Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe

Overview

General Information

Sample name:category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
renamed because original name is a hash value
Original sample name:category05 sc110-11_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
Analysis ID:1636902
MD5:2b1b16363ddcf9686ce1c9cc781038e9
SHA1:d2bd4f0ea1e8164084cdac78673a4f4f4fceb3bf
SHA256:7a1af0954cd7db05725aaa1b43ae149bc9f7bb610305b216744f3863e5247663
Tags:exeuser-lowmal3
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates processes with suspicious names
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe (PID: 6476 cmdline: "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe" MD5: 2B1B16363DDCF9686CE1C9CC781038E9)
    • powershell.exe (PID: 6772 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 6016 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Bot Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat id": "-4724020147"}
{"Exfil Mode": "Telegram", "Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat_id": "-4724020147", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2db83:$a1: get_encryptedPassword
        • 0x2dea4:$a2: get_encryptedUsername
        • 0x2d993:$a3: get_timePasswordChanged
        • 0x2da9c:$a4: get_passwordField
        • 0x2db99:$a5: set_encryptedPassword
        • 0x2f26b:$a7: get_logins
        • 0x2f1ce:$a10: KeyLoggerEventArgs
        • 0x2ee33:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2bf83:$a1: get_encryptedPassword
                • 0x2c2a4:$a2: get_encryptedUsername
                • 0x2bd93:$a3: get_timePasswordChanged
                • 0x2be9c:$a4: get_passwordField
                • 0x2bf99:$a5: set_encryptedPassword
                • 0x2d66b:$a7: get_logins
                • 0x2d5ce:$a10: KeyLoggerEventArgs
                • 0x2d233:$a11: KeyLoggerEventArgsEventHandler
                0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x39df3:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x39496:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x396f3:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3a0d2:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 25 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ParentImage: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ParentProcessId: 6476, ParentProcessName: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ProcessId: 6772, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ParentImage: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ParentProcessId: 6476, ParentProcessName: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ProcessId: 6772, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ParentImage: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ParentProcessId: 6476, ParentProcessName: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe", ProcessId: 6772, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 628, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6016, ProcessName: svchost.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat id": "-4724020147"}
                Source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4", "Chat_id": "-4724020147", "Version": "4.4"}
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeReversingLabs: Detection: 34%
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeVirustotal: Detection: 30%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpackString decryptor: 7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpackString decryptor: -4724020147
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpackString decryptor:
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpackString decryptor: 7772411030:AAHExC6psygkhMTNAOoX6_LedLTg2d-pLt4
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpackString decryptor: -4724020147
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpackString decryptor:
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Users\user\Desktop\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ggAT.pdbs\ggAT.pdbpdbgAT.pdbpdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Windows.Forms.pdbH source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\symbols\exe\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WER893C.tmp.dmp.6.dr
                Source: Binary string: ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: Binary string: ggAT.pdbSHA256 source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: Binary string: System.Configuration.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Xml.pdbd source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Configuration.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: C:\Windows\ggAT.pdbpdbgAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\ggAT.pdb-w source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: zsymbols\exe\ggAT.pdbmo source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER893C.tmp.dmp.6.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Core.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbO source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: zHPaoHC:\Users\user\Desktop\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: ?moC:\Users\user\Desktop\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: @mo.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: HPao(C:\Windows\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\Desktop\ggAT.pdbn source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: mscorlib.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.PDBz source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\exe\ggAT.pdbEw% source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb9\ source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdbMw source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER893C.tmp.dmp.6.dr
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 4x nop then jmp 07C2880Dh0_2_07C28DBA
                Source: global trafficTCP traffic: 192.168.2.7:62318 -> 162.159.36.2:53
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.0000000002996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.0000000002996000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 00000009.00000002.2106417469.0000022C61C00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.9.dr, qmgr.db.9.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.856756542.00000000034E1000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: qmgr.db.9.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                Source: svchost.exe, 00000009.00000003.1203065246.0000022C61BA0000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                Source: qmgr.db.9.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe1C:
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/

