Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U00d6DEME DETAYLARI 170325.exe

Overview

General Information

Sample name:#U00d6DEME DETAYLARI 170325.exe
renamed because original name is a hash value
Original sample name:DEME DETAYLARI 170325.exe
Analysis ID:1640442
MD5:acd4b8a4942027c60549e8adb8195727
SHA1:b92a0256ced0778c1892e4f7457679e9dcf626db
SHA256:4023f16ab570c96bbfc7d6c9685d137382c82029c15df71696acdc20023dd31b
Tags:exeuser-lowmal3
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: CMSTP Execution Process Creation
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a Windows Living Off The Land Binaries (LOL bins)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • #U00d6DEME DETAYLARI 170325.exe (PID: 7948 cmdline: "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe" MD5: ACD4B8A4942027C60549E8ADB8195727)
    • powershell.exe (PID: 6748 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • #U00d6DEME DETAYLARI 170325.exe (PID: 5456 cmdline: "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe" MD5: ACD4B8A4942027C60549E8ADB8195727)
      • explorer.exe (PID: 3084 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • cmstp.exe (PID: 772 cmdline: "C:\Windows\SysWOW64\cmstp.exe" MD5: D7AABFAB5BEFD53BA3A27BD48F3CC675)
          • cmd.exe (PID: 7984 cmdline: /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 1224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.rg-txtagstorefrontfze.world/bs03/"], "decoy": ["aindirectiveteam.info", "itchen-remodeling-up.world", "avadacasino21.buzz", "urumsbicard.net", "ental-care-2762127.fyi", "raveline.tech", "camtech.online", "leartec.health", "odkacasino-333.buzz", "oans-credits-73480.bond", "ubstrate360.xyz", "dalang.click", "on66my.xyz", "elegilgh.run", "wlf.dev", "ex-in-wien.net", "riminal-mischief.cfd", "0ns.pro", "klopcy.xyz", "ssetexcelstrongmanageroot.xyz", "leganttreasuresboutique.info", "ohnmcafee.xyz", "usshelter.net", "abianice-warszawska.online", "ituttotienda.online", "antoorschoonmaak-1628796.world", "olourg.irish", "ouseofisra-el.net", "umidifier-74367.bond", "nagapa.irish", "piccomms.net", "swift.xyz", "g100.beauty", "rooutfits.net", "oworking-space-1.live", "oughstorememorial.lifestyle", "assaumergerfunds.info", "urkish-hair-268864660.click", "udes-kitchen.net", "idscomefirst.online", "lowavenue.info", "ijn-websupport.sbs", "58bet.website", "sa-store.online", "epemog.online", "77hashrate.xyz", "yvalikdigital.online", "elegelhg.qpon", "ielosanantonio.online", "motrim.click", "oodwin-law.cfd", "enseitool.xyz", "romptsdesigns.xyz", "lomail.sbs", "ucien.world", "nipsvuesandbox.studio", "erspirexbrasil.online", "atinafyava.shop", "avenspar.xyz", "cyma98.sbs", "ealmsec.info", "23t.xyz", "nfmod.net", "eleghegl.xyz"]}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cb80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c8ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18809:$sqlite3step: 68 34 1C 7B E1
      • 0x1891c:$sqlite3step: 68 34 1C 7B E1
      • 0x18838:$sqlite3text: 68 38 2A 90 C5
      • 0x1895d:$sqlite3text: 68 38 2A 90 C5
      • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 24 entries
      SourceRuleDescriptionAuthorStrings
      9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cb80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b8e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c8ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18809:$sqlite3step: 68 34 1C 7B E1
          • 0x1891c:$sqlite3step: 68 34 1C 7B E1
          • 0x18838:$sqlite3text: 68 38 2A 90 C5
          • 0x1895d:$sqlite3text: 68 38 2A 90 C5
          • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries

          System Summary

          barindex
          Source: Process startedAuthor: Nik Seetharaman: Data: Command: /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine: /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\cmstp.exe", ParentImage: C:\Windows\SysWOW64\cmstp.exe, ParentProcessId: 772, ParentProcessName: cmstp.exe, ProcessCommandLine: /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ProcessId: 7984, ProcessName: cmd.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ParentImage: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe, ParentProcessId: 7948, ParentProcessName: #U00d6DEME DETAYLARI 170325.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ProcessId: 6748, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ParentImage: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe, ParentProcessId: 7948, ParentProcessName: #U00d6DEME DETAYLARI 170325.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ProcessId: 6748, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ParentImage: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe, ParentProcessId: 7948, ParentProcessName: #U00d6DEME DETAYLARI 170325.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe", ProcessId: 6748, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-17T10:38:09.293469+010020314531Malware Command and Control Activity Detected192.168.2.54973313.248.169.4880TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.rg-txtagstorefrontfze.world/bs03/"], "decoy": ["aindirectiveteam.info", "itchen-remodeling-up.world", "avadacasino21.buzz", "urumsbicard.net", "ental-care-2762127.fyi", "raveline.tech", "camtech.online", "leartec.health", "odkacasino-333.buzz", "oans-credits-73480.bond", "ubstrate360.xyz", "dalang.click", "on66my.xyz", "elegilgh.run", "wlf.dev", "ex-in-wien.net", "riminal-mischief.cfd", "0ns.pro", "klopcy.xyz", "ssetexcelstrongmanageroot.xyz", "leganttreasuresboutique.info", "ohnmcafee.xyz", "usshelter.net", "abianice-warszawska.online", "ituttotienda.online", "antoorschoonmaak-1628796.world", "olourg.irish", "ouseofisra-el.net", "umidifier-74367.bond", "nagapa.irish", "piccomms.net", "swift.xyz", "g100.beauty", "rooutfits.net", "oworking-space-1.live", "oughstorememorial.lifestyle", "assaumergerfunds.info", "urkish-hair-268864660.click", "udes-kitchen.net", "idscomefirst.online", "lowavenue.info", "ijn-websupport.sbs", "58bet.website", "sa-store.online", "epemog.online", "77hashrate.xyz", "yvalikdigital.online", "elegelhg.qpon", "ielosanantonio.online", "motrim.click", "oodwin-law.cfd", "enseitool.xyz", "romptsdesigns.xyz", "lomail.sbs", "ucien.world", "nipsvuesandbox.studio", "erspirexbrasil.online", "atinafyava.shop", "avenspar.xyz", "cyma98.sbs", "ealmsec.info", "23t.xyz", "nfmod.net", "eleghegl.xyz"]}
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: eRpW.pdb source: #U00d6DEME DETAYLARI 170325.exe
          Source: Binary string: cmstp.pdbGCTL source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387901442.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1385090492.0000000000B47000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2552543639.0000000000B70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387947767.0000000000FA0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000003.1383808563.000000000437C000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000003.1388283213.0000000004527000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.000000000486E000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.00000000046D0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: #U00d6DEME DETAYLARI 170325.exe, #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387947767.0000000000FA0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, cmstp.exe, 0000000B.00000003.1383808563.000000000437C000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000003.1388283213.0000000004527000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.000000000486E000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.00000000046D0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: cmstp.pdb source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387901442.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1385090492.0000000000B47000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, cmstp.exe, 0000000B.00000002.2552543639.0000000000B70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: eRpW.pdbSHA256;;Z source: #U00d6DEME DETAYLARI 170325.exe
