSGg', 'qYKLGc8w22', 'YZ5Lwufkq0'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, d0I6FCQPhVG7bZ79bW.csHigh entropy of concatenated method names: 'LNd3dnfeK6', 'BHK3qTpJxu', 'HDX3lMRy0d', 'gaW3TTMMyq', 'h4k3c14RT6', 'kOF3fuM1QJ', 'XhP3JI4aAD', 'boo3guyXA2', 'AJP3WXmr9f', 'oZG31yMopU'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, ioc2FEPRR6D5dWc7Yj.csHigh entropy of concatenated method names: 'hUd9IBZ8pI', 'vbx94O4fFh', 'XKy9B3UGOB', 'sb493rheKe', 'EY19Rqb0LG', 'AeKBivbqN4', 'x59Bhh4Z5O', 'RLyBsNHTbR', 'ACTBnEan50', 'x6aBXTuHJy'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, u4jr8nrvvcc1Krsh0j.csHigh entropy of concatenated method names: 'NeK3bHYlnR', 'J4s3Atshkn', 'xw739Ne4hN', 'Nxw97OhRtj', 'NUi9zjvRrU', 'RUh35Ebk1n', 'HZ33au1AsT', 'gj33mvtw8U', 'Vro3OfjMpG', 'GAi3FnEJVZ'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, Vh0lGERDVsax8KlZLV.csHigh entropy of concatenated method names: 'X54OIP1RFA', 'M6RObdvXY0', 'qy0O4A6Woq', 'DctOAWw3TE', 'QfKOBwZCli', 'OTOO9GIF6O', 'pZ3O34a80d', 'MDoORleerV', 'KG1OMhrpKF', 'C1pOGkKvxL'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, OyhVpNX9vvlMA9i8tv.csHigh entropy of concatenated method names: 'F1NLPqpbhK', 'akiLKovnCX', 'GhQLxNWaWC', 'j1SLuFv440', 'ALsLvLu2tt', 'OpwLkpZ77u', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, EnlqP2mvt0LTA0qg0B.csHigh entropy of concatenated method names: 'Ir3l5RrCQ', 'LOKTjrEWy', 'R1Lfb6v0F', 'nXwJF4u4Q', 'H0JWb97nL', 'Fyc1sLW5I', 'oEdWHHdJZonj7gVybX', 'GRCjiVp24rigtKOZqq', 'rPFLJh8MZ', 'VGH2Xju4h'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, Igykv4h6Y6ywpKeygy.csHigh entropy of concatenated method names: 'RQiSnSu3qX', 'zfSS7Kw7qa', 'OAuL5caIeb', 'MiHLaglegm', 'lJBStdeSSC', 'tp4SHLLDQo', 'aYWSE0PPka', 'Jl0Sv9EFrU', 'ws8Se4Y5N7', 'BLkS0yFWXP'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, P32R92aOLBjV09FUrUm.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'FGf2vUCG8I', 'M9L2eJ5fZr', 'YyN201J4wm', 'XQE2jDbudG', 'od62iDSvJe', 'e9C2hK6kPP', 'fQ42s6Lp9T'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, L4uJGia5wbZAevBfo3P.csHigh entropy of concatenated method names: 'UGJYdjRan1', 'QfIYqwyQal', 'dZdYlXpXwO', 'L8rYTwhlCc', 'qwHYca39A1', 'ykSYfW24Td', 'xiZYJ9ZURb', 'fieYgcwxCb', 'OaNYWwFly3', 'QigY12XSjM'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, VtxG5Z7YrkqvFdtTc1.csHigh entropy of concatenated method names: 'aWmYa4A13n', 'xIIYOw6h1I', 'vcPYFVR22t', 'e2QYbYmSO9', 'T3cY4T7oBT', 'JxSYB3y5J3', 'o3qY9YDEBa', 'WTTLsGI8P1', 'QvnLnhUuyf', 'Jy9LXSrPq4'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, tEgjRG4Gr0tGRbcNHG.csHigh entropy of concatenated method names: 'Dispose', 'Vw5aXHfvAw', 'zyBmKD5MTr', 'rIHZZ5m2PF', 'CBya7SlqhZ', 'p4gazj77rI', 'ProcessDialogKey', 'DRtm5yhVpN', 'ivvmalMA9i', 'otvmmhtxG5'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, pY3sh3vgaeIfbaJour.csHigh entropy of concatenated method names: 'W1O8CvDVT8', 'f6P8HODuyZ', 'ac08vRU1YX', 'HI08eu1wdM', 'hwV8KkOGQX', 'V848xgHeMt', 'DfT8uInt1h', 'pwI8kcxi4I', 'zyf8VoksfM', 'hXm8rglr8r'
                    Source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, FQvYhOam5679JJSWxg2.csHigh entropy of concatenated method names: 'ahh2dpG1F3', 'CI52q9YOsw', 'F1b2lAIQo0', 's7BruRwuAGsAMtgTaqS', 'z3qvXFwFWkws62y4Mce', 'nlu287wHy09MbNLeW0n', 'IWLLhWwegWD3r262Krj', 'yZZ8ffwYKpKlQFOFXng'
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7256, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 19E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 3430000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 19E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 9410000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 7C00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: A410000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: B410000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: BAA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: CAA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: DAA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 32D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: 52D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe TID: 7276Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: HSBC Havale Bildirimi.exe, 00000003.00000002.2875574272.0000000001656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeMemory written: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeProcess created: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe "C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Users\user\Desktop\HSBC Havale Bildirimi.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7412, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\HSBC Havale Bildirimi.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7412, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.HSBC Havale Bildirimi.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.5012820.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.510a460.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.HSBC Havale Bildirimi.exe.508e640.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: HSBC Havale Bildirimi.exe PID: 7412, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    111
                    Process Injection
                    1
                    Masquerading
                    2
                    OS Credential Dumping
                    111
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    1
                    Encrypted Channel
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    141
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                    Process Injection
                    NTDS1
                    File and Directory Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets24
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    HSBC Havale Bildirimi.exe32%ReversingLabsWin32.Trojan.GenSteal
                    HSBC Havale Bildirimi.exe36%VirustotalBrowse
                    HSBC Havale Bildirimi.exe100%AviraHEUR/AGEN.1309691
                    HSBC Havale Bildirimi.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    eu-west-1.sftpcloud.io1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                    http://eu-west-1.sftpcloud.io1%VirustotalBrowse
                    http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                    http://www.founder.com.cn/cn0%VirustotalBrowse
                    http://www.zhongyicts.com.cn1%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    eu-west-1.sftpcloud.io
                    159.65.94.38
                    truetrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bTheHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://account.dyn.com/HSBC Havale Bildirimi.exe, 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, HSBC Havale Bildirimi.exe, 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers?HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.tiro.comHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.goodfont.co.krHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/cTheHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    http://www.galapagosdesign.com/staff/dennis.htmHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    http://www.fontbureau.com/designers/frere-user.htmlHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.jiyu-kobo.co.jp/HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers8HSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fonts.comHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sandoll.co.krHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://eu-west-1.sftpcloud.ioHSBC Havale Bildirimi.exe, 00000003.00000002.2877197811.0000000003328000.00000004.00000800.00020000.00000000.sdmp, HSBC Havale Bildirimi.exe, 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          http://www.urwpp.deDPleaseHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHSBC Havale Bildirimi.exe, 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sakkal.comHSBC Havale Bildirimi.exe, 00000000.00000002.1650702636.0000000007522000.00000004.00000800.00020000.00000000.sdmp, HSBC Havale Bildirimi.exe, 00000000.00000002.1650665443.0000000005DB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            159.65.94.38
                                            eu-west-1.sftpcloud.ioUnited States
                                            14061DIGITALOCEAN-ASNUStrue
                                            Joe Sandbox version:40.0.0 Tourmaline
                                            Analysis ID:1430124
                                            Start date and time:2024-04-23 07:59:42 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 6m 40s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:8
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:HSBC Havale Bildirimi.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@5/1@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 85
                                            • Number of non-executed functions: 7
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            08:00:28API Interceptor2x Sleep call for process: HSBC Havale Bildirimi.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            159.65.94.38rKjlbIeOH9.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                              RI5YLKEDM2.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                #U00d6deme Onay#U0131 Kopyas#U0131.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                  r__demeOnay__Kopyas__.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                    42#U0435.exeGet hashmaliciousAgentTeslaBrowse
                                                      #U0642#U0633#U064a#U0645#U0629_#U0627#U0644#U062f#U0641#U0639.exeGet hashmaliciousAgentTeslaBrowse
                                                        #U00d6deme_Onay#U0131_Kopyas.....exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          #U00f6deme_makbuzu.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                            #U00d6deme_makbuzu.exeGet hashmaliciousAgentTeslaBrowse
                                                              #U00d6deme_makbuzu.exeGet hashmaliciousAgentTeslaBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                eu-west-1.sftpcloud.iorKjlbIeOH9.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                                • 159.65.94.38
                                                                RI5YLKEDM2.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                • 159.65.94.38
                                                                #U00d6deme Onay#U0131 Kopyas#U0131.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                • 159.65.94.38
                                                                r__demeOnay__Kopyas__.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                • 159.65.94.38
                                                                42#U0435.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 159.65.94.38
                                                                #U0642#U0633#U064a#U0645#U0629_#U0627#U0644#U062f#U0641#U0639.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 159.65.94.38
                                                                #U00d6deme_Onay#U0131_Kopyas.....exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                • 159.65.94.38
                                                                #U00f6deme_makbuzu.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                                • 159.65.94.38
                                                                #U00d6deme_makbuzu.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 159.65.94.38
                                                                #U00d6deme_makbuzu.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 159.65.94.38
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                DIGITALOCEAN-ASNUSCxBkzmVHaR.elfGet hashmaliciousMiraiBrowse
                                                                • 142.93.67.140
                                                                pJNcZyhUh8.elfGet hashmaliciousMiraiBrowse
                                                                • 46.101.242.254
                                                                https://url.za.m.mimecastprotect.com/s/jC3iCP1JJ7tQXOpWCziIaE?domain=americanconfort.comGet hashmaliciousHTMLPhisherBrowse
                                                                • 159.203.50.177
                                                                .Sx86.elfGet hashmaliciousUnknownBrowse
                                                                • 206.189.49.14
                                                                http://outlookaccount.rf.gd/?i=1Get hashmaliciousUnknownBrowse
                                                                • 146.185.171.8
                                                                https://yxv.ens.mybluehost.me/Ca/net/login.phpGet hashmaliciousUnknownBrowse
                                                                • 138.197.61.175
                                                                https://www.admin-longin.co.jp.ysvllet.cn/Get hashmaliciousUnknownBrowse
                                                                • 165.22.249.193
                                                                cfGjk0Keob.elfGet hashmaliciousMiraiBrowse
                                                                • 204.48.26.239
                                                                tajma.arm7-20240421-1029.elfGet hashmaliciousMirai, OkiruBrowse
                                                                • 159.203.140.79
                                                                https://track.enterprisetechsol.com/z.z?l=aHR0cHM6Ly9yZXNvdXJjZS5pdGJ1c2luZXNzdG9kYXkuY29tL3doaXRlcGFwZXJzLzQ0ODAzLU1pY3Jvc29mdC1DUEwtUTItUE1HLUFCTS1HZXItMS1sYW5kaW5nLnBocD9lPWJvbnVjY2VsbGkuZGFyaW9AZGVtZS1ncm91cC5jb20=&r=14547470367&d=12037165&p=1&t=h&h=fb97401a549b1167a78f6002a0aef94dGet hashmaliciousUnknownBrowse
                                                                • 104.248.15.35
                                                                No context
                                                                No context
                                                                Process:C:\Users\user\Desktop\HSBC Havale Bildirimi.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1216
                                                                Entropy (8bit):5.34331486778365
                                                                Encrypted:false
                                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):7.873277037231857
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                File name:HSBC Havale Bildirimi.exe
                                                                File size:725'504 bytes
                                                                MD5:bd60459b620a2eae856dcd1441c4bdec
                                                                SHA1:62b1413836683e02a024e34724c3413408a80e2f
                                                                SHA256:d644e92ab06e7ff19e5f10453d102137a2d057a0a97e6890cec905a211c7f467
                                                                SHA512:8a24c4709854cbb9221b686d1872ffb0eb63024b8ecdbec27730ff019f7cf148180de89936da3b24bc996e3ef1a53b1a752f521dfbf0f0e4369eee8d32106701
                                                                SSDEEP:12288:moCAGP4tB3qQVrh/Rr632btNzBc0cqPLrj8rI+XobStrWn:EP4tB3qQ5O32bTzqYTrjSemw
                                                                TLSH:D5F41204367E9F4ACA7E83B14426D90843B4B05B6372D70B0FC7A4CA1E76B948D5DBA3
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4.%f.....................(........... ........@.. ....................................@................................