                System Summary

                barindex
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_016C3E280_2_016C3E28
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_016CE1640_2_016CE164
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_016C6F980_2_016C6F98
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_07C245F00_2_07C245F0
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_07C241A80_2_07C241A8
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_07C241B80_2_07C241B8
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_07C261B80_2_07C261B8
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_07C23D800_2_07C23D80
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_07C25D800_2_07C25D80
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080B7C200_2_080B7C20
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080BA7200_2_080BA720
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080B9AC00_2_080B9AC0
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080B82570_2_080B8257
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080B76600_2_080B7660
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080B76700_2_080B7670
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 2_2_00E23AA12_2_00E23AA1
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 2_2_00E23E092_2_00E23E09
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6800 -s 1516
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.855252658.000000000186E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.872420583.0000000008688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.856756542.00000000035DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.871847954.0000000007F40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.872273709.0000000008600000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.856756542.000000000353E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.856756542.00000000036F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeBinary or memory string: OriginalFilenameggAT.exe6 vs category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, O--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, O--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, O--.csBase64 encoded string: 'KWRVsNJa7mk/oSuy2WfCkJjef7DgvfIcJ9l2tJhRpe7qa6fDVQRFScVnsdwZVygn'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, O--.csBase64 encoded string: 'KWRVsNJa7mk/oSuy2WfCkJjef7DgvfIcJ9l2tJhRpe7qa6fDVQRFScVnsdwZVygn'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, za4GvLbh8ZiL1EmLy8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, za4GvLbh8ZiL1EmLy8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, LFRhGgX1FfCQG4qZq6.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, LFRhGgX1FfCQG4qZq6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, LFRhGgX1FfCQG4qZq6.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.evad.winEXE@8/15@2/2
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6820:120:WilError_03
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMutant created: \Sessions\1\BaseNamedObjects\LmlRhzWrJstd
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6800
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5fweu21.jlt.ps1Jump to behavior
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeReversingLabs: Detection: 34%
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeVirustotal: Detection: 30%
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile read: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6800 -s 1516
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: \??\C:\Users\user\Desktop\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ggAT.pdbs\ggAT.pdbpdbgAT.pdbpdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Windows.Forms.pdbH source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\symbols\exe\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WER893C.tmp.dmp.6.dr
                Source: Binary string: ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: Binary string: ggAT.pdbSHA256 source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe
                Source: Binary string: System.Configuration.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Xml.pdbd source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Configuration.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: C:\Windows\ggAT.pdbpdbgAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\ggAT.pdb-w source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: zsymbols\exe\ggAT.pdbmo source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER893C.tmp.dmp.6.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Core.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbO source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: zHPaoHC:\Users\user\Desktop\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: ?moC:\Users\user\Desktop\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: @mo.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: HPao(C:\Windows\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948105506.00000000007A7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\Desktop\ggAT.pdbn source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: mscorlib.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.PDBz source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\exe\ggAT.pdbEw% source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb9\ source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdbMw source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER893C.tmp.dmp.6.dr
                Source: Binary string: \??\C:\Windows\ggAT.pdb source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000ABB000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdb source: WER893C.tmp.dmp.6.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER893C.tmp.dmp.6.dr