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7B3C4 memset,GetPrivateProfileStringW,FindFirstFileW,memset,FindNextFileW,11_2_00B7B3C4
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7894B memset,memset,memset,SHGetFolderPathW,memset,SHGetFolderPathW,CmFree,memset,FindFirstFileW,GetLastError,memset,memset,FindNextFileW,FindClose,11_2_00B7894B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 4x nop then pop ebx9_2_00407B1A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 4x nop then pop edi9_2_00416CA5
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop ebx11_2_00827B1B
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi11_2_00836CA5

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49733 -> 13.248.169.48:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49733 -> 13.248.169.48:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.5:49733 -> 13.248.169.48:80
          Source: C:\Windows\explorer.exeNetwork Connect: 13.248.169.48 80Jump to behavior
          Source: Malware configuration extractorURLs: www.rg-txtagstorefrontfze.world/bs03/
          Source: global trafficHTTP traffic detected: GET /bs03/?AdsxA2G=Yg/si+zA8frR8XW7Cf3Z2S3dOnCB1IEkUFHX2PQk8Cg0pSfA0QI6WJxLkijYrYR8qX2Y&1bV=WXr8JfXxOD HTTP/1.1Host: www.camtech.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB83F82 getaddrinfo,setsockopt,recv,10_2_0AB83F82
          Source: global trafficHTTP traffic detected: GET /bs03/?AdsxA2G=Yg/si+zA8frR8XW7Cf3Z2S3dOnCB1IEkUFHX2PQk8Cg0pSfA0QI6WJxLkijYrYR8qX2Y&1bV=WXr8JfXxOD HTTP/1.1Host: www.camtech.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.rg-txtagstorefrontfze.world
          Source: global trafficDNS traffic detected: DNS query: www.riminal-mischief.cfd
          Source: global trafficDNS traffic detected: DNS query: www.epemog.online
          Source: global trafficDNS traffic detected: DNS query: www.abianice-warszawska.online
          Source: global trafficDNS traffic detected: DNS query: www.camtech.online
          Source: explorer.exe, 0000000A.00000002.2558052578.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.0000000009716000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
          Source: explorer.exe, 0000000A.00000002.2558052578.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.0000000009716000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 0000000A.00000002.2558052578.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.0000000009716000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 0000000A.00000000.1324844652.0000000009759000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2558052578.0000000009759000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlx#
          Source: explorer.exe, 0000000A.00000002.2557508420.0000000008770000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.2556853036.0000000007A60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000000.1322931544.00000000082E0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1314350925.0000000002A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.58bet.website
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.58bet.website/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.58bet.website/bs03/www.oughstorememorial.lifestyle
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.58bet.websiteReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abianice-warszawska.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abianice-warszawska.online/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abianice-warszawska.online/bs03/www.camtech.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.abianice-warszawska.onlineReferer:
          Source: explorer.exe, 0000000A.00000002.2555653709.0000000007215000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1319193716.0000000007218000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2555653709.0000000007218000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.avenspar.xyz
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.avenspar.xyz/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.avenspar.xyz/bs03/www.58bet.website
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.avenspar.xyzReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.camtech.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.camtech.online/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.camtech.online/bs03/www.udes-kitchen.net
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.camtech.onlineReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.epemog.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.epemog.online/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.epemog.online/bs03/www.abianice-warszawska.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.epemog.onlineReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klopcy.xyz
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klopcy.xyz/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klopcy.xyz/bs03/www.ssetexcelstrongmanageroot.xyz
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klopcy.xyzReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nipsvuesandbox.studio
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nipsvuesandbox.studio/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nipsvuesandbox.studio/bs03/www.klopcy.xyz
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nipsvuesandbox.studioReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oughstorememorial.lifestyle
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oughstorememorial.lifestyle/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oughstorememorial.lifestyle/bs03/www.umidifier-74367.bond
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oughstorememorial.lifestyleReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rg-txtagstorefrontfze.world
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rg-txtagstorefrontfze.world/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rg-txtagstorefrontfze.world/bs03/www.riminal-mischief.cfd
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rg-txtagstorefrontfze.worldReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.riminal-mischief.cfd
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.riminal-mischief.cfd/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.riminal-mischief.cfd/bs03/www.epemog.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.riminal-mischief.cfdReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rooutfits.net
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rooutfits.net/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rooutfits.net/bs03/www.avenspar.xyz
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rooutfits.netReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ssetexcelstrongmanageroot.xyz
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ssetexcelstrongmanageroot.xyz/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ssetexcelstrongmanageroot.xyz/bs03/www.rooutfits.net
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ssetexcelstrongmanageroot.xyzReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ucien.world
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ucien.world/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ucien.world/bs03/pdf
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ucien.worldReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.udes-kitchen.net
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.udes-kitchen.net/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.udes-kitchen.net/bs03/www.nipsvuesandbox.studio
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.udes-kitchen.netReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umidifier-74367.bond