                                                                Icon Hash:98306c8c8ca682cc
                                                                Entrypoint:0x4b061e
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6625FD34 [Mon Apr 22 06:01:24 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb05cc0x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x2600.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000xae6240xae8006ca90f255076aaec5d152941b8991589False0.9266780645594556TTComp archive data, binary, 4K dictionary7.880013247472283IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rsrc0xb20000x26000x26004cc0b07dc1e447b2383ab1f1faffc178False0.8831208881578947data7.560738636069652IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0xb60000xc0x20087c088891334cba01a8bfa2b8573d3faFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0xb21300x1ec9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9813475447278264
                                                                RT_GROUP_ICON0xb3ffc0x14data0.95
                                                                RT_VERSION0xb40100x380data0.4296875
                                                                RT_MANIFEST0xb43900x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                DLLImport
                                                                mscoree.dll_CorExeMain
                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                04/23/24-08:00:33.745256TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4973450060192.168.2.4159.65.94.38
                                                                04/23/24-08:00:33.745256TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4973450060192.168.2.4159.65.94.38
                                                                04/23/24-08:00:33.388142TCP2029927ET TROJAN AgentTesla Exfil via FTP4973321192.168.2.4159.65.94.38
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Apr 23, 2024 08:00:31.838227987 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:31.994132996 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:31.994281054 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:32.150793076 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.151110888 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:32.306823969 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.388303041 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.388442039 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:32.544307947 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.593101978 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.595886946 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:32.751491070 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.751569033 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.751704931 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:32.907742977 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:32.912442923 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.068232059 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:33.069601059 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.225621939 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:33.228426933 CEST4973450060192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.271598101 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.384674072 CEST5006049734159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:33.385660887 CEST4973450060192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.388142109 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.584614992 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:33.745013952 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:33.745255947 CEST4973450060192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.745305061 CEST4973450060192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.787173033 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:33.901124001 CEST5006049734159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:33.944078922 CEST5006049734159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:34.187016010 CEST5006049734159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:34.187108040 CEST4973450060192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:34.187158108 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:34.240298033 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:00:49.576065063 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:00:49.576117039 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:01:04.736148119 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:01:04.736206055 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:01:19.896258116 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:01:19.896312952 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:01:35.144310951 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:01:35.144614935 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:01:50.304147959 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:01:50.304312944 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:02:05.464199066 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:02:05.464344025 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:02:20.711925030 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:02:20.712032080 CEST4973321192.168.2.4159.65.94.38
                                                                Apr 23, 2024 08:02:35.868295908 CEST2149733159.65.94.38192.168.2.4
                                                                Apr 23, 2024 08:02:35.868407965 CEST4973321192.168.2.4159.65.94.38
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Apr 23, 2024 08:00:31.713063955 CEST5759153192.168.2.41.1.1.1
                                                                Apr 23, 2024 08:00:31.807450056 CEST53575911.1.1.1192.168.2.4
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Apr 23, 2024 08:00:31.713063955 CEST192.168.2.41.1.1.10x7a08Standard query (0)eu-west-1.sftpcloud.ioA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Apr 23, 2024 08:00:31.807450056 CEST1.1.1.1192.168.2.40x7a08No error (0)eu-west-1.sftpcloud.io159.65.94.38A (IP address)IN (0x0001)false
                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                Apr 23, 2024 08:00:32.150793076 CEST2149733159.65.94.38192.168.2.4220 SSH-2.0-SFTPCloud.io
                                                                Apr 23, 2024 08:00:32.151110888 CEST4973321192.168.2.4159.65.94.38USER 8e065e20d50941049d65f96f62357139
                                                                Apr 23, 2024 08:00:32.388303041 CEST2149733159.65.94.38192.168.2.4331 OK
                                                                Apr 23, 2024 08:00:32.388442039 CEST4973321192.168.2.4159.65.94.38PASS 26esZMYm4svydFPPVNZDGTMnq25MRawd
                                                                Apr 23, 2024 08:00:32.593101978 CEST2149733159.65.94.38192.168.2.4230 Password ok, continue
                                                                Apr 23, 2024 08:00:32.751569033 CEST2149733159.65.94.38192.168.2.4200 I'm in UTF8 only anyway
                                                                Apr 23, 2024 08:00:32.751704931 CEST4973321192.168.2.4159.65.94.38PWD
                                                                Apr 23, 2024 08:00:32.907742977 CEST2149733159.65.94.38192.168.2.4257 "/" is the current directory
                                                                Apr 23, 2024 08:00:32.912442923 CEST4973321192.168.2.4159.65.94.38TYPE I
                                                                Apr 23, 2024 08:00:33.068232059 CEST2149733159.65.94.38192.168.2.4200 Type set to binary
                                                                Apr 23, 2024 08:00:33.069601059 CEST4973321192.168.2.4159.65.94.38PASV
                                                                Apr 23, 2024 08:00:33.225621939 CEST2149733159.65.94.38192.168.2.4227 Entering Passive Mode (159,65,94,38,195,140)
                                                                Apr 23, 2024 08:00:33.388142109 CEST4973321192.168.2.4159.65.94.38STOR PW_user-472847_2024_04_23_08_00_30.html
                                                                Apr 23, 2024 08:00:33.745013952 CEST2149733159.65.94.38192.168.2.4150 Using transfer connection
                                                                Apr 23, 2024 08:00:34.187158108 CEST2149733159.65.94.38192.168.2.4226 Closing transfer connection

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:08:00:27
                                                                Start date:23/04/2024
                                                                Path:C:\Users\user\Desktop\HSBC Havale Bildirimi.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"
                                                                Imagebase:0xfc0000
                                                                File size:725'504 bytes
                                                                MD5 hash:BD60459B620A2EAE856DCD1441C4BDEC
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1647158292.0000000004E0E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:08:00:29
                                                                Start date:23/04/2024
                                                                Path:C:\Users\user\Desktop\HSBC Havale Bildirimi.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"
                                                                Imagebase:0x250000
                                                                File size:725'504 bytes
                                                                MD5 hash:BD60459B620A2EAE856DCD1441C4BDEC
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:08:00:29
                                                                Start date:23/04/2024
                                                                Path:C:\Users\user\Desktop\HSBC Havale Bildirimi.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\HSBC Havale Bildirimi.exe"
                                                                Imagebase:0xf60000
                                                                File size:725'504 bytes
                                                                MD5 hash:BD60459B620A2EAE856DCD1441C4BDEC
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2877197811.000000000331A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2875205244.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2877197811.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:7.9%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:3.8%
                                                                  Total number of Nodes:159
                                                                  Total number of Limit Nodes:11