                Data Obfuscation

                barindex
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, LFRhGgX1FfCQG4qZq6.cs.Net Code: pwWicR7D4G System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080BE188 push eax; mov dword ptr [esp], edx0_2_080BE19C
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_080BE190 push eax; mov dword ptr [esp], edx0_2_080BE19C
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_088778E8 pushfd ; ret 0_2_088778F1
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_0887AC82 pushad ; iretd 0_2_0887ACE1
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeCode function: 0_2_08877DBC push 9C088559h; ret 0_2_08877DC5
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeStatic PE information: section name: .text entropy: 7.879888640908413
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, WaSKkhjyguoCrdZKtF.csHigh entropy of concatenated method names: 'Hg1rP9VmJV', 'cjxrh0fc2u', 'ldNrvyWJRf', 'zFIrqMDX2i', 'lTIrHCGlhK', 'kiSrniu8J5', 'O6OgKd2ETPB35isqEg', 'nu7EXZqiYweBpeCwSZ', 'kDLrrZ1DiM', 'mFCrBfyu4J'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, iF52KfcMthnECk9bBu.csHigh entropy of concatenated method names: 'Tf3HCuX1Vq', 'zddHTCRl26', 'WQqH5tQ0ka', 'TYvH2Fy48U', 'JCxHFX5xDT', 'Tx1HpaPrpx', 'krZHMZRixA', 'JQ8HXCplcr', 'bBMHaNBrFF', 'CdwHdExxvd'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, QhNTXaG5XFjl1Xd2jZ.csHigh entropy of concatenated method names: 'UYsPL0Sd2O', 'xFkPK673wf', 'ESxPIbXxFv', 'a0iI7wE296', 'S4RIzGT867', 'X7HPkC2IO3', 'rouPrcyiux', 'GVlP6MrbPC', 'LcTPBc0Oo9', 'eZ1PiSEhjZ'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, S5ngMqt7UehiaePXXu.csHigh entropy of concatenated method names: 'qrmIQgphYn', 'meIIENKCak', 'U9PIgsugZN', 'ToString', 'Sc2I8REsc2', 'BJWIDW0kyM', 'gtJ9NIx6OQdtaLldwZi', 'PN5avGxlnyJ7cfTYMUP', 'IioQYuxICiwHxpVwQjR'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, Bv4SkXLI0FUiPcTZbU.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'HG66uT563j', 'hQj67Ellwe', 'j9H6zYWkNQ', 'r8KBk4MZWh', 'p8eBrWnotE', 'OKQB6Nb3b8', 'oYJBBvuubd', 'SpNjMRdgQPA20yePlJc'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, lXgFERfwKh3uvWWD83.csHigh entropy of concatenated method names: 'oPsKJyL7Wj', 'VDQKe8mQCI', 'iV7KAEJcrf', 'jwfKthunAd', 'e1SKHOrE1P', 'atNKnj70Ca', 'Ay6K3KBZ83', 'p7OKyaiswI', 'Na0KxNeVEK', 'fRwKSpCcph'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, Lb2HMIyBPWbLMRxlel.csHigh entropy of concatenated method names: 'ToString', 'pHXnjjERgL', 'zRjnFjndev', 'YOFnpGsWjN', 'EounMd8c41', 'WFenXb420v', 'k8enahjMv3', 'OQandxK3dR', 'oZ4n0TM4EH', 'u0snZLT3Yb'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, TSSX4OqQALK9jipj49.csHigh entropy of concatenated method names: 'CWUIWjdVrp', 'LkCIltcJ0y', 'CNYIsOHCxQ', 'h3NIPb3SQb', 'KGBIhm42IK', 'QlysgBhQF7', 'TGcs8bFd8J', 'jBFsDvf2O3', 'XdysRudpo8', 'IRBsuMBHTh'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, sgH40s2bZ67uB2Ey5j.csHigh entropy of concatenated method names: 'Yuq3RcTNqR', 'LhD37PdumW', 'zW1ykYRhtd', 'DqUyrSVt8Y', 'CjS3j79VWH', 'PNf3TmZugX', 'BLL31IBqDP', 'NRO35uI1GZ', 'Eqj321C1iB', 'CR73QwtKge'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, c22TK6pmDR93odXi9sQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EQ7Sj0KNcc', 'UlQSTV8XgK', 'BcfS1ywWGU', 'CWES5q6ihK', 'aQNS2KL4Qj', 'k6RSQE0sAR', 'gi6SEQMPmT'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, JwCiHVijZDF5xhYZNF.csHigh entropy of concatenated method names: 'mVBSKmqyCQ', 'BHqSsW1x8l', 'Qv3SI6XrZ1', 'lW5SPRyK61', 'btbSxZBXXg', 'AklShmc5jG', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, LFRhGgX1FfCQG4qZq6.csHigh entropy of concatenated method names: 'XgNBWm9tj9', 'b2dBLdAM3e', 'K74Bl35aCa', 'U8CBKd0tCv', 'XoDBscGMnG', 'RDvBI5X1y0', 'FFBBPli1Xt', 'nD0BhfehOT', 'pEaB9XRtD8', 'XpUBvUQE7T'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, nxMtFOppSZX7vffwgMd.csHigh entropy of concatenated method names: 'tQTS7TA0NB', 'F6PSzLucEb', 'A5pwkROJrs', 'Tj9wrP5mRq', 'fkGw6wl57d', 'XyLwBg2Fv7', 'WawwiNJHjL', 'ErJwWNYRYS', 'hXFwLaQY0M', 'zw4wl4PY9l'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, TmjQLFnMGFfNbJZ8N0.csHigh entropy of concatenated method names: 'Dispose', 'oHMruhkVbO', 'y0v6F5Bb6O', 'StxNgcxuRr', 'L3Br7wvp20', 'AC7rzrx7vc', 'ProcessDialogKey', 'c3e6kXaBCo', 'zB56rw6Adj', 'Oqh66cvaKb'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, Or4ZMqsJ6447HQdUsH.csHigh entropy of concatenated method names: 'VTNfAn6lsb', 'tTqftws9qC', 'bGUfGOOplb', 'd1JfFjVrfO', 'bLPfM9op9G', 'wIHfXgPiC8', 'sjlfd8RXg0', 'tZ8f0n3BtM', 'i2BfCeuCdc', 'mOofjl47Cv'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, KH5l9UvF0bmXi0ADdP.csHigh entropy of concatenated method names: 'BHdxHr0Qck', 'KIcx3d3X3C', 'RTExxKkXaU', 'eSxxwWtcgZ', 'XRHxUP3GHv', 'rfuxOWjeX8', 'Dispose', 'J5GyL86sxG', 'wd6yl4Nh4h', 'IKyyKS613f'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, KMu5OPpjA8WfNHr2tNd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UoxNxRrP88', 'IZiNSeiL3p', 'bCMNwnbIb8', 'EWINN57GyF', 'k8sNU4ciMo', 'L5TN45G2EB', 'tnfNOombMQ'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, nh84pC4MxY6jLPcnCh.csHigh entropy of concatenated method names: 'HK3c90DSq', 'R7xJG4vRg', 'LhkeSdRLI', 'KwbYkeyAl', 'uRRtSN83h', 'jV4oUQiRA', 'iF3CPv6gLZ6oOxIuqX', 'FlGp5VCSD591qeBPx6', 'EPtyN45rj', 'nnmSmwe9e'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, RoCLUezLYRQfOTml7S.csHigh entropy of concatenated method names: 'E6xSerbnb2', 'Wk3SA0abLP', 'gLOSt1CuGb', 'NYPSGkjvTn', 'CSwSFklfHM', 'S0wSMI3vGV', 'tZhSXg8ilj', 'rpLSOyLfJR', 'pG2SVLLreK', 