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umidifier-74367.bond/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umidifier-74367.bond/bs03/www.yvalikdigital.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umidifier-74367.bondReferer:
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yvalikdigital.online
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yvalikdigital.online/bs03/
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yvalikdigital.online/bs03/www.ucien.world
          Source: explorer.exe, 0000000A.00000002.2564685992.000000000D811000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yvalikdigital.onlineReferer:
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppve
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSs
          Source: explorer.exe, 0000000A.00000002.2558052578.0000000009604000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.0000000009604000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 0000000A.00000000.1319193716.0000000007165000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2555653709.0000000007165000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 0000000A.00000002.2555653709.000000000725E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1319193716.000000000725E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comys
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEM
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D44A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D44A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/$
          Source: explorer.exe, 0000000A.00000002.2563220193.000000000D348000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1328228362.000000000D348000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: #U00d6DEME DETAYLARI 170325.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: #U00d6DEME DETAYLARI 170325.exe PID: 5456, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: cmstp.exe PID: 772, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A320 NtCreateFile,9_2_0041A320
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A3D0 NtReadFile,9_2_0041A3D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A450 NtClose,9_2_0041A450
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A500 NtAllocateVirtualMemory,9_2_0041A500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A31A NtCreateFile,9_2_0041A31A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A3CA NtReadFile,9_2_0041A3CA
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A44B NtClose,9_2_0041A44B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041A4FA NtAllocateVirtualMemory,9_2_0041A4FA
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012B60 NtClose,LdrInitializeThunk,9_2_01012B60
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012BF0 NtAllocateVirtualMemory,LdrInitializeThunk,9_2_01012BF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012AD0 NtReadFile,LdrInitializeThunk,9_2_01012AD0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012D10 NtMapViewOfSection,LdrInitializeThunk,9_2_01012D10
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012D30 NtUnmapViewOfSection,LdrInitializeThunk,9_2_01012D30
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012DD0 NtDelayExecution,LdrInitializeThunk,9_2_01012DD0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_01012DF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012C70 NtFreeVirtualMemory,LdrInitializeThunk,9_2_01012C70
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012CA0 NtQueryInformationToken,LdrInitializeThunk,9_2_01012CA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012F30 NtCreateSection,LdrInitializeThunk,9_2_01012F30
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012F90 NtProtectVirtualMemory,LdrInitializeThunk,9_2_01012F90
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012FB0 NtResumeThread,LdrInitializeThunk,9_2_01012FB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012FE0 NtCreateFile,LdrInitializeThunk,9_2_01012FE0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012E80 NtReadVirtualMemory,LdrInitializeThunk,9_2_01012E80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,9_2_01012EA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01014340 NtSetContextThread,9_2_01014340
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01014650 NtSuspendThread,9_2_01014650
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012B80 NtQueryInformationFile,9_2_01012B80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012BA0 NtEnumerateValueKey,9_2_01012BA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012BE0 NtQueryValueKey,9_2_01012BE0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012AB0 NtWaitForSingleObject,9_2_01012AB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012AF0 NtWriteFile,9_2_01012AF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012D00 NtSetInformationFile,9_2_01012D00
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012DB0 NtEnumerateKey,9_2_01012DB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012C00 NtQueryInformationProcess,9_2_01012C00
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012C60 NtCreateKey,9_2_01012C60
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012CC0 NtQueryVirtualMemory,9_2_01012CC0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012CF0 NtOpenProcess,9_2_01012CF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012F60 NtCreateProcessEx,9_2_01012F60
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012FA0 NtQuerySection,9_2_01012FA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012E30 NtWriteVirtualMemory,9_2_01012E30
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012EE0 NtQueueApcThread,9_2_01012EE0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01013010 NtOpenDirectoryObject,9_2_01013010
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01013090 NtSetValueKey,9_2_01013090
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010135C0 NtCreateMutant,9_2_010135C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010139B0 NtGetContextThread,9_2_010139B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01013D10 NtOpenProcessToken,9_2_01013D10
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01013D70 NtOpenThread,9_2_01013D70
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB83232 NtCreateFile,10_2_0AB83232
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB84E12 NtProtectVirtualMemory,10_2_0AB84E12
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB84E0A NtProtectVirtualMemory,10_2_0AB84E0A
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742C70 NtFreeVirtualMemory,LdrInitializeThunk,11_2_04742C70
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742C60 NtCreateKey,LdrInitializeThunk,11_2_04742C60
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742CA0 NtQueryInformationToken,LdrInitializeThunk,11_2_04742CA0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742D10 NtMapViewOfSection,LdrInitializeThunk,11_2_04742D10
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742DF0 NtQuerySystemInformation,LdrInitializeThunk,11_2_04742DF0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742DD0 NtDelayExecution,LdrInitializeThunk,11_2_04742DD0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,11_2_04742EA0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742F30 NtCreateSection,LdrInitializeThunk,11_2_04742F30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742FE0 NtCreateFile,LdrInitializeThunk,11_2_04742FE0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742AD0 NtReadFile,LdrInitializeThunk,11_2_04742AD0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742B60 NtClose,LdrInitializeThunk,11_2_04742B60
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742BF0 NtAllocateVirtualMemory,LdrInitializeThunk,11_2_04742BF0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742BE0 NtQueryValueKey,LdrInitializeThunk,11_2_04742BE0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047435C0 NtCreateMutant,LdrInitializeThunk,11_2_047435C0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04744650 NtSuspendThread,11_2_04744650