                                                                  execution_graph 30398 1a8d6e8 DuplicateHandle 30399 1a8d77e 30398->30399 30565 7e0fbb0 30566 7e0fbd6 30565->30566 30567 7e0fd3b 30565->30567 30566->30567 30569 7e0f6e0 30566->30569 30570 7e0fe30 PostMessageW 30569->30570 30571 7e0fe9c 30570->30571 30571->30566 30579 1a8b118 30582 1a8b210 30579->30582 30580 1a8b127 30583 1a8b221 30582->30583 30584 1a8b244 30582->30584 30583->30584 30590 1a8b4a8 30583->30590 30594 1a8b498 30583->30594 30584->30580 30585 1a8b23c 30585->30584 30586 1a8b448 GetModuleHandleW 30585->30586 30587 1a8b475 30586->30587 30587->30580 30591 1a8b4bc 30590->30591 30592 1a8b4e1 30591->30592 30598 1a8ac28 30591->30598 30592->30585 30595 1a8b4bc 30594->30595 30596 1a8b4e1 30595->30596 30597 1a8ac28 LoadLibraryExW 30595->30597 30596->30585 30597->30596 30599 1a8b688 LoadLibraryExW 30598->30599 30601 1a8b701 30599->30601 30601->30592 30400 1a8d4a0 30401 1a8d4e6 GetCurrentProcess 30400->30401 30403 1a8d538 GetCurrentThread 30401->30403 30404 1a8d531 30401->30404 30405 1a8d56e 30403->30405 30406 1a8d575 GetCurrentProcess 30403->30406 30404->30403 30405->30406 30409 1a8d5ab 30406->30409 30407 1a8d5d3 GetCurrentThreadId 30408 1a8d604 30407->30408 30409->30407 30572 7e0db4a 30573 7e0d9c4 30572->30573 30573->30572 30574 7e0da96 30573->30574 30575 7e0e4f6 12 API calls 30573->30575 30576 7e0e448 12 API calls 30573->30576 30577 7e0e439 12 API calls 30573->30577 30578 7e0e43b 12 API calls 30573->30578 30575->30573 30576->30573 30577->30573 30578->30573 30410 7e0db2f 30411 7e0d9c4 30410->30411 30412 7e0da96 30411->30412 30417 7e0e43b 30411->30417 30429 7e0e439 30411->30429 30441 7e0e448 30411->30441 30453 7e0e4f6 30411->30453 30418 7e0e462 30417->30418 30419 7e0e46a 30418->30419 30466 7e0eb41 30418->30466 30471 7e0f2cf 30418->30471 30476 7e0eb3b 30418->30476 30481 7e0ea8b 30418->30481 30487 7e0eada 30418->30487 30492 7e0ecc7 30418->30492 30497 7e0eae5 30418->30497 30502 7e0e942 30418->30502 30507 7e0ea52 30418->30507 30419->30411 30430 7e0e429 30429->30430 30431 7e0e435 30429->30431 30430->30431 30432 7e0eb41 2 API calls 30430->30432 30433 7e0ea52 4 API calls 30430->30433 30434 7e0e942 2 API calls 30430->30434 30435 7e0eae5 2 API calls 30430->30435 30436 7e0ecc7 2 API calls 30430->30436 30437 7e0eada 2 API calls 30430->30437 30438 7e0ea8b 2 API calls 30430->30438 30439 7e0eb3b 2 API calls 30430->30439 30440 7e0f2cf 2 API calls 30430->30440 30431->30411 30432->30431 30433->30431 30434->30431 30435->30431 30436->30431 30437->30431 30438->30431 30439->30431 30440->30431 30443 7e0e462 30441->30443 30442 7e0e46a 30442->30411 30443->30442 30444 7e0eb41 2 API calls 30443->30444 30445 7e0ea52 4 API calls 30443->30445 30446 7e0e942 2 API calls 30443->30446 30447 7e0eae5 2 API calls 30443->30447 30448 7e0ecc7 2 API calls 30443->30448 30449 7e0eada 2 API calls 30443->30449 30450 7e0ea8b 2 API calls 30443->30450 30451 7e0eb3b 2 API calls 30443->30451 30452 7e0f2cf 2 API calls 30443->30452 30444->30442 30445->30442 30446->30442 30447->30442 30448->30442 30449->30442 30450->30442 30451->30442 30452->30442 30454 7e0e484 30453->30454 30455 7e0e4f9 30453->30455 30456 7e0e46a 30454->30456 30457 7e0eb41 2 API calls 30454->30457 30458 7e0ea52 4 API calls 30454->30458 30459 7e0e942 2 API calls 30454->30459 30460 7e0eae5 2 API calls 30454->30460 30461 7e0ecc7 2 API calls 30454->30461 30462 7e0eada 2 API calls 30454->30462 30463 7e0ea8b 2 API calls 30454->30463 30464 7e0eb3b 2 API calls 30454->30464 30465 7e0f2cf 2 API calls 30454->30465 30455->30411 30456->30411 30457->30456 30458->30456 30459->30456 30460->30456 30461->30456 30462->30456 30463->30456 30464->30456 30465->30456 30467 7e0f189 30466->30467 30515 7e0cd50 30467->30515 30519 7e0cd48 30467->30519 30468 7e0f1a7 30472 7e0f2d8 30471->30472 30523 7e0d320 30472->30523 30527 7e0d318 30472->30527 30473 7e0f317 30473->30419 30477 7e0edee 30476->30477 30479 7e0cd50 Wow64SetThreadContext 30477->30479 30480 7e0cd48 Wow64SetThreadContext 30477->30480 30478 7e0ee0c 30479->30478 30480->30478 30482 7e0e99e 30481->30482 30483 7e0ea98 30481->30483 30482->30419 30485 7e0d320 WriteProcessMemory 30483->30485 30486 7e0d318 WriteProcessMemory 30483->30486 30484 7e0f2ae 30485->30484 30486->30484 30488 7e0f139 30487->30488 30531 7e0d410 30488->30531 30535 7e0d408 30488->30535 30489 7e0f15e 30493 7e0ece0 30492->30493 30539 7e0cc98 30493->30539 30544 7e0cca0 30493->30544 30494 7e0e99e 30494->30419 30498 7e0eaf1 30497->30498 30500 7e0d320 WriteProcessMemory 30498->30500 30501 7e0d318 WriteProcessMemory 30498->30501 30499 7e0f25a 30500->30499 30501->30499 30503 7e0e948 30502->30503 30548 7e0d5a8 30503->30548 30552 7e0d59c 30503->30552 30557 7e0d25a 30507->30557 30561 7e0d260 30507->30561 30508 7e0ea73 30510 7e0e99e 30508->30510 30513 7e0d320 WriteProcessMemory 30508->30513 30514 7e0d318 WriteProcessMemory 30508->30514 30509 7e0f317 30509->30419 30510->30419 30513->30509 30514->30509 30516 7e0cd95 Wow64SetThreadContext 30515->30516 30518 7e0cddd 30516->30518 30518->30468 30520 7e0cd50 Wow64SetThreadContext 30519->30520 30522 7e0cddd 30520->30522 30522->30468 30524 7e0d368 WriteProcessMemory 30523->30524 30526 7e0d3bf 30524->30526 30526->30473 30528 7e0d320 WriteProcessMemory 30527->30528 30530 7e0d3bf 30528->30530 30530->30473 30532 7e0d45b ReadProcessMemory 30531->30532 30534 7e0d49f 30532->30534 30534->30489 30536 7e0d410 ReadProcessMemory 30535->30536 30538 7e0d49f 30536->30538 30538->30489 30540 7e0cc89 30539->30540 30541 7e0cc9b ResumeThread 30539->30541 30540->30494 30543 7e0cd11 30541->30543 30543->30494 30545 7e0cce0 ResumeThread 30544->30545 30547 7e0cd11 30545->30547 30547->30494 30549 7e0d631 CreateProcessA 30548->30549 30551 7e0d7f3 30549->30551 30551->30551 30553 7e0d58d 30552->30553 30554 7e0d59f CreateProcessA 30552->30554 30553->30419 30556 7e0d7f3 30554->30556 30556->30556 30558 7e0d2a0 VirtualAllocEx 30557->30558 30560 7e0d2dd 30558->30560 30560->30508 30562 7e0d2a0 VirtualAllocEx 30561->30562 30564 7e0d2dd 30562->30564 30564->30508
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652762591.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7ef0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 30cd92bef7bd3043a1edf0626c9530735873229fa06446b56f65178530b9c5bd
                                                                  • Instruction ID: 80c89c70ba56f4bc63f7eef183e7b0fd781048e851660b71ecdb5c041a2c69bb
                                                                  • Opcode Fuzzy Hash: 30cd92bef7bd3043a1edf0626c9530735873229fa06446b56f65178530b9c5bd
                                                                  • Instruction Fuzzy Hash: F232BDB0B02209CFDB15EB69C550BAEB7F6AF89304F248469E205DB7A1DB35EC41CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b04e729b094c06dae696dc504100277e6e170493e57eb910013e8f3e7a3a63a
                                                                  • Instruction ID: d51c5d06b332f6dfbddedfa484e084dc374a065d97ff3e1ced99ef0e7e875c1c
                                                                  • Opcode Fuzzy Hash: 7b04e729b094c06dae696dc504100277e6e170493e57eb910013e8f3e7a3a63a
                                                                  • Instruction Fuzzy Hash: 4CE1F832D20B5B8ACB10EB64D990A9DB7B1FF95300F11C79AD04937261EB746EC9CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 01bc9af6f5dc3e72e4e9e9b543c11352ae82f764db1022a4be802e4d1cd4f0dc
                                                                  • Instruction ID: e7a013f0fee2221bf09026aa6ca87bb6c2f4d58db10e190539930380e27ff10e
                                                                  • Opcode Fuzzy Hash: 01bc9af6f5dc3e72e4e9e9b543c11352ae82f764db1022a4be802e4d1cd4f0dc
                                                                  • Instruction Fuzzy Hash: 9DD1F932D20B5B8ACB10EB64D990A9DB7B1FF95300F11C79AD04937261EB746EC9CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ae77b41d5267da187f2e50447ca008661fcbbcf406e6bdfa7f616e6262f5fd6
                                                                  • Instruction ID: 927df49cccec8b8b456bcb5ba7488a9067f770e51d1d1c934368922734a53cb5
                                                                  • Opcode Fuzzy Hash: 0ae77b41d5267da187f2e50447ca008661fcbbcf406e6bdfa7f616e6262f5fd6
                                                                  • Instruction Fuzzy Hash: AD21F8B4915228DFDB60DF64C845BECBBB4EB0A304F14A4EA950DA6281C7355FC6CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 295 1a8d49a-1a8d52f GetCurrentProcess 299 1a8d538-1a8d56c GetCurrentThread 295->299 300 1a8d531-1a8d537 295->300 301 1a8d56e-1a8d574 299->301 302 1a8d575-1a8d5a9 GetCurrentProcess 299->302 300->299 301->302 303 1a8d5ab-1a8d5b1 302->303 304 1a8d5b2-1a8d5cd call 1a8d670 302->304 303->304 308 1a8d5d3-1a8d602 GetCurrentThreadId 304->308 309 1a8d60b-1a8d66d 308->309 310 1a8d604-1a8d60a 308->310 310->309
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 01A8D51E
                                                                  • GetCurrentThread.KERNEL32 ref: 01A8D55B
                                                                  • GetCurrentProcess.KERNEL32 ref: 01A8D598
                                                                  • GetCurrentThreadId.KERNEL32 ref: 01A8D5F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 3cfc979dfa6dd1931d8ebdfc6df370954a758fe6757fe52902c51488e979aec0
                                                                  • Instruction ID: b3bf86f71319c8c1ba765def1326455543fd4a22023e4d16f5b3abd7b797e5ec
                                                                  • Opcode Fuzzy Hash: 3cfc979dfa6dd1931d8ebdfc6df370954a758fe6757fe52902c51488e979aec0
                                                                  • Instruction Fuzzy Hash: 745175B0901649CFDB18DFA9D548BAEBBF1EF48314F24C45AD019AB3A0C7749984CF65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 317 1a8d4a0-1a8d52f GetCurrentProcess 321 1a8d538-1a8d56c GetCurrentThread 317->321 322 1a8d531-1a8d537 317->322 323 1a8d56e-1a8d574 321->323 324 1a8d575-1a8d5a9 GetCurrentProcess 321->324 322->321 323->324 325 1a8d5ab-1a8d5b1 324->325 326 1a8d5b2-1a8d5cd call 1a8d670 324->326 325->326 330 1a8d5d3-1a8d602 GetCurrentThreadId 326->330 331 1a8d60b-1a8d66d 330->331 332 1a8d604-1a8d60a 330->332 332->331
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 01A8D51E
                                                                  • GetCurrentThread.KERNEL32 ref: 01A8D55B
                                                                  • GetCurrentProcess.KERNEL32 ref: 01A8D598
                                                                  • GetCurrentThreadId.KERNEL32 ref: 01A8D5F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 36d9660652a2b508f4e696820daecc8cbcb90f88b4a45a2d59c4c7b7e8e46240
                                                                  • Instruction ID: 405227a3a3d21e91cc0db85565aba17d84a1490e57a9a4fe4c89ccc2f4331122
                                                                  • Opcode Fuzzy Hash: 36d9660652a2b508f4e696820daecc8cbcb90f88b4a45a2d59c4c7b7e8e46240
                                                                  • Instruction Fuzzy Hash: DB5165B0901649CFDB18DFA9D548BAEBBF1EF48314F20C45AD019AB3A0D7749984CF65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 761 7e0d59c-7e0d59d 762 7e0d58d-7e0d590 761->762 763 7e0d59f-7e0d63d 761->763 765 7e0d676-7e0d696 763->765 766 7e0d63f-7e0d649 763->766 773 7e0d698-7e0d6a2 765->773 774 7e0d6cf-7e0d6fe 765->774 766->765 767 7e0d64b-7e0d64d 766->767 768 7e0d670-7e0d673 767->768 769 7e0d64f-7e0d659 767->769 768->765 771 7e0d65b 769->771 772 7e0d65d-7e0d66c 769->772 771->772 772->772 775 7e0d66e 772->775 773->774 776 7e0d6a4-7e0d6a6 773->776 780 7e0d700-7e0d70a 774->780 781 7e0d737-7e0d7f1 CreateProcessA 774->781 775->768 778 7e0d6a8-7e0d6b2 776->778 779 7e0d6c9-7e0d6cc 776->779 782 7e0d6b4 778->782 783 7e0d6b6-7e0d6c5 778->783 779->774 780->781 784 7e0d70c-7e0d70e 780->784 794 7e0d7f3-7e0d7f9 781->794 795 7e0d7fa-7e0d880 781->795 782->783 783->783 785 7e0d6c7 783->785 786 7e0d710-7e0d71a 784->786 787 7e0d731-7e0d734 784->787 785->779 789 7e0d71c 786->789 790 7e0d71e-7e0d72d 786->790 787->781 789->790 790->790 791 7e0d72f 790->791 791->787 794->795 805 7e0d890-7e0d894 795->805 806 7e0d882-7e0d886 795->806 808 7e0d8a4-7e0d8a8 805->808 809 7e0d896-7e0d89a 805->809 806->805 807 7e0d888 806->807 807->805 811 7e0d8b8-7e0d8bc 808->811 812 7e0d8aa-7e0d8ae 808->812 809->808 810 7e0d89c 809->810 810->808 814 7e0d8ce-7e0d8d5 811->814 815 7e0d8be-7e0d8c4 811->815 812->811 813 7e0d8b0 812->813 813->811 816 7e0d8d7-7e0d8e6 814->816 817 7e0d8ec 814->817 815->814 816->817 819 7e0d8ed 817->819 819->819
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07E0D7DE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: cf37f995506d41492ce21d41de4cb5feae1ff617806bf9c0df4fbdba565ea40e
                                                                  • Instruction ID: b38e53c4614fe9e04c2d332a5b6aca31beefad48c9a503026d6802fa40d53a5f
                                                                  • Opcode Fuzzy Hash: cf37f995506d41492ce21d41de4cb5feae1ff617806bf9c0df4fbdba565ea40e