'A7hSmYf0oa'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, Cryh8PQj0PSSCwVpyO.csHigh entropy of concatenated method names: 'b2G3vq4bXi', 'nDy3qhdapm', 'ToString', 'r9k3LuwViD', 'DMj3l0YgpB', 'HM63Kkg2A3', 'A3r3sZlIdo', 'GaE3IFxf2o', 'WA83PPtW8b', 'Rd33hUXtSW'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, CwVnGAMiYP0yubfXN6.csHigh entropy of concatenated method names: 'UTdPVCFds7', 'XbcPmnmSh2', 'uh0PcSln3y', 'qMPPJb7i3M', 'qRnPbVkCm4', 'iOhPeg4PtU', 'hspPYfBQQN', 'TxDPAAmyYs', 'qt1PtXlomH', 'pssPoD9OGt'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, za4GvLbh8ZiL1EmLy8.csHigh entropy of concatenated method names: 'OCsl5HriGA', 'MM9l2723Qr', 'TCTlQYjLdG', 'ldalEOLPxq', 'liAlgvedJr', 'rXhl87k0xN', 'LedlD6aEI5', 'KIMlRg8Qdd', 'qKVluAYFyl', 'YWEl72j8P7'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, aCDhmOVUc9edZ5nAev.csHigh entropy of concatenated method names: 'TcBsbh63ib', 'zAksYnCR1I', 'E9uKpdpLtf', 'AerKMKgtCf', 'rcMKXtt6Rd', 'EtFKaAMg4t', 'PwHKdRAPT3', 'KERK0Zear8', 'EjHKZKCxr2', 'hBAKCy7ZvL'
                Source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.7f40000.5.raw.unpack, traSWsdQNRDcStEiTn.csHigh entropy of concatenated method names: 'RpyxGnCQKg', 'gZFxFKsbKj', 'RkWxpVlST1', 'yLhxMeTAuK', 'Tf7xX5pgrh', 'hggxa4LaGH', 'qZMxdaVP3H', 'FEZx0XyMmL', 'CL3xZ41Z3o', 'QgdxC7mWJq'
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile created: \category05 sc110-11#u3000_z01g-00008d siparis po15804-25 - h64po1.exe
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile created: \category05 sc110-11#u3000_z01g-00008d siparis po15804-25 - h64po1.exe
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile created: \category05 sc110-11#u3000_z01g-00008d siparis po15804-25 - h64po1.exe
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile created: \category05 sc110-11#u3000_z01g-00008d siparis po15804-25 - h64po1.exeJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeFile created: \category05 sc110-11#u3000_z01g-00008d siparis po15804-25 - h64po1.exeJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTR
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 34E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 17A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 9BE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: ABE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: AE00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: BE00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: E00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 28D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: 48D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239875Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239766Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239656Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239518Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239406Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239297Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239177Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeWindow / User API: threadDelayed 578Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeWindow / User API: threadDelayed 784Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5890Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3735Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239518s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe TID: 6588Thread sleep time: -239177s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5880Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 7088Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239875Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239766Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239656Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239518Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239406Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239297Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeThread delayed: delay time: 239177Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Amcache.hve.6.drBinary or memory string: VMware
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: svchost.exe, 00000009.00000002.2105249459.0000022C5C62B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2106655123.0000022C61C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe, 00000002.00000002.948167828.0000000000A66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeMemory written: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeProcess created: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe "C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe"Jump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000002.00000002.948993500.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4e1ce68.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe.4dd9848.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.947953994.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.859465487.0000000004DD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6476, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: category05 sc110-11#U3000_Z01G-00008D Siparis PO15804-25 - H64PO1.exe PID: 6800, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                OS Credential Dumping31
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)51
                Virtualization/Sandbox Evasion
                Security Account Manager51
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture12
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSync22
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.