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04744340 NtSetContextThread,11_2_04744340
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742C00 NtQueryInformationProcess,11_2_04742C00
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742CF0 NtOpenProcess,11_2_04742CF0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742CC0 NtQueryVirtualMemory,11_2_04742CC0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742D30 NtUnmapViewOfSection,11_2_04742D30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742D00 NtSetInformationFile,11_2_04742D00
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742DB0 NtEnumerateKey,11_2_04742DB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742E30 NtWriteVirtualMemory,11_2_04742E30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742EE0 NtQueueApcThread,11_2_04742EE0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742E80 NtReadVirtualMemory,11_2_04742E80
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742F60 NtCreateProcessEx,11_2_04742F60
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742FB0 NtResumeThread,11_2_04742FB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742FA0 NtQuerySection,11_2_04742FA0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742F90 NtProtectVirtualMemory,11_2_04742F90
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742AF0 NtWriteFile,11_2_04742AF0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742AB0 NtWaitForSingleObject,11_2_04742AB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742BA0 NtEnumerateValueKey,11_2_04742BA0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04742B80 NtQueryInformationFile,11_2_04742B80
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04743010 NtOpenDirectoryObject,11_2_04743010
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04743090 NtSetValueKey,11_2_04743090
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04743D70 NtOpenThread,11_2_04743D70
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04743D10 NtOpenProcessToken,11_2_04743D10
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047439B0 NtGetContextThread,11_2_047439B0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A3D0 NtReadFile,11_2_0083A3D0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A320 NtCreateFile,11_2_0083A320
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A450 NtClose,11_2_0083A450
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A500 NtAllocateVirtualMemory,11_2_0083A500
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A3CA NtReadFile,11_2_0083A3CA
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A31A NtCreateFile,11_2_0083A31A
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A4FA NtAllocateVirtualMemory,11_2_0083A4FA
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083A44B NtClose,11_2_0083A44B
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463A036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,11_2_0463A036
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04639BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,11_2_04639BAF
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463A042 NtQueryInformationProcess,11_2_0463A042
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04639BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_04639BB2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_01063E403_2_01063E40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_01066F923_2_01066F92
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_0106D87C3_2_0106D87C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075404A83_2_075404A8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075499DD3_2_075499DD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_0754B5003_2_0754B500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075434323_2_07543432
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075450783_2_07545078
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075450683_2_07545068
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075430083_2_07543008
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075459503_2_07545950
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_075438783_2_07543878
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_004010309_2_00401030
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041D8C49_2_0041D8C4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041E2159_2_0041E215
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041E2FB9_2_0041E2FB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041E38E9_2_0041E38E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041D5639_2_0041D563
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041EDEA9_2_0041EDEA
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041DD849_2_0041DD84
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00402D889_2_00402D88
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00402D909_2_00402D90
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00409E4B9_2_00409E4B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00409E509_2_00409E50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041DFE49_2_0041DFE4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00402FB09_2_00402FB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107A1189_2_0107A118
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010681589_2_01068158
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A01AA9_2_010A01AA
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010981CC9_2_010981CC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010720009_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD01009_2_00FD0100
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109A3529_2_0109A352
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A03E69_2_010A03E6
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE3F09_2_00FEE3F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010802749_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010602C09_2_010602C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A05919_2_010A0591
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010844209_2_01084420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010924469_2_01092446
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE05359_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108E4F69_2_0108E4F6
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFC6E09_2_00FFC6E0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010047509_2_01004750
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDC7C09_2_00FDC7C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE07709_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC68B89_2_00FC68B8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010AA9A69_2_010AA9A6
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE28409_2_00FE2840
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEA8409_2_00FEA840
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A09_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF69629_2_00FF6962
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E8F09_2_0100E8F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109AB409_2_0109AB40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA809_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01096BD79_2_01096BD7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0CF29_2_00FD0CF2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107CD1F9_2_0107CD1F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0C009_2_00FE0C00
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDADE09_2_00FDADE0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF8DBF9_2_00FF8DBF
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080CB59_2_01080CB5
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEAD009_2_00FEAD00