                                                                  • Instruction Fuzzy Hash: A5A18CB1E0161ADFDB10DFA8CC417EDBBB2AF44314F1481A9E808A7284DB7499C5CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 820 7e0d5a8-7e0d63d 822 7e0d676-7e0d696 820->822 823 7e0d63f-7e0d649 820->823 830 7e0d698-7e0d6a2 822->830 831 7e0d6cf-7e0d6fe 822->831 823->822 824 7e0d64b-7e0d64d 823->824 825 7e0d670-7e0d673 824->825 826 7e0d64f-7e0d659 824->826 825->822 828 7e0d65b 826->828 829 7e0d65d-7e0d66c 826->829 828->829 829->829 832 7e0d66e 829->832 830->831 833 7e0d6a4-7e0d6a6 830->833 837 7e0d700-7e0d70a 831->837 838 7e0d737-7e0d7f1 CreateProcessA 831->838 832->825 835 7e0d6a8-7e0d6b2 833->835 836 7e0d6c9-7e0d6cc 833->836 839 7e0d6b4 835->839 840 7e0d6b6-7e0d6c5 835->840 836->831 837->838 841 7e0d70c-7e0d70e 837->841 851 7e0d7f3-7e0d7f9 838->851 852 7e0d7fa-7e0d880 838->852 839->840 840->840 842 7e0d6c7 840->842 843 7e0d710-7e0d71a 841->843 844 7e0d731-7e0d734 841->844 842->836 846 7e0d71c 843->846 847 7e0d71e-7e0d72d 843->847 844->838 846->847 847->847 848 7e0d72f 847->848 848->844 851->852 862 7e0d890-7e0d894 852->862 863 7e0d882-7e0d886 852->863 865 7e0d8a4-7e0d8a8 862->865 866 7e0d896-7e0d89a 862->866 863->862 864 7e0d888 863->864 864->862 868 7e0d8b8-7e0d8bc 865->868 869 7e0d8aa-7e0d8ae 865->869 866->865 867 7e0d89c 866->867 867->865 871 7e0d8ce-7e0d8d5 868->871 872 7e0d8be-7e0d8c4 868->872 869->868 870 7e0d8b0 869->870 870->868 873 7e0d8d7-7e0d8e6 871->873 874 7e0d8ec 871->874 872->871 873->874 876 7e0d8ed 874->876 876->876
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07E0D7DE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: 92010063c0869065a60fbed58bb3950f3410659e00e8cd0ec8fcb3fd0c1eaba3
                                                                  • Instruction ID: 922e37f9554d4a64214c8f920f2035f5c9f23000abab959535138a1e3b7d9506
                                                                  • Opcode Fuzzy Hash: 92010063c0869065a60fbed58bb3950f3410659e00e8cd0ec8fcb3fd0c1eaba3
                                                                  • Instruction Fuzzy Hash: 8A915BB1E0161ADFDB10DFA8CC417EDBBB2AF44314F1481A9E809A7294DB7499C5CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 877 1a8b210-1a8b21f 878 1a8b24b-1a8b24f 877->878 879 1a8b221-1a8b22e call 1a8abc4 877->879 880 1a8b251-1a8b25b 878->880 881 1a8b263-1a8b2a4 878->881 886 1a8b230 879->886 887 1a8b244 879->887 880->881 888 1a8b2b1-1a8b2bf 881->888 889 1a8b2a6-1a8b2ae 881->889 932 1a8b236 call 1a8b4a8 886->932 933 1a8b236 call 1a8b498 886->933 887->878 890 1a8b2c1-1a8b2c6 888->890 891 1a8b2e3-1a8b2e5 888->891 889->888 894 1a8b2c8-1a8b2cf call 1a8abd0 890->894 895 1a8b2d1 890->895 893 1a8b2e8-1a8b2ef 891->893 892 1a8b23c-1a8b23e 892->887 896 1a8b380-1a8b440 892->896 897 1a8b2fc-1a8b303 893->897 898 1a8b2f1-1a8b2f9 893->898 900 1a8b2d3-1a8b2e1 894->900 895->900 927 1a8b448-1a8b473 GetModuleHandleW 896->927 928 1a8b442-1a8b445 896->928 901 1a8b310-1a8b319 call 1a8abe0 897->901 902 1a8b305-1a8b30d 897->902 898->897 900->893 908 1a8b31b-1a8b323 901->908 909 1a8b326-1a8b32b 901->909 902->901 908->909 910 1a8b349-1a8b356 909->910 911 1a8b32d-1a8b334 909->911 917 1a8b358-1a8b376 910->917 918 1a8b379-1a8b37f 910->918 911->910 913 1a8b336-1a8b346 call 1a8abf0 call 1a8ac00 911->913 913->910 917->918 929 1a8b47c-1a8b490 927->929 930 1a8b475-1a8b47b 927->930 928->927 930->929 932->892 933->892
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01A8B466
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 39bef268fd872b8cd14993abab96d4afed887cff24b0e504e51cb0ade51e9b8c
                                                                  • Instruction ID: 88b2ab75c95215c898560199ec38959216a37ee4f0ad4f7b2d7cba848db9fae0
                                                                  • Opcode Fuzzy Hash: 39bef268fd872b8cd14993abab96d4afed887cff24b0e504e51cb0ade51e9b8c
                                                                  • Instruction Fuzzy Hash: F8713670A00B058FD724EF69D14479ABBF5FF88300F108A2ED48AD7A51EB75E945CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 934 1a85e94 935 1a85e99-1a85f61 CreateActCtxA 934->935 937 1a85f6a-1a85fc4 935->937 938 1a85f63-1a85f69 935->938 945 1a85fd3-1a85fd7 937->945 946 1a85fc6-1a85fc9 937->946 938->937 947 1a85fe8 945->947 948 1a85fd9-1a85fe5 945->948 946->945 949 1a85fe9 947->949 948->947 949->949
                                                                  APIs
                                                                  • CreateActCtxA.KERNEL32(?), ref: 01A85F51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: 4b4b4eccec15fe589eb0b8fa2fd3105da5cee7b6c5a89bdb4033711184dc499d
                                                                  • Instruction ID: b7bcaae46eac8a9075a33215d4e96c3d68d6bae73939beea7aeae752ff9d4298
                                                                  • Opcode Fuzzy Hash: 4b4b4eccec15fe589eb0b8fa2fd3105da5cee7b6c5a89bdb4033711184dc499d
                                                                  • Instruction Fuzzy Hash: D341F0B1C00619CFDB24DFA9C984BDEBBF5BF48304F24806AD418AB255DB756986CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 951 1a84a7c-1a85f61 CreateActCtxA 954 1a85f6a-1a85fc4 951->954 955 1a85f63-1a85f69 951->955 962 1a85fd3-1a85fd7 954->962 963 1a85fc6-1a85fc9 954->963 955->954 964 1a85fe8 962->964 965 1a85fd9-1a85fe5 962->965 963->962 966 1a85fe9 964->966 965->964 966->966
                                                                  APIs
                                                                  • CreateActCtxA.KERNEL32(?), ref: 01A85F51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: d289652406eb07109c189c6463e5860c6bf2876202e562885d8a2f3ed6355ca1
                                                                  • Instruction ID: 69c1488619f5557af0f60ce4fb2bde4d60970aac982eb780b790050aa9d96059
                                                                  • Opcode Fuzzy Hash: d289652406eb07109c189c6463e5860c6bf2876202e562885d8a2f3ed6355ca1
                                                                  • Instruction Fuzzy Hash: A441CEB0C0061DCFDB24DFA9C944B9EBBF5BF49304F24806AD418AB255DB756985CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 968 7e0d318-7e0d36e 971 7e0d370-7e0d37c 968->971 972 7e0d37e-7e0d3bd WriteProcessMemory 968->972 971->972 974 7e0d3c6-7e0d3f6 972->974 975 7e0d3bf-7e0d3c5 972->975 975->974
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07E0D3B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: e6ea1097f39e1e360bbb9b9d9d86f81a584d09341c34da68ac3409b8a5f5fa1b
                                                                  • Instruction ID: 83fbc8e5b656c2ee594b4c33812dcea84aa7049cd58a2a40f5dc6960817adebc
                                                                  • Opcode Fuzzy Hash: e6ea1097f39e1e360bbb9b9d9d86f81a584d09341c34da68ac3409b8a5f5fa1b
                                                                  • Instruction Fuzzy Hash: 17215AB59003599FCB10DFA9C881BEEBBF5FF48320F10842AE958A7250C7789584CBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 979 7e0cd48-7e0cd9b 982 7e0cdab-7e0cddb Wow64SetThreadContext 979->982 983 7e0cd9d-7e0cda9 979->983 985 7e0cde4-7e0ce14 982->985 986 7e0cddd-7e0cde3 982->986 983->982 986->985
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07E0CDCE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: 1e276436be869f18cb3758e82748c4f97a4e31066da7a2c4cbab9e17d0f1e8ad
                                                                  • Instruction ID: 2c7e7532797333f2d6dc1329aed6bd399c283736f7af62941f04ee42698d3498
                                                                  • Opcode Fuzzy Hash: 1e276436be869f18cb3758e82748c4f97a4e31066da7a2c4cbab9e17d0f1e8ad
                                                                  • Instruction Fuzzy Hash: 76219AB1D002198FDB10DFAAC4817EEBFF4EF88324F10842AD459A7290C7789985CFA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07E0D3B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: 099ba3a931ddef7c98bae478d31fc9594a2dae4688ca176a24424aa639d5ac27
                                                                  • Instruction ID: 196cff3266ba83bc7081ac93304f216bd3904b4ad1b76f0216119207e350c502
                                                                  • Opcode Fuzzy Hash: 099ba3a931ddef7c98bae478d31fc9594a2dae4688ca176a24424aa639d5ac27
                                                                  • Instruction Fuzzy Hash: 7C213BB19003599FCB10CFA9C885BDEBBF5FF48314F108429E558A7250C7789584CBA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07E0D490
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: 148332675696194a96e850344c06a8a8a62b1b805eb3b76932144b12e0c2e7a4
                                                                  • Instruction ID: f4d254ff055f3c0944c2f3737f43e7df310c98ddaf00670664c180cb8875958a
                                                                  • Opcode Fuzzy Hash: 148332675696194a96e850344c06a8a8a62b1b805eb3b76932144b12e0c2e7a4
                                                                  • Instruction Fuzzy Hash: 9D212AB1D002599FCB10DFAAC881AEEFBF5FF48324F50842AE558A7250C7789545CBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01A8D76F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: f4fab81933d30d41b4ca02ef66ff2c30c491a4e4971f2eb3f933321b41d3475b
                                                                  • Instruction ID: df65614aa0e4b78efa78945c112bbc56c8996ff713ca94c31d35b5661cec0d6b
                                                                  • Opcode Fuzzy Hash: f4fab81933d30d41b4ca02ef66ff2c30c491a4e4971f2eb3f933321b41d3475b
                                                                  • Instruction Fuzzy Hash: 1321E3B59002489FDB10DFA9D984AEEBBF4EB48310F14841AE958A3350D374A954CF65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07E0D490
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: 0774d3b2a09d0aadcab12c046acdc2deaab17e5331e1b6407f32e18be7557537
                                                                  • Instruction ID: f9fddcbf9c256339d5885fcc705dc68834da99a9d1a1cab6b8019ce1e8da6383
                                                                  • Opcode Fuzzy Hash: 0774d3b2a09d0aadcab12c046acdc2deaab17e5331e1b6407f32e18be7557537
                                                                  • Instruction Fuzzy Hash: 1D2128B19002599FCB10DFAAC881AEEFBF5FF48320F50842AE558A7250C774A544CBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07E0CDCE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: e4f3b006ad6baee5229d6e4f6b59d6e0208122b6be0f96739c30e4b2d7a061b2
                                                                  • Instruction ID: a874dfdddbf74ef2b567a5867701b761852b808ac93925c4b52a4227392a85fb
                                                                  • Opcode Fuzzy Hash: e4f3b006ad6baee5229d6e4f6b59d6e0208122b6be0f96739c30e4b2d7a061b2
                                                                  • Instruction Fuzzy Hash: 8F211AB19002099FDB10DFAAC4857EEBBF4EF88314F14842AD459A7254C7789585CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01A8D76F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 984ab1f96c6e3442145cab8bcb6bd2101d28553953b1d9d9eb15e7b4e789138f
                                                                  • Instruction ID: c612cdafd4d047f90dba638b590ec3379d22dcfcf61bc4246348633d6af86d55
                                                                  • Opcode Fuzzy Hash: 984ab1f96c6e3442145cab8bcb6bd2101d28553953b1d9d9eb15e7b4e789138f
                                                                  • Instruction Fuzzy Hash: 0F21F5B59002489FDB10DF9AD584AEEFFF4FB48310F14841AE954A3350D374A940CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: c56a79e546c3e3e32a6e12840a282c0bcc03ed397ffc752519716a312d9c5e90
                                                                  • Instruction ID: 246c4c6eeb26893a20a075000969ee3d770c8ab88f419f09fb35d984819d7f0d
                                                                  • Opcode Fuzzy Hash: c56a79e546c3e3e32a6e12840a282c0bcc03ed397ffc752519716a312d9c5e90
                                                                  • Instruction Fuzzy Hash: 2E117CB19002498FCB20DFAAD4457EEFFF4AB88324F20842AD459A7650C7359484CBE5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07E0D2CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 62be40341f125ed66263ce0267c5fc3c5bf5417bcc87fbf81f24e83d5b038e8f
                                                                  • Instruction ID: 5c90f11f9686e59959b2c86d62267279ae83bdc563f795cab59dd0fd3990e49e