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01022F289_2_01022F28
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01000F309_2_01000F30
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01082F309_2_01082F30
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01054F409_2_01054F40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2E909_2_00FF2E90
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105EFA09_2_0105EFA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0E599_2_00FE0E59
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FECFE09_2_00FECFE0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109EE269_2_0109EE26
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD2FC89_2_00FD2FC8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109CE939_2_0109CE93
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109EEDB9_2_0109EEDB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE70C09_2_00FE70C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010AB16B9_2_010AB16B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0101516C9_2_0101516C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEB1B09_2_00FEB1B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCF1729_2_00FCF172
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108F0CC9_2_0108F0CC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010970E99_2_010970E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109F0E09_2_0109F0E0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109132D9_2_0109132D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFB2C09_2_00FFB2C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE52A09_2_00FE52A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0102739A9_2_0102739A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCD34C9_2_00FCD34C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010812ED9_2_010812ED
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010975719_2_01097571
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD14609_2_00FD1460
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107D5B09_2_0107D5B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109F43F9_2_0109F43F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109F7B09_2_0109F7B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010916CC9_2_010916CC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010759109_2_01075910
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE38E09_2_00FE38E0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104D8009_2_0104D800
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE99509_2_00FE9950
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFB9509_2_00FFB950
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109FB769_2_0109FB76
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01055BF09_2_01055BF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0101DBF99_2_0101DBF9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109FA499_2_0109FA49
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01097A469_2_01097A46
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01053A6C9_2_01053A6C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFFB809_2_00FFFB80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01025AA09_2_01025AA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107DAAC9_2_0107DAAC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01081AA39_2_01081AA3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108DAC69_2_0108DAC6
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01091D5A9_2_01091D5A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01097D739_2_01097D73
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01059C329_2_01059C32
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFFDC09_2_00FFFDC0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE3D409_2_00FE3D40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109FCF29_2_0109FCF2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109FF099_2_0109FF09
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE9EB09_2_00FE9EB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109FFB19_2_0109FFB1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE1F929_2_00FE1F92
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB8323210_2_0AB83232
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB7908210_2_0AB79082
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB8203610_2_0AB82036
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB865CD10_2_0AB865CD
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB7DB3210_2_0AB7DB32
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB7DB3010_2_0AB7DB30
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB8091210_2_0AB80912
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB7AD0210_2_0AB7AD02
          Source: C:\Windows\explorer.exeCode function: 10_2_1047D03610_2_1047D036
          Source: C:\Windows\explorer.exeCode function: 10_2_1047408210_2_10474082
          Source: C:\Windows\explorer.exeCode function: 10_2_10475D0210_2_10475D02
          Source: C:\Windows\explorer.exeCode function: 10_2_1047B91210_2_1047B912
          Source: C:\Windows\explorer.exeCode function: 10_2_104815CD10_2_104815CD
          Source: C:\Windows\explorer.exeCode function: 10_2_1047E23210_2_1047E232
          Source: C:\Windows\explorer.exeCode function: 10_2_10478B3210_2_10478B32
          Source: C:\Windows\explorer.exeCode function: 10_2_10478B3010_2_10478B30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7B63411_2_00B7B634
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C244611_2_047C2446
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047B442011_2_047B4420
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047BE4F611_2_047BE4F6
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471053511_2_04710535
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047D059111_2_047D0591
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0472C6E011_2_0472C6E0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471077011_2_04710770
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0473475011_2_04734750
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0470C7C011_2_0470C7C0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047A200011_2_047A2000
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0479815811_2_04798158
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047AA11811_2_047AA118
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0470010011_2_04700100
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C81CC11_2_047C81CC
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047D01AA11_2_047D01AA
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C41A211_2_047C41A2
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047B027411_2_047B0274
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047902C011_2_047902C0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CA35211_2_047CA352
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471E3F011_2_0471E3F0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047D03E611_2_047D03E6
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04710C0011_2_04710C00
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04700CF211_2_04700CF2
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047B0CB511_2_047B0CB5
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047ACD1F11_2_047ACD1F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471AD0011_2_0471AD00
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0470ADE011_2_0470ADE0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04728DBF11_2_04728DBF
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04710E5911_2_04710E59
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CEE2611_2_047CEE26
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CEEDB11_2_047CEEDB
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04722E9011_2_04722E90
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CCE9311_2_047CCE93