                                                                  • Opcode Fuzzy Hash: 62be40341f125ed66263ce0267c5fc3c5bf5417bcc87fbf81f24e83d5b038e8f
                                                                  • Instruction Fuzzy Hash: AC119AB29002498FCB10DFA9C8457EEBFF5EF48324F10841AD459A7250C7359980CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01A8B4E1,00000800,00000000,00000000), ref: 01A8B6F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: e3ec68ebf46f138a5cd452ba1672328eb57d7718e2a302f32274751f99715b24
                                                                  • Instruction ID: 5a2be20bf8bf66edad624741d35e9e0381c7a02a95bba00606e1df238785bf94
                                                                  • Opcode Fuzzy Hash: e3ec68ebf46f138a5cd452ba1672328eb57d7718e2a302f32274751f99715b24
                                                                  • Instruction Fuzzy Hash: D01123B6D003498FDB20DF9AC444AEEFBF4EB98314F14842AE519A7310C375A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01A8B4E1,00000800,00000000,00000000), ref: 01A8B6F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: 37c5696af4165510b831dcd4fcb002f26b835b9c8994c2c6721f8cbf0adafe95
                                                                  • Instruction ID: 5ba1b023cdcf34f48554b4aea057709a262ef1c32c074ba1ce3218f792ff415e
                                                                  • Opcode Fuzzy Hash: 37c5696af4165510b831dcd4fcb002f26b835b9c8994c2c6721f8cbf0adafe95
                                                                  • Instruction Fuzzy Hash: 881112B6D002498FDB10DF9AD484ADEFBF4EB58314F14842AD919A7310C375A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07E0D2CE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 15bdb6625a0afffcdecc26a68fd35c697b20861ad9360f0d7588853955d08160
                                                                  • Instruction ID: c63fdfded5ce885f4aa22864f32f18bae8d78e292fa4b1dcea0659a309129c22
                                                                  • Opcode Fuzzy Hash: 15bdb6625a0afffcdecc26a68fd35c697b20861ad9360f0d7588853955d08160
                                                                  • Instruction Fuzzy Hash: 4B1126B19002499FCB10DFAAC845BEEBBF5EB88324F20841AE559A7250C775A584CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 17538b9c4028d1a2e1f2a7117f9eff109097774ca77bd69ccc26ff6c48361092
                                                                  • Instruction ID: 6f08258958189e83d1d2878a15e20304711e63aff87be7dbb9754132775e07e7
                                                                  • Opcode Fuzzy Hash: 17538b9c4028d1a2e1f2a7117f9eff109097774ca77bd69ccc26ff6c48361092
                                                                  • Instruction Fuzzy Hash: 8D113AB19002498FCB20DFAAC4457EEFFF4EF88324F208429D559A7250C775A584CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 07E0FE8D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 11258dd16c77f3ce925100d7128fd8f0dc7b44507e37bbf36a6817b3f903e588
                                                                  • Instruction ID: 43c08578f0314046261df030d47660953d037ae7b5b4f9438ab190fbd5592e1f
                                                                  • Opcode Fuzzy Hash: 11258dd16c77f3ce925100d7128fd8f0dc7b44507e37bbf36a6817b3f903e588
                                                                  • Instruction Fuzzy Hash: C81133B59002498FCB20DF99D485BEEFFF4EB48324F10845AE458A7350C375A584CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 07E0FE8D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 3917b11096c94b9994068870477ce0d3aa883b3901db319c1d3161398040c38f
                                                                  • Instruction ID: 22b6669d5635f6c9d9f20a2bde3d14c7eccde05be276757a79c7e33d4c63223a
                                                                  • Opcode Fuzzy Hash: 3917b11096c94b9994068870477ce0d3aa883b3901db319c1d3161398040c38f
                                                                  • Instruction Fuzzy Hash: C91125B58003489FCB20DF89C449BEEBBF8EB48324F10845AE558A7240C375A994CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01A8B466
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 75cddd22e4a7a6f01ca531c24a3da26bb033c258f4e8b1f073d91a81cc0c7c24
                                                                  • Instruction ID: c08ae69af06248b6d0063a8de2dc0ee0e429d6f058a32682f81ebdb86ce18341
                                                                  • Opcode Fuzzy Hash: 75cddd22e4a7a6f01ca531c24a3da26bb033c258f4e8b1f073d91a81cc0c7c24
                                                                  • Instruction Fuzzy Hash: EC111DB6C002498FDB20DF9AC444ADEFBF4AB88320F10842AD969B7211C379A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1644740706.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_174d000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9f96eb9e7617f8a8397857283d8c879c280f9722ec4470f218b5d5a31e3a75f
                                                                  • Instruction ID: f0ea6e7d381e20cf83cfbd8003e4b0fe9d7abcf44efa2b3a77c1026c64d7a7c2
                                                                  • Opcode Fuzzy Hash: b9f96eb9e7617f8a8397857283d8c879c280f9722ec4470f218b5d5a31e3a75f
                                                                  • Instruction Fuzzy Hash: 9B212971608200DFDB15DF98D5C4B26FBA5FB94324F20C6ADE9894B356C336D446CA61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1644740706.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_174d000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a4b0db5519dd578bf57e4afa1ef590e5ff1f576aa476261fa107f3bb74507fa7
                                                                  • Instruction ID: 295e3d9d07176bf1a48e4bab82c00f939091afecc1d0b98b254aae8f1d4fb2de
                                                                  • Opcode Fuzzy Hash: a4b0db5519dd578bf57e4afa1ef590e5ff1f576aa476261fa107f3bb74507fa7
                                                                  • Instruction Fuzzy Hash: F1212271604200DFCB25DF98D9C4B26FFA5EB98314F20C5ADD88A4B266C33AD447CA61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1644740706.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_174d000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: 798c691eb1598b438db1389a38650b52614df392b7124c3705b3babb305877dd
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 4E11D075504280CFDB16CF54D5C4B15FF61FB44314F24C6AED8494B666C33AD40ACB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1644740706.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_174d000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: 011d33d17fa2089cf24dc02a4060d06541cd281c3725a179bce855231a52822e
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: A311BB75508280DFDB12CF54C5C4B15FFA1FB84224F24C6AAD8894B296C33AD40ACB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1643896160.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_152d000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 078c3dbd43ddd084a1389521db9e8dc589dd11fe5dc95e74c38e3fddd4f29c87
                                                                  • Instruction ID: d6a9a71131f43c2a85397d8a906ed27651b8654c6ae49030fff92374ee979a13
                                                                  • Opcode Fuzzy Hash: 078c3dbd43ddd084a1389521db9e8dc589dd11fe5dc95e74c38e3fddd4f29c87
                                                                  • Instruction Fuzzy Hash: 9101AC721083909AE7115E59CDC476BBFE8FF42324F1CC96AED194E1C6D67D9440C671
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1643896160.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_152d000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 66142e22df9360f262a9f8ae90fdc6175d1a732c5f162e3400e339d6936488ce
                                                                  • Instruction ID: 9e09278f862f5bf01e5f354bd15e468cd05b0f261d0ba285613b67d2a37ed626
                                                                  • Opcode Fuzzy Hash: 66142e22df9360f262a9f8ae90fdc6175d1a732c5f162e3400e339d6936488ce
                                                                  • Instruction Fuzzy Hash: 2FF062724083949AE7118E1ACCC8B66FFA8EB51734F18C45AED484E286C2799844CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e32a24a4bd17690d9a9944e2420810baf72b7e2f645b62dc93f017cc3b5ceee5
                                                                  • Instruction ID: 09932cc71f2993029c8f952afdfe4258e76c326d0824c085cc06d3c7b149ef57
                                                                  • Opcode Fuzzy Hash: e32a24a4bd17690d9a9944e2420810baf72b7e2f645b62dc93f017cc3b5ceee5
                                                                  • Instruction Fuzzy Hash: CCE109B4E012198FDB14DFA9C5849AEBBB2FF49305F24D169E414AB355D730AD81CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3e88fc75e957333d886ee5135cc3638c41b0b150efbb01d637e08e7264e187fa
                                                                  • Instruction ID: 1a38830b6aa6bdac67992632d31c30f41c9831872f49063e95820d4e8f8b2b68
                                                                  • Opcode Fuzzy Hash: 3e88fc75e957333d886ee5135cc3638c41b0b150efbb01d637e08e7264e187fa
                                                                  • Instruction Fuzzy Hash: 24E10BB4E011198FDB14DFA9C5809AEFBB2FF89305F249269E414AB355D730AD81CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9fbf3910f878cbf65a2757f6a25cb57f4b619ba1b879a217d690e3e483497aa3
                                                                  • Instruction ID: 52025ba57f9c06e4bfc0b1c53b19a3c51bbd813b81e277d4f5a587c1af814aef
                                                                  • Opcode Fuzzy Hash: 9fbf3910f878cbf65a2757f6a25cb57f4b619ba1b879a217d690e3e483497aa3
                                                                  • Instruction Fuzzy Hash: 07E1FBB4E011198FDB14DFA9C5809AEFBB2FF49305F249269E414AB356D734AD81CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ed26de3cb8f43eb9d9bf534d50c3aff9d6e12e21bac57667d42589bc4c9e0c7e
                                                                  • Instruction ID: f45cf60861476da88529ccd01890309714411e413064c16d0c25947300484b81
                                                                  • Opcode Fuzzy Hash: ed26de3cb8f43eb9d9bf534d50c3aff9d6e12e21bac57667d42589bc4c9e0c7e
                                                                  • Instruction Fuzzy Hash: 88E119B4E011198FDB14DFA9C5909AEFBF2FF89305F249159E404AB355D730A982CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8b97ff675dab8a8b3e1bad2d053c29e9ca06705b1d0767cd722e500931abe984
                                                                  • Instruction ID: 85a83f6890aad29f5ca19202e24476e990a9633edd8923eb0a06047ca60ef64e
                                                                  • Opcode Fuzzy Hash: 8b97ff675dab8a8b3e1bad2d053c29e9ca06705b1d0767cd722e500931abe984
                                                                  • Instruction Fuzzy Hash: F1E10AB4E012198FDB14DFA9C5809AEBBB2FF89305F24D169E414A7356D734AD81CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1645181440.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1a80000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ba110715636647735254944fa37e0ebb623cca395c2bf8e116c246ee12d75f25
                                                                  • Instruction ID: 6e776012f21e1e79091614f67e94e57e0efab63aebb464a724d16272d360bdb6
                                                                  • Opcode Fuzzy Hash: ba110715636647735254944fa37e0ebb623cca395c2bf8e116c246ee12d75f25
                                                                  • Instruction Fuzzy Hash: 00A16032E0021ACFCF05EFB4D98459EBBB2FF85300B15457AE905AB265DB31E956CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1652388244.0000000007E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_7e00000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5cc4dbd82673b6e7d81beaeb02b4ab7a9ac7a7cc3bb1e4c2762c5c3c4bae79f5
                                                                  • Instruction ID: 31d6388e5a7bf7d83a6034a111112124f1b4f9b4868f4b887a7e76b67af0d334
                                                                  • Opcode Fuzzy Hash: 5cc4dbd82673b6e7d81beaeb02b4ab7a9ac7a7cc3bb1e4c2762c5c3c4bae79f5
                                                                  • Instruction Fuzzy Hash: 725139B4E002198BDB14CFA9D5805EEBBF2AF89304F24926AD408A7256D7309981CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:8.3%
                                                                  Dynamic/Decrypted Code Coverage:94.1%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:51
                                                                  Total number of Limit Nodes:4
                                                                  execution_graph 38391 18fd01c 38392 18fd034 38391->38392 38393 18fd08e 38392->38393 38396 697a99c 38392->38396 38405 697c158 38392->38405 38397 697a9a7 38396->38397 38398 697c1c9 38397->38398 38400 697c1b9 38397->38400 38401 697c1c7 38398->38401 38427 697aac4 38398->38427 38414 697c2f0 38400->38414 38418 697c2e0 38400->38418 38422 697c3bc 38400->38422 38409 697c195 38405->38409 38406 697c1c9 38407 697c1c7 38406->38407 38408 697aac4 CallWindowProcW 38406->38408 38408->38407 38409->38406 38410 697c1b9 38409->38410 38411 697c2f0 CallWindowProcW 38410->38411 38412 697c2e0 CallWindowProcW 38410->38412 38413 697c3bc CallWindowProcW 38410->38413 38411->38407 38412->38407 38413->38407 38415 697c304 38414->38415 38431 697c3a8 38415->38431 38416 697c390 38416->38401 38420 697c304 38418->38420 38419 697c390 38419->38401 38421 697c3a8 CallWindowProcW 38420->38421 38421->38419 38423 697c37a 38422->38423 38424 697c3ca 38422->38424 38426 697c3a8 CallWindowProcW 38423->38426 38425 697c390 38425->38401 38426->38425 38428 697aacf 38427->38428 38429 697d8aa CallWindowProcW 38428->38429 38430 697d859 38428->38430 38429->38430 38430->38401 38432 697c3b9 38431->38432 38434 697d7f0 38431->38434 38432->38416 38435 697aac4 CallWindowProcW 38434->38435 38436 697d7fa 38435->38436 38436->38432 38437 683c368 38438 683c3ae GlobalMemoryStatusEx 38437->38438 38439 683c3de 38438->38439 38440 697f9c8 38441 697fa00 38440->38441 38444 697fa2c 38440->38444 38442 697fa09 38441->38442 38445 697ee44 38441->38445 38447 697ee4f 38445->38447 38446 697fd23 38446->38444 38447->38446 38449 697ee60 38447->38449 38450 697fd58 OleInitialize 38449->38450 38451 697fdbc 38450->38451 38451->38446
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e49b4daea3f9acea0dc82d3cf8a3b659f5d2f43677fc6ef1e33c3240ec8cf99b
                                                                  • Instruction ID: d85a733b97d08ded2f79a642ff54c5c50bc87f1cfc104da4176fecc955b3ef1f
                                                                  • Opcode Fuzzy Hash: e49b4daea3f9acea0dc82d3cf8a3b659f5d2f43677fc6ef1e33c3240ec8cf99b
                                                                  • Instruction Fuzzy Hash: E863E831D10B1A8EDB11EF68C8446A9F7B1FF99300F15D79AE45867221EB70AAC5CF81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b45a60833611c4e05d2e4491cf313600a8e0e1993da34dee51b66d2bac1afc68
                                                                  • Instruction ID: 085f7fbbb65e8fc785dff1a6593813441d2bffe059c907db99c775455c2f69c5
                                                                  • Opcode Fuzzy Hash: b45a60833611c4e05d2e4491cf313600a8e0e1993da34dee51b66d2bac1afc68
                                                                  • Instruction Fuzzy Hash: EE332E31D107198EDB11EF68C8846ADF7B5FF99300F14C69AE459A7221EB70EAC5CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 65aae4617ec12e0d35d74bd94ab3bc08d8e7e98bb19c1b780140a45171019149
                                                                  • Instruction ID: 99a347883868885868ee1a3044641be00a9e9548158a87399c750219c514e2b6
                                                                  • Opcode Fuzzy Hash: 65aae4617ec12e0d35d74bd94ab3bc08d8e7e98bb19c1b780140a45171019149
                                                                  • Instruction Fuzzy Hash: FDB17070E01209CFDB50CFAAD8917DEFBF2AF88314F188529D915EB694EB749845CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6433cadad13045b8ae058daddb18d79544a5809c3aac60cf6aedc790f5cecc4a
                                                                  • Instruction ID: 817549636828971173c981453ed770930c58fa8c8b28b636fc97e8ccb02e5ba8
                                                                  • Opcode Fuzzy Hash: 6433cadad13045b8ae058daddb18d79544a5809c3aac60cf6aedc790f5cecc4a
                                                                  • Instruction Fuzzy Hash: A0918170E01209DFDF50CFA9C8817DEBBF2BF88314F188129E915AB694EB349885CB41
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1511 30f6ea3-30f6f0a call 30f6c08 1520 30f6f0c-30f6f25 call 30f6354 1511->1520 1521 30f6f26-30f6f32 1511->1521 1525 30f6f39-30f6f3a 1521->1525 1526 30f6f34 1521->1526 1528 30f6f3c-30f6f40 1525->1528 1529 30f6f41-30f6f55 1525->1529 1526->1525 1528->1529 1530 30f6f57-30f6f5a 1529->1530 1532 30f6f5c-30f6f91 1530->1532 1533 30f6f96-30f6f99 1530->1533 1532->1533 1534 30f6fcc-30f6fcf 1533->1534 1535 30f6f9b-30f6faf 1533->1535 1536 30f6fe3-30f6fe6 1534->1536 1537 30f6fd1-30f6fd8 1534->1537 1545 30f6fb5 1535->1545 1546 30f6fb1-30f6fb3 1535->1546 1540 30f6fe8 call 30f7580 1536->1540 1541 30f6ff6-30f6ff8 1536->1541 1538 30f6fde 1537->1538 1539 30f7168-30f716f 1537->1539 1538->1536 1548 30f6fee-30f6ff1 1540->1548 1543 30f6fff-30f7002 1541->1543 1544 30f6ffa 1541->1544 1543->1530 1549 30f7008-30f7017 1543->1549 1544->1543 1547 30f6fb8-30f6fc7 1545->1547 1546->1547 1547->1534 1548->1541 1552 30f7019-30f701c 1549->1552 1553 30f7041-30f7056 1549->1553 1555 30f7024-30f703f 1552->1555 1553->1539 1555->1552 1555->1553
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q$LR^q
                                                                  • API String ID: 0-4089051495
                                                                  • Opcode ID: 489e2fe1e84d462350afdb3655b6c0900573e6f03d8ceb09e5b55fa429ffb556
                                                                  • Instruction ID: 9ded44ba8a180c8b8f081e4d11b559b0b6b3ecb1b868d5a6003c58e6d6836398
                                                                  • Opcode Fuzzy Hash: 489e2fe1e84d462350afdb3655b6c0900573e6f03d8ceb09e5b55fa429ffb556
                                                                  • Instruction Fuzzy Hash: 9551F430E1120A9FDB15DFA8C84479EBBF6EF85700F148469E505EB741EB71D84ACB52
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2260 697aac4-697d84c 2263 697d852-697d857 2260->2263 2264 697d8fc-697d91c call 697a99c 2260->2264 2265 697d8aa-697d8e2 CallWindowProcW 2263->2265 2266 697d859-697d890 2263->2266 2271 697d91f-697d92c 2264->2271 2268 697d8e4-697d8ea 2265->2268 2269 697d8eb-697d8fa 2265->2269 2274 697d892-697d898 2266->2274 2275 697d899-697d8a8 2266->2275 2268->2269 2269->2271 2274->2275 2275->2271
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 0697D8D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2881627606.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6970000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: b676622d33ba3e273e24dcc82fcb731b0a446cd85ca51c4c69d07980384a113f
                                                                  • Instruction ID: d0d9f20a954b1f4bd27702f46fdcb91d225b1915e6cb12ac597d315a73813dd4
                                                                  • Opcode Fuzzy Hash: b676622d33ba3e273e24dcc82fcb731b0a446cd85ca51c4c69d07980384a113f
                                                                  • Instruction Fuzzy Hash: 65414BB5900309CFDB54DF59C888AAABBF5FF88314F24C459D519AB721D731A845CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2277 683c368-683c3dc GlobalMemoryStatusEx 2279 683c3e5-683c40d 2277->2279 2280 683c3de-683c3e4 2277->2280 2280->2279
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0683C3CF
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2881414895.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6830000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: 336003e1d487aa56a2afe109e92d675a29500ae27aae199f7b198d8e9db00534
                                                                  • Instruction ID: c0884d12837101ccb96331f98bf7c9df17c1e02bb1f0ebb3a19b4c9037c02d7e
                                                                  • Opcode Fuzzy Hash: 336003e1d487aa56a2afe109e92d675a29500ae27aae199f7b198d8e9db00534
                                                                  • Instruction Fuzzy Hash: 5711F3B1C006699BCB10DF9AC544BDEFBF4AF48320F15816AD918B7250D378A944CFE5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2283 683c360-683c3a6 2284 683c3ae-683c3dc GlobalMemoryStatusEx 2283->2284 2285 683c3e5-683c40d 2284->2285 2286 683c3de-683c3e4 2284->2286 2286->2285
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0683C3CF
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2881414895.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6830000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: a1fb7f22c0a0a249ce5e34e5d2f86dae3e5e3af89c60f2bd4ad359cbb6163f3e
                                                                  • Instruction ID: ccde738f97fc6b1251a082e27a0844bb596f49c58a0fc23f8c417462f06dc203
                                                                  • Opcode Fuzzy Hash: a1fb7f22c0a0a249ce5e34e5d2f86dae3e5e3af89c60f2bd4ad359cbb6163f3e
                                                                  • Instruction Fuzzy Hash: F11114B1C006699BCB10DFAAC5447DEFBF4AF48320F14816AD818B7241D378A944CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2289 697fd50-697fd57 2291 697fd58-697fdba OleInitialize 2289->2291 2292 697fdc3-697fde0 2291->2292 2293 697fdbc-697fdc2 2291->2293 2293->2292
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 0697FDAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2881627606.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6970000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: d47f933ef189161e8d5248da5beee0d721e816d89b2eabfa8a9ff1f35d44ebec
                                                                  • Instruction ID: c832a679dc72c9ac1a3e0928de5eeefd2fb8218ac7356b1c4192622f1196a9b9
                                                                  • Opcode Fuzzy Hash: d47f933ef189161e8d5248da5beee0d721e816d89b2eabfa8a9ff1f35d44ebec
                                                                  • Instruction Fuzzy Hash: 861115B58003588FCB60DFAAD445BCEBBF8EB48324F20845AE559A7650D374A544CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2296 697ee60-697fdba OleInitialize 2298 697fdc3-697fde0 2296->2298 2299 697fdbc-697fdc2 2296->2299 2299->2298
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 0697FDAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2881627606.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6970000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: aa66e137f03111baafd743f8f0290b9bb0dca306f553295fce6f72d7a8a61dce
                                                                  • Instruction ID: 70f22219f918da927fc7f5bfc9fc119b56eac498eb4e8c9561f93a4c095284c3
                                                                  • Opcode Fuzzy Hash: aa66e137f03111baafd743f8f0290b9bb0dca306f553295fce6f72d7a8a61dce
                                                                  • Instruction Fuzzy Hash: A81115B19003488FDB60DF9AD548BDEBBF8EB48324F20845AD519B7650D378A944CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2302 30ff3f5-30ff402 2303 30ff409-30ff423 2302->2303 2304 30ff404-30ff406 2302->2304 2305 30ff425-30ff428 2303->2305 2304->2303 2306 30ff44b-30ff44d 2305->2306 2307 30ff42a-30ff446 2305->2307 2308 30ff44f 2306->2308 2309 30ff454-30ff457 2306->2309 2307->2306 2308->2309 2309->2305 2310 30ff459-30ff47f 2309->2310 2316 30ff486-30ff4b4 2310->2316 2321 30ff52b-30ff54f 2316->2321 2322 30ff4b6-30ff4c0 2316->2322 2330 30ff559 2321->2330 2331 30ff551 2321->2331 2325 30ff4d8-30ff529 2322->2325 2326 30ff4c2-30ff4c8 2322->2326 2325->2321 2325->2322 2328 30ff4cc-30ff4ce 2326->2328 2329 30ff4ca 2326->2329 2328->2325 2329->2325 2331->2330
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PH^q