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04784F4011_2_04784F40
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04730F3011_2_04730F30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047B2F3011_2_047B2F30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04752F2811_2_04752F28
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471CFE011_2_0471CFE0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04702FC811_2_04702FC8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0478EFA011_2_0478EFA0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471A84011_2_0471A840
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471284011_2_04712840
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0473E8F011_2_0473E8F0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046F68B811_2_046F68B8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0472696211_2_04726962
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047129A011_2_047129A0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047DA9A611_2_047DA9A6
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0470EA8011_2_0470EA80
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CAB4011_2_047CAB40
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C6BD711_2_047C6BD7
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0470146011_2_04701460
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CF43F11_2_047CF43F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C757111_2_047C7571
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047D95C311_2_047D95C3
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047AD5B011_2_047AD5B0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0475563011_2_04755630
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C16CC11_2_047C16CC
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CF7B011_2_047CF7B0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C70E911_2_047C70E9
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CF0E011_2_047CF0E0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047170C011_2_047170C0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047BF0CC11_2_047BF0CC
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047DB16B11_2_047DB16B
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0474516C11_2_0474516C
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046FF17211_2_046FF172
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471B1B011_2_0471B1B0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047B12ED11_2_047B12ED
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0472B2C011_2_0472B2C0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047152A011_2_047152A0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046FD34C11_2_046FD34C
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C132D11_2_047C132D
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0475739A11_2_0475739A
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04789C3211_2_04789C32
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CFCF211_2_047CFCF2
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C7D7311_2_047C7D73
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C1D5A11_2_047C1D5A
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04713D4011_2_04713D40
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0472FDC011_2_0472FDC0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04719EB011_2_04719EB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CFF0911_2_047CFF09
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CFFB111_2_047CFFB1
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04711F9211_2_04711F92
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0477D80011_2_0477D800
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047138E011_2_047138E0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0471995011_2_04719950
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0472B95011_2_0472B950
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047A591011_2_047A5910
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04783A6C11_2_04783A6C
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CFA4911_2_047CFA49
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047C7A4611_2_047C7A46
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047BDAC611_2_047BDAC6
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04755AA011_2_04755AA0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047ADAAC11_2_047ADAAC
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047B1AA311_2_047B1AA3
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047CFB7611_2_047CFB76
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04785BF011_2_04785BF0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0474DBF911_2_0474DBF9
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0472FB8011_2_0472FB80
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083E2FB11_2_0083E2FB
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083E38E11_2_0083E38E
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083D56311_2_0083D563
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083D8C411_2_0083D8C4
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083DD8411_2_0083DD84
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00822D8811_2_00822D88
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00822D9011_2_00822D90
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00829E4B11_2_00829E4B
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00829E5011_2_00829E50
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00822FB011_2_00822FB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463A03611_2_0463A036
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04632D0211_2_04632D02
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463E5CD11_2_0463E5CD
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463108211_2_04631082
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463891211_2_04638912
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0463B23211_2_0463B232
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04635B3211_2_04635B32
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_04635B3011_2_04635B30
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: String function: 00FCB970 appears 280 times
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: String function: 0104EA12 appears 86 times
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: String function: 01015130 appears 58 times
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: String function: 01027E54 appears 102 times
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: String function: 0105F290 appears 105 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 0478F290 appears 105 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 04757E54 appears 111 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 046FB970 appears 280 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 0477EA12 appears 86 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 04745130 appears 58 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 00B7E951 appears 100 times
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1314350925.0000000002B55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000000.1272245590.000000000071C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameeRpW.exe> vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1318729470.00000000056C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1314350925.0000000002A65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1320464898.0000000007A70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1305433507.0000000000D7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387901442.0000000000F50000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCMSTP.EXE` vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1385090492.0000000000B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCMSTP.EXE` vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387947767.00000000010CD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exeBinary or memory string: OriginalFilenameeRpW.exe> vs #U00d6DEME DETAYLARI 170325.exe