                                                                  • API String ID: 0-2549759414
                                                                  • Opcode ID: e703ae73a330cbb78acb184b0b19e7f306b49c78ee980e3e6991494a2932616b
                                                                  • Instruction ID: 5ea1ba450398e59238d4a9291e63486a45e6c3548a2cdcba24be9370cac9580f
                                                                  • Opcode Fuzzy Hash: e703ae73a330cbb78acb184b0b19e7f306b49c78ee980e3e6991494a2932616b
                                                                  • Instruction Fuzzy Hash: 5D4100307052028FCB05EB78D55466EBBE6EF89600F284469C506DB795EF39EC46CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 3
                                                                  • API String ID: 0-1842515611
                                                                  • Opcode ID: c724e6096331ca4e197150b38d865cf0dc2fcd1212fa90a6353e21eacbfbd33c
                                                                  • Instruction ID: 961a35bad03ac50af691c268e3945dcd88303f5a8706f192773791cd0296be7e
                                                                  • Opcode Fuzzy Hash: c724e6096331ca4e197150b38d865cf0dc2fcd1212fa90a6353e21eacbfbd33c
                                                                  • Instruction Fuzzy Hash: ED41E434A01245CFCB54EB79C9587AEBBF1EF89300F2440A9D90ADB7A1DB359C05CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q
                                                                  • API String ID: 0-2625958711
                                                                  • Opcode ID: 7496ce515402a3732430569aee3350f7d75df539475b8a3cb1074895da822cda
                                                                  • Instruction ID: 2cb50f9c5ad1c44b5b736e1f5539a4a8ba58fcde36e30dcabaef5f32b5990b3d
                                                                  • Opcode Fuzzy Hash: 7496ce515402a3732430569aee3350f7d75df539475b8a3cb1074895da822cda
                                                                  • Instruction Fuzzy Hash: 20318F71E1120E8FDB54CFA9C84479EB7B6FF85310F148966E905EB240E771D84ACB41
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q
                                                                  • API String ID: 0-2625958711
                                                                  • Opcode ID: 654f5212333783f2d35177e2c3013e2fbf92bf9737693fbc7295653e6473298b
                                                                  • Instruction ID: e7e07c43afad455e0df3e7795546e48eabe141bf21e99394fbd321d55361b8f5
                                                                  • Opcode Fuzzy Hash: 654f5212333783f2d35177e2c3013e2fbf92bf9737693fbc7295653e6473298b
                                                                  • Instruction Fuzzy Hash: 621123302092546FC706DB3D8424AAE7FF6EF8A701B1184BAD009CF692DB36D845C793
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7d73e3ea59228f06a985250cb21061063f210836c3e60948e208c8116be70a1a
                                                                  • Instruction ID: 819cffc1c13a736864fc90afc23f33c4f6b4d3fbebd75042be08371a0777f374
                                                                  • Opcode Fuzzy Hash: 7d73e3ea59228f06a985250cb21061063f210836c3e60948e208c8116be70a1a
                                                                  • Instruction Fuzzy Hash: CC024034B01102DFCB59EB2CE98822977E6FB9A740B144979D505CB3A4DF35DC8B87A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3e6271f3bb7d7a7c2833fdcac310dca136ce383328a51d2cfd7bcc432276d6ef
                                                                  • Instruction ID: 6885fae246cd9e66ca58adbf2163d785c4d825dde95c0487db5c00342fb99485
                                                                  • Opcode Fuzzy Hash: 3e6271f3bb7d7a7c2833fdcac310dca136ce383328a51d2cfd7bcc432276d6ef
                                                                  • Instruction Fuzzy Hash: 55C1C271A012058FDB50CF69D9847AEBBF6FB88310F2485AADA09DB791DB30DC45CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9010fab7aa03c4314975bbd6b392d3d74c1b74847abe6b03ad43391f8647c2b
                                                                  • Instruction ID: a504b98741cd0760c6bdbe0ad8ea50da4d1a9c5fe11d38b072640e2c920b259f
                                                                  • Opcode Fuzzy Hash: b9010fab7aa03c4314975bbd6b392d3d74c1b74847abe6b03ad43391f8647c2b
                                                                  • Instruction Fuzzy Hash: D5C16D34A012058FDB14DFA8D584BADBBF6EF88310F248469E906DB7A4DB35ED42CB41
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d1c7ca567e1efc735e364240f3615da9610746ce8d2916e8de70a78135e02b67
                                                                  • Instruction ID: a13092409d7beb050a945885d8c24f033cba70011cc82c0c6cc1aaf2901bc898
                                                                  • Opcode Fuzzy Hash: d1c7ca567e1efc735e364240f3615da9610746ce8d2916e8de70a78135e02b67
                                                                  • Instruction Fuzzy Hash: FBA17E70E01209CFDB50CFAAD8917DEFBF2AF88314F188529D915EB654EB749885CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a9ff3bb1b7b2836c0272f20792c1bc314f52177e541dc3d14e64afe403c22395
                                                                  • Instruction ID: 4c261c28fa733f4bbc0a322e440958daf7764fac804ae5d3e50e1225bee4e960
                                                                  • Opcode Fuzzy Hash: a9ff3bb1b7b2836c0272f20792c1bc314f52177e541dc3d14e64afe403c22395
                                                                  • Instruction Fuzzy Hash: EE916070E01209DFDB50CFA9C9857DEFBF1BF88314F188129E915A7694EB749885CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b7f32d5eb1951e583992e4a36498c888d74e347afa3e1af526da9c7670b4609e
                                                                  • Instruction ID: a7e754a67c90ab53e85be118539af32d015923397111f509a16dc89b1a34912f
                                                                  • Opcode Fuzzy Hash: b7f32d5eb1951e583992e4a36498c888d74e347afa3e1af526da9c7670b4609e
                                                                  • Instruction Fuzzy Hash: 05717E70E05249DFDF10CFAAC8817DEFBF1AF88314F188129E915AB654EB749846CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f5a979061fe93718d0e49bafcf3e607e9df6a3b6d004d83814f44833d4fdc221
                                                                  • Instruction ID: c97eccec0cdbec02d1a0d27a7623a2eccb2df9e111144de168a83c8e7642b794
                                                                  • Opcode Fuzzy Hash: f5a979061fe93718d0e49bafcf3e607e9df6a3b6d004d83814f44833d4fdc221
                                                                  • Instruction Fuzzy Hash: 33718F70E05249DFDF10CFAAC8417DEFBF2AF88314F188129D915A7654EB749846CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c80dda6eb84ee8b79d3ace3e3c050fa65a51600056f3f038bb6ded64ef9c69fc
                                                                  • Instruction ID: 5e4e4a2408593c65a54b0591bada4ada1294eaed0404d445e1b9cb23f2a36959
                                                                  • Opcode Fuzzy Hash: c80dda6eb84ee8b79d3ace3e3c050fa65a51600056f3f038bb6ded64ef9c69fc
                                                                  • Instruction Fuzzy Hash: CD512070D112188FDB18CFA9C884B9DFBF1BF48714F188129E819BB690DB75A845CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a39b95e1fefe9286db8e334ee1cf0d2bd679f915c1fb53ee8900563d50625ee4
                                                                  • Instruction ID: 88704cfc64ecfb171a1549c832b64aad0f2679a80d8ce65224985e25781b8d2a
                                                                  • Opcode Fuzzy Hash: a39b95e1fefe9286db8e334ee1cf0d2bd679f915c1fb53ee8900563d50625ee4
                                                                  • Instruction Fuzzy Hash: 09512271D002188FDB18CFA9C884B9DFBF1BF48714F188119E819BB690DB75A845CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cec7ce45bbc7578a962ef79cd279254be9ac2a2433267656e352de8ed788d6c1
                                                                  • Instruction ID: bd8b233887c14071c46f2bce2dfd7ab8fbd285f9df9148f562e878b63e488619
                                                                  • Opcode Fuzzy Hash: cec7ce45bbc7578a962ef79cd279254be9ac2a2433267656e352de8ed788d6c1
                                                                  • Instruction Fuzzy Hash: BE51FB31B07281CFC755DB6CF998955BBB5FB9530474482AAD0004B33ADB786E4ACFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d72d45d0856eef3d353fcc3e36dcdcf04a6bf18a624ea1989c9467b8f6cbfea8
                                                                  • Instruction ID: 24132e208040daabe73334f165f78774707618ecac09dcff6f9810947332ff3f
                                                                  • Opcode Fuzzy Hash: d72d45d0856eef3d353fcc3e36dcdcf04a6bf18a624ea1989c9467b8f6cbfea8
                                                                  • Instruction Fuzzy Hash: DE318035E112069FCB44DF68D8946AEB7F6EF89300F148529E916EB750DB70EC46CB44
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f0b0ffc438216e6588c5bcda417c6fb94bba41c7b1a61c41b82df9792e07c136
                                                                  • Instruction ID: 345f5823b60d33a4c5731ae8abec8f2bc87f7df4325229b858deb0c448a792d5
                                                                  • Opcode Fuzzy Hash: f0b0ffc438216e6588c5bcda417c6fb94bba41c7b1a61c41b82df9792e07c136
                                                                  • Instruction Fuzzy Hash: EB41D630B43241CFC755DB6CF998959BBB5FB9530474482A9D0044B33ADB78AE4ACFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 760d98c314cd0d2b167fdc89cdf81e9db6bb6041e25babb587b173cbf07f5919
                                                                  • Instruction ID: 6fe01639b0381f5f470ce145679955191e03baff0e5001c0b7b4f201e6030c93
                                                                  • Opcode Fuzzy Hash: 760d98c314cd0d2b167fdc89cdf81e9db6bb6041e25babb587b173cbf07f5919
                                                                  • Instruction Fuzzy Hash: EF41FFB4D013499FDB10CFA9C884ADEBBF5FF48310F248429E819AB254DB75A945CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5160fde1f78ba71062d3a7d2a87d17a8d61ab793675ebf63933e2b5f1729835f
                                                                  • Instruction ID: 6b02ff71ec8cc1fecb58a4d057943c7b7cd43e1cb4761f86060e28ab784fbf3d
                                                                  • Opcode Fuzzy Hash: 5160fde1f78ba71062d3a7d2a87d17a8d61ab793675ebf63933e2b5f1729835f
                                                                  • Instruction Fuzzy Hash: 7C319E34E056468FCB45CFA4D894A9EBBF2FF89200F18855AE916EB751DB70EC46CB40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5646c0b409a80984241e761c5b8c397d7aa1611eb376dca92bb5d898fcf9248c
                                                                  • Instruction ID: 1d67b6ce80a8fa0a98652b12c9cb2a9773b346abb21b7c0106bdd4af36e67e67
                                                                  • Opcode Fuzzy Hash: 5646c0b409a80984241e761c5b8c397d7aa1611eb376dca92bb5d898fcf9248c
                                                                  • Instruction Fuzzy Hash: 35316034E012069FCB19DF68D894AAEB7F6FF89300F148529E916E7750DB70AC46CB54
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ca84d7806db84eb7fd745d7a2f50aa1b7f04545523ee5ba2ccf00154fc8c4296
                                                                  • Instruction ID: c6d0ad0a23d973f174c2eaf327c95b50ca6c9d9ce9eac8cb142a81de0558ee03
                                                                  • Opcode Fuzzy Hash: ca84d7806db84eb7fd745d7a2f50aa1b7f04545523ee5ba2ccf00154fc8c4296
                                                                  • Instruction Fuzzy Hash: 9141EEB4D013499FDB10DFA9C484ADEBFF5BF48310F248429E819AB264DB75A985CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f8cae44472ba812bf75280d21ed6a5505a404c4707d4ac9ccc1e0f675df327dc
                                                                  • Instruction ID: 6b537c18d83af196875664595f366b79bbf5c0144fa39c1d6876ec14b56f0fbb
                                                                  • Opcode Fuzzy Hash: f8cae44472ba812bf75280d21ed6a5505a404c4707d4ac9ccc1e0f675df327dc
                                                                  • Instruction Fuzzy Hash: B9317E31E012099FDB85DFA4D89479EF7B6FF89300F188629E905AB750DB70E846CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 262953aea837d548e3c1387a632a2cb10e11399d10f3046fc700ed77fd73a402
                                                                  • Instruction ID: 7fa8574a79260879b962cfb900706b8d4d5d315c05e0c228f44234b5466246f8
                                                                  • Opcode Fuzzy Hash: 262953aea837d548e3c1387a632a2cb10e11399d10f3046fc700ed77fd73a402
                                                                  • Instruction Fuzzy Hash: AB212134701215DFD749EB78E49862D77ABFBC8704B204468E50A973A8DF35DC46CB52
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5f033214c33ebfd03b864cfec6ea27d6836acd3e9c920af4ac582ff033f8f963
                                                                  • Instruction ID: 74472f6439fca0fbefd314cec383eb84092b20695c6824b8f12248cd9f0af03e
                                                                  • Opcode Fuzzy Hash: 5f033214c33ebfd03b864cfec6ea27d6836acd3e9c920af4ac582ff033f8f963
                                                                  • Instruction Fuzzy Hash: 13213B74B02280CFCB99D77CF88875A77A9E749354F1809F1D509CB6A5EB24CC858BA3
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79d048563b2484e9a68c5bebafd9eda26e2c0826966f356f373ad62f2c11dbd0
                                                                  • Instruction ID: 0a27af1da274c9a58c4fa0dbb7e3f0357abef204adac48e3d3b1ab7f9932188e
                                                                  • Opcode Fuzzy Hash: 79d048563b2484e9a68c5bebafd9eda26e2c0826966f356f373ad62f2c11dbd0
                                                                  • Instruction Fuzzy Hash: 3B215E30E0120A9FDB85DFA4D88469EF7B6FF89300F148615E905AB650DB70E846CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee0f66b31e501a5851b641d7d0c4f129d2cfba9d4cde955cff74d57f5bd0aaa7
                                                                  • Instruction ID: 994bd330b20d25ea72a26e231467a8a0efbb9c3aaf14b608a061c86994fb7eac
                                                                  • Opcode Fuzzy Hash: ee0f66b31e501a5851b641d7d0c4f129d2cfba9d4cde955cff74d57f5bd0aaa7
                                                                  • Instruction Fuzzy Hash: 3B21D770B02141CFDB7CE628E44875D76D9EB4E710F0808A9EA06C7B94EB28D88587A6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b8810825f9c7e3f709228370f5a183b6b530c4caeb02047273fe2bfa66528f1f
                                                                  • Instruction ID: 5918aefa2f91c6ca699e453e6df70417382f58a1d90da5d81dc228064566ce39
                                                                  • Opcode Fuzzy Hash: b8810825f9c7e3f709228370f5a183b6b530c4caeb02047273fe2bfa66528f1f
                                                                  • Instruction Fuzzy Hash: 73219031E0120A9FDB18DFA8C8586DEB7B6FF89300F14852AE915FB750EB709946CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5d6e06fa8e008b53fe3f2edf500359096c8c77e35f7e5653bcf86ccaece1fdc3
                                                                  • Instruction ID: fcfedbc8323c18cb0ee8e0f9aad0effe0fb7781b0b58bb5bdd8b7d036639f328
                                                                  • Opcode Fuzzy Hash: 5d6e06fa8e008b53fe3f2edf500359096c8c77e35f7e5653bcf86ccaece1fdc3
                                                                  • Instruction Fuzzy Hash: 89217F30B06205CFDB68DB39D514BAEB7F5AF89304F1441A8D506EB7A0DB399D41CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876528143.00000000018FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018FD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_18fd000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ddc3e83cd991e33dbd0ba812dcaf226a274f40b74a01ddc6b874c84cded420a5
                                                                  • Instruction ID: 30e93418e00567aed78ca53e17b127a5361a8652862ff264ff0330192b37c64b
                                                                  • Opcode Fuzzy Hash: ddc3e83cd991e33dbd0ba812dcaf226a274f40b74a01ddc6b874c84cded420a5
                                                                  • Instruction Fuzzy Hash: 76210071604204DFDB15DF58D984B26BBA5EB84318F20C66DEB0A8B256C33AD547CA61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bbb41ef372d919d2d44596546cf816a60674e1f438529cf8154359dc6ce3a573
                                                                  • Instruction ID: 2ed6636bc2adbe8c8da45e29872bb49f1184995360cb3cb15c31b75924bd928e
                                                                  • Opcode Fuzzy Hash: bbb41ef372d919d2d44596546cf816a60674e1f438529cf8154359dc6ce3a573
                                                                  • Instruction Fuzzy Hash: D0217130E012099FDB18DFA8C45869EB7B6BF89300F14852AE915EB740DB709946CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf51f5e99ea0144c664d4cbb02dcd4b7158fcc88401bf55fe52a0e3cab6d02b7
                                                                  • Instruction ID: abf4bf729e7490a4977df157d4bc299067c48bd90ea94c7ecc49a603540191e0
                                                                  • Opcode Fuzzy Hash: bf51f5e99ea0144c664d4cbb02dcd4b7158fcc88401bf55fe52a0e3cab6d02b7
                                                                  • Instruction Fuzzy Hash: 89214130B05204CFDB58DB79D6146AE77F6AF89241F1004A8D506EB7A0DB3ADD41CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 10ce9123453dc7f8729b8d0a38dfd49ef1ae47654658569ed396db3260045a70
                                                                  • Instruction ID: 4d3046d276414e0ae95d3695d7bf7bf66674dbd3557cf6e23abd002917bc6424
                                                                  • Opcode Fuzzy Hash: 10ce9123453dc7f8729b8d0a38dfd49ef1ae47654658569ed396db3260045a70
                                                                  • Instruction Fuzzy Hash: 5921D570B022408FCB58EB3CF94875E77AAE748354F1449B1D509C7665EB38DC858BA3
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 04cbf654ae058955bddbdc5601954f514ae265fe55c6171041c64fa102dde7a1
                                                                  • Instruction ID: f1b7f889d14b2b383274aabefbf8ad92b0e090324930d6a0a29c48c0febf41b8
                                                                  • Opcode Fuzzy Hash: 04cbf654ae058955bddbdc5601954f514ae265fe55c6171041c64fa102dde7a1
                                                                  • Instruction Fuzzy Hash: 2D21FA34B01205CFDB54EB79D958AAEB7F1EF49340F1044A8E906EB760EB369D04CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ce101d8c8599d748fd56cb246ad4442a0a85a419868cbd376af5cd42ddd2e1f
                                                                  • Instruction ID: 497fce214ffb7d8e1310debfc9dc5e689f0bec2134b1e842932fd3eee377286f
                                                                  • Opcode Fuzzy Hash: 0ce101d8c8599d748fd56cb246ad4442a0a85a419868cbd376af5cd42ddd2e1f
                                                                  • Instruction Fuzzy Hash: F0110630B022059FDFA4EB78D84433D72EAEB45310F148979D642CF742DA25CC868BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0c3f545d5783e6597ce9eb568b73cb9914dc753eab43ad7d14f9eeef8a553db4
                                                                  • Instruction ID: d7014bb935e1cca0bed7083748bccd03f4d6a2fd5fe6c0e1ce06893d0e0d21aa
                                                                  • Opcode Fuzzy Hash: 0c3f545d5783e6597ce9eb568b73cb9914dc753eab43ad7d14f9eeef8a553db4
                                                                  • Instruction Fuzzy Hash: 26110631B032059FDF64D678D84437D76DAEB45310F184979D642DB643EA24CC868BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 68a0d61557618a31f9170cfbd31a15395440b05b17a9cb6ad87c1479d4bd403a
                                                                  • Instruction ID: 04641277895731e5e2a054870563e3fb145baa376ac2ae203201585939cb6bd0
                                                                  • Opcode Fuzzy Hash: 68a0d61557618a31f9170cfbd31a15395440b05b17a9cb6ad87c1479d4bd403a
                                                                  • Instruction Fuzzy Hash: AE117031A02715CFCF64EFB988501ADB7F5FB88211B1804B9DA05EBF42E635D842C7A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8804c5896485742df25a8db8f3f60bfae899bfdf731d106a992b0d726be10dae
                                                                  • Instruction ID: ee1bdf3500b6f3a823074150ccd0079650c26fdedac78a88d2eb761765597bfb
                                                                  • Opcode Fuzzy Hash: 8804c5896485742df25a8db8f3f60bfae899bfdf731d106a992b0d726be10dae
                                                                  • Instruction Fuzzy Hash: DC11E175F01211DFCF55EF78A84869E7BF6EB8C650F100165EA0AD3344EB3489428BA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 586451c539725889a47af58d8985dae98b62869077cfc4be7fb93c2c7f07e5a6
                                                                  • Instruction ID: 032a1b51016ee7bd0f23b199a4ca7039747c94a3571c28d69100c26b4d101dc8
                                                                  • Opcode Fuzzy Hash: 586451c539725889a47af58d8985dae98b62869077cfc4be7fb93c2c7f07e5a6
                                                                  • Instruction Fuzzy Hash: E8016135A02715CFCF65EFB8845019DB7E5BB88210B18047AD905EBE41E635D942C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876528143.00000000018FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 018FD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_18fd000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: 6369d3f8ad30df48e9fd5fbc204c589f53e5c654b36929599b1df75f5d26dce9
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 4A11BB75504280CFDB16CF58D5C4B16FFA2FB84314F24C6AEDA098B656C33AD50ACBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2097c442b768a54d13f67e35ebf1359ab56c073151525f5346766f24c513fe59
                                                                  • Instruction ID: ed51b3284aad2725d712671418f502c3ba51dfb735ab4d1632689e6bab9c6315
                                                                  • Opcode Fuzzy Hash: 2097c442b768a54d13f67e35ebf1359ab56c073151525f5346766f24c513fe59
                                                                  • Instruction Fuzzy Hash: 6E015270A01249EFCB41EB7CF98499CBBB5EF45704F0442B9C404DB265EB305E498B92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dd2e9c1c1a15f0fbbbbd3171c51fc09b6ebbaf8932ed1c2fecb078faae587199
                                                                  • Instruction ID: fff5b2d4cf7e92973d4756e1c2d45ad55195f599a251e9a2f5db075f89e969dd
                                                                  • Opcode Fuzzy Hash: dd2e9c1c1a15f0fbbbbd3171c51fc09b6ebbaf8932ed1c2fecb078faae587199
                                                                  • Instruction Fuzzy Hash: 2CF0F036A06654CFDB26CBA888901ECBBA1FED822171D00A7CA05EBE52D725E842C711
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2876862078.00000000030F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_30f0000_HSBC Havale Bildirimi.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c9f8354e0d3b17a54e0373754ff1fe724fd619296bd58b676791b4b108a71caf
                                                                  • Instruction ID: f9ebe6b46aa03d4968229a6f40312e758966c8cd3d4ed8519a35652e1692db09
                                                                  • Opcode Fuzzy Hash: c9f8354e0d3b17a54e0373754ff1fe724fd619296bd58b676791b4b108a71caf
                                                                  • Instruction Fuzzy Hash: E1F0FF70E01109EFCB40EBACF98499DBBB5EB45304F5046B8C909D7264EF306E4A8B92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%