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"Jump to behavior
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: #U00d6DEME DETAYLARI 170325.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: #U00d6DEME DETAYLARI 170325.exe PID: 5456, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: cmstp.exe PID: 772, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, UEvnE91ajng9iinvJL.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, UEvnE91ajng9iinvJL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, UEvnE91ajng9iinvJL.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, UEvnE91ajng9iinvJL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, UEvnE91ajng9iinvJL.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, UEvnE91ajng9iinvJL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, tD4qspbKx1BYOSnDvw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/6@5/1
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B78F05 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,InitiateSystemShutdownW,AdjustTokenPrivileges,CloseHandle,11_2_00B78F05
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\#U00d6DEME DETAYLARI 170325.exe.logJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1224:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6744:120:WilError_03
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dlswdwvg.joq.ps1Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeCommand line argument: kernel32.dll11_2_00B76052
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: #U00d6DEME DETAYLARI 170325.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: cmstp.exeString found in binary or memory: /k certutil.exe -f -enterprise -v -addstore Root "%s"
          Source: unknownProcess created: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmstp.exe "C:\Windows\SysWOW64\cmstp.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: wscinterop.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: wscapi.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: werconcpl.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: framedynos.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: wer.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: hcproviders.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: cmutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: eRpW.pdb source: #U00d6DEME DETAYLARI 170325.exe
          Source: Binary string: cmstp.pdbGCTL source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387901442.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1385090492.0000000000B47000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2552543639.0000000000B70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387947767.0000000000FA0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000003.1383808563.000000000437C000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000003.1388283213.0000000004527000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.000000000486E000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.00000000046D0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: #U00d6DEME DETAYLARI 170325.exe, #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387947767.0000000000FA0000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, cmstp.exe, 0000000B.00000003.1383808563.000000000437C000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000003.1388283213.0000000004527000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.000000000486E000.00000040.00001000.00020000.00000000.sdmp, cmstp.exe, 0000000B.00000002.2553417532.00000000046D0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: cmstp.pdb source: #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1387901442.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, #U00d6DEME DETAYLARI 170325.exe, 00000009.00000002.1385090492.0000000000B47000.00000004.00000020.00020000.00000000.sdmp, cmstp.exe, cmstp.exe, 0000000B.00000002.2552543639.0000000000B70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: eRpW.pdbSHA256;;Z source: #U00d6DEME DETAYLARI 170325.exe

          Data Obfuscation

          barindex
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, tD4qspbKx1BYOSnDvw.cs.Net Code: pUdPktAWaQ System.Reflection.Assembly.Load(byte[])
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, tD4qspbKx1BYOSnDvw.cs.Net Code: pUdPktAWaQ System.Reflection.Assembly.Load(byte[])
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, tD4qspbKx1BYOSnDvw.cs.Net Code: pUdPktAWaQ System.Reflection.Assembly.Load(byte[])
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: 0xCC750808 [Mon Sep 12 15:23:52 2078 UTC]
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_0106E610 push eax; retf 3_2_0106E631
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_0106EE80 pushfd ; iretd 3_2_0106EE81
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_01065DFF pushfd ; iretd 3_2_01065E29
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_07546C7E push eax; iretd 3_2_07546C7F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 3_2_07546AD8 push eax; iretd 3_2_07546AD9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_004061E4 push ss; iretd 9_2_004061E8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041D475 push eax; ret 9_2_0041D4C8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041D4C2 push eax; ret 9_2_0041D4C8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041D4CB push eax; ret 9_2_0041D532
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041D52C push eax; ret 9_2_0041D532
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0041DD84 push ecx; ret 9_2_0041DFE3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD09AD push ecx; mov dword ptr [esp], ecx9_2_00FD09B6
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB89024 push edx; iretd 10_2_0AB89025
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB869B5 push esp; retn 0000h10_2_0AB86AE7
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB86B1E push esp; retn 0000h10_2_0AB86B1F
          Source: C:\Windows\explorer.exeCode function: 10_2_0AB86B02 push esp; retn 0000h10_2_0AB86B03
          Source: C:\Windows\explorer.exeCode function: 10_2_10484024 push edx; iretd 10_2_10484025
          Source: C:\Windows\explorer.exeCode function: 10_2_104819B5 push esp; retn 0000h10_2_10481AE7
          Source: C:\Windows\explorer.exeCode function: 10_2_10481B02 push esp; retn 0000h10_2_10481B03
          Source: C:\Windows\explorer.exeCode function: 10_2_10481B1E push esp; retn 0000h10_2_10481B1F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B81A3D push ecx; ret 11_2_00B81A50
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046D27FA pushad ; ret 11_2_046D27F9
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046D225F pushad ; ret 11_2_046D27F9
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046D283D push eax; iretd 11_2_046D2858
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_047009AD push ecx; mov dword ptr [esp], ecx11_2_047009B6
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_046D135F push eax; iretd 11_2_046D1369
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083F0B2 push ss; retf 11_2_0083F0B4
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_008261E4 push ss; iretd 11_2_008261E8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083E2B6 push edi; iretd 11_2_0083E2B8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083D4C2 push eax; ret 11_2_0083D4C8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_0083D4CB push eax; ret 11_2_0083D532
          Source: #U00d6DEME DETAYLARI 170325.exeStatic PE information: section name: .text entropy: 7.720092212232572
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, MgRD5F0CSR3ChxmGPw.csHigh entropy of concatenated method names: 'pXQCJ6sg3L', 'JaOC7FBSut', 'a5hC1W9o6Y', 'S1EC04KjHh', 'iOGCIv8CDf', 'wnpCZgdFEt', 'WlFCpOO03c', 'EXZCU00cJU', 'xkLCcPQsut', 'anECOVj7j2'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, VNGmxyFSPOIO6PDsEQ.csHigh entropy of concatenated method names: 'u7JaoKseGd', 'mh0aCqwIRq', 'IgcarhPoxV', 'kJHrVhYDrQ', 'iSPrzFoBX0', 'eZvaYInTPK', 'Ptja3oQIjL', 'HOuaK4gTjY', 'cS9adSdMxB', 'r3BaPBDh2e'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, NSMLfC3PbG5twsnDMiK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HtngcoLhNc', 'JypgOgBc6V', 'DPqgepuArh', 'nOngghxSOu', 'CGjgSFIfRH', 'jDrgwiEEG1', 'oO7gvLlpav'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, tnvY0WKeW50lbO7QYX.csHigh entropy of concatenated method names: 'vfpk55ywS', 'JZpJ3y8n3', 'pnR7AGEK5', 'uPHsj6iUj', 'e8b0tcSgE', 'odfLwriSJ', 'i8PTHeeKixEch18y9x', 'RG5cRSkACes2kwcYhU', 'UVpUZlu91', 'x1kOJOYId'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, kTLO5sDbvsBSoTU9PN.csHigh entropy of concatenated method names: 'D61u1qNsV1', 'rCfu0VQFCV', 'lRcuQH5jIQ', 'cqdunrBf6X', 'eIkuX0eMs2', 'HMtuyBcP9s', 'O9XuFNhjTb', 'j6kuqrEYb5', 'wP5umHVKYh', 'pTvuHAJpfs'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, KSotuf33PGlfx7u0ED4.csHigh entropy of concatenated method names: 'CVIOVnGy72', 'WPOOzdKyyD', 'OXQeYWOE3N', 'm4Je3nR6JZ', 'syMeKTi7NA', 'db6edgwPOm', 'qFtePk6MVw', 'gKWelB0iQ2', 'QDneop3TNv', 'tEMeWO45eU'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, R9i4nCByS3qm1rI8IG.csHigh entropy of concatenated method names: 'NfZImlDS3j', 'KukI6WijUD', 'eU8IBaGhos', 'kBvI9WfRAi', 'qGqInLgJtR', 'mu1IfKZbmE', 'IFoIXFJ5KT', 'OscIyBHbNb', 'y0XIErG5vc', 't4ZIFQpE1b'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, UEvnE91ajng9iinvJL.csHigh entropy of concatenated method names: 'CgvWBxEyqw', 'MZ4W9M5w0v', 't0tWMnPGpP', 'xGJW8yHVRG', 'bwuWGqx7Td', 'bSCWAosnoX', 'OaoWR80liR', 'LyVWxreI0w', 'j3GWj7s8Pc', 'IylWVRtT9y'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, qPs3SdLurDE863qElv.csHigh entropy of concatenated method names: 'fI6iNITxDp', 'MbsisH3oVR', 'NyfCf3Kp4Z', 'd2gCXTUT8I', 'GcrCyWXnXp', 'm5SCEvJjdv', 'RvnCFO8Oqe', 'peoCqY607d', 'ETpChEq9Lo', 'Vv0CmG9Sha'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, lkM18OzYtoGT30nYvi.csHigh entropy of concatenated method names: 'TaRO7fpNxb', 'PksO1XsYAi', 'iiVO0hHZF2', 'nemOQIfoTa', 'xDOOnoCC10', 'VkSOXfDR16', 'IEsOyCm7sp', 'uAMOvkAcRk', 'w7KO2twMHJ', 'lwuO4RpZxE'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, tD4qspbKx1BYOSnDvw.csHigh entropy of concatenated method names: 'IRydlKkT20', 'WapdoWGkJv', 'xsqdWKT68a', 'qPLdCESZDJ', 'kYgdirWFgi', 'qo9drJK5eq', 'GZqdaKdBP9', 'wMddbv12aM', 'VkMdThxbcF', 'Pr0d5df9Jm'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, wTs4ZY8xu9yN6pANh7.csHigh entropy of concatenated method names: 'jPIp5h57VK', 'O6MptMXBAB', 'ToString', 'SJWpotwUKO', 'fvEpWmILKy', 'oiYpCIIBaP', 'GKRpiHIHdy', 'RZ1pr2yXYS', 'GL3parQcNO', 'T3ZpbgFvhR'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, gflhaORAA5y44kWvck.csHigh entropy of concatenated method names: 'A77cIK8iFQ', 'ktCcpolGtx', 'AiEccYPYwj', 'JuKceHdosm', 'QVmcSbAZ91', 'MducvQLNjP', 'Dispose', 'PAgUoCltC7', 'WXIUWaGkSH', 'xCUUCfGQnq'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, MB4KMJjykqUcLubKUk.csHigh entropy of concatenated method names: 'cVqcQbsJPM', 'OJScnanYaP', 'UBjcf85peG', 'G1McXObuMS', 'A1YcyKfLYE', 'UglcE2LBXd', 'pGVcFES8FC', 'O8ecqBoDTm', 'cPIchXWHES', 'FUYcmSHvqv'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, v64tpLhy33mL61UaAI.csHigh entropy of concatenated method names: 'iOya2dTpGU', 'vxJa4RloBd', 'vlpakAfWhI', 'YAdaJNh3W7', 'b9TaNJAXd3', 'IJUa7XIxo1', 'LmLas6hlP1', 'C9ea1L39cV', 'zvQa0ur3ZD', 'b0jaL426C7'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, PQ53gJWVd8IddGLpP8.csHigh entropy of concatenated method names: 'Dispose', 'ly43j4kWvc', 'JwbKnXPP4g', 'sMEbQJmEeX', 'zKY3V7X5Rq', 'eMD3zXsXBC', 'ProcessDialogKey', 'sbqKYB4KMJ', 'JkqK3UcLub', 'cUkKKRO210'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, irmIlg3YOoHouGGUlE5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AweOHTLD0Q', 'cGMO6QM7jk', 'lwdODjNgFv', 'ejhOBRKarT', 'qGtO9y9v51', 'oU7OMYsaOn', 'Gb4O8cU1qQ'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, C2B16ZAhZUhg5yRmrT.csHigh entropy of concatenated method names: 'bZ1pxhhNWT', 'CFypVUnHXU', 'Ge2UYBng3L', 'w4ZU3Y77Pi', 'AKmpHRp5Ut', 'DYEp6547jc', 'yFlpDAle87', 'kmkpB189Lt', 'eB7p9svVsy', 'xD6pMS97yS'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, rN64bOPEf9Hkr01Xum.csHigh entropy of concatenated method names: 'zGG3aEvnE9', 'jjn3bg9iin', 'LCS35R3Chx', 'NGP3twUPs3', 'bqE3IlvoIm', 'sKU3ZYiIJP', 'adxdvKcCPVNySLBrNK', 'c0XFLuhMCnouVtknOa', 'K4k33Xdmh4', 'Q9K3d6qpsp'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, fImcKUQYiIJP9FaN7S.csHigh entropy of concatenated method names: 'A9ZrlXsdM1', 'k2frWTRcJ4', 'T5ori19IDv', 'rvNraisHjR', 'uD7rb5UU5h', 'oxjiGjafJ0', 'KhTiAXPS8E', 'heoiRIm6X2', 'N3YixDYQw6', 'INOijlon98'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, WO210CVWKX4sdAkO93.csHigh entropy of concatenated method names: 'bYROC524wX', 'RENOiQZepX', 'BSqOrC24Ld', 'vXwOabsTkb', 'LwxOcsl1EA', 'vcROb4cdNx', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3c35f10.2.raw.unpack, SeYS0t3dd3TbwZJiPBF.csHigh entropy of concatenated method names: 'KjGeVmgVUN', 'Oq2ezeXEhK', 'UregYk0uGc', 'TZPpDOnzXUp9p0NoZbo', 'EmiNaJvUcma1Qp5nZBA', 'FkQ7DqvRv7jvAHG928W', 'GaCMbHvFhaIqwggMC5G', 'CfhhUGvaalyqV7fumI2'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, MgRD5F0CSR3ChxmGPw.csHigh entropy of concatenated method names: 'pXQCJ6sg3L', 'JaOC7FBSut', 'a5hC1W9o6Y', 'S1EC04KjHh', 'iOGCIv8CDf', 'wnpCZgdFEt', 'WlFCpOO03c', 'EXZCU00cJU', 'xkLCcPQsut', 'anECOVj7j2'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, VNGmxyFSPOIO6PDsEQ.csHigh entropy of concatenated method names: 'u7JaoKseGd', 'mh0aCqwIRq', 'IgcarhPoxV', 'kJHrVhYDrQ', 'iSPrzFoBX0', 'eZvaYInTPK', 'Ptja3oQIjL', 'HOuaK4gTjY', 'cS9adSdMxB', 'r3BaPBDh2e'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, NSMLfC3PbG5twsnDMiK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HtngcoLhNc', 'JypgOgBc6V', 'DPqgepuArh', 'nOngghxSOu', 'CGjgSFIfRH', 'jDrgwiEEG1', 'oO7gvLlpav'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, tnvY0WKeW50lbO7QYX.csHigh entropy of concatenated method names: 'vfpk55ywS', 'JZpJ3y8n3', 'pnR7AGEK5', 'uPHsj6iUj', 'e8b0tcSgE', 'odfLwriSJ', 'i8PTHeeKixEch18y9x', 'RG5cRSkACes2kwcYhU', 'UVpUZlu91', 'x1kOJOYId'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, kTLO5sDbvsBSoTU9PN.csHigh entropy of concatenated method names: 'D61u1qNsV1', 'rCfu0VQFCV', 'lRcuQH5jIQ', 'cqdunrBf6X', 'eIkuX0eMs2', 'HMtuyBcP9s', 'O9XuFNhjTb', 'j6kuqrEYb5', 'wP5umHVKYh', 'pTvuHAJpfs'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, KSotuf33PGlfx7u0ED4.csHigh entropy of concatenated method names: 'CVIOVnGy72', 'WPOOzdKyyD', 'OXQeYWOE3N', 'm4Je3nR6JZ', 'syMeKTi7NA', 'db6edgwPOm', 'qFtePk6MVw', 'gKWelB0iQ2', 'QDneop3TNv', 'tEMeWO45eU'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, R9i4nCByS3qm1rI8IG.csHigh entropy of concatenated method names: 'NfZImlDS3j', 'KukI6WijUD', 'eU8IBaGhos', 'kBvI9WfRAi', 'qGqInLgJtR', 'mu1IfKZbmE', 'IFoIXFJ5KT', 'OscIyBHbNb', 'y0XIErG5vc', 't4ZIFQpE1b'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, UEvnE91ajng9iinvJL.csHigh entropy of concatenated method names: 'CgvWBxEyqw', 'MZ4W9M5w0v', 't0tWMnPGpP', 'xGJW8yHVRG', 'bwuWGqx7Td', 'bSCWAosnoX', 'OaoWR80liR', 'LyVWxreI0w', 'j3GWj7s8Pc', 'IylWVRtT9y'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, qPs3SdLurDE863qElv.csHigh entropy of concatenated method names: 'fI6iNITxDp', 'MbsisH3oVR', 'NyfCf3Kp4Z', 'd2gCXTUT8I', 'GcrCyWXnXp', 'm5SCEvJjdv', 'RvnCFO8Oqe', 'peoCqY607d', 'ETpChEq9Lo', 'Vv0CmG9Sha'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, lkM18OzYtoGT30nYvi.csHigh entropy of concatenated method names: 'TaRO7fpNxb', 'PksO1XsYAi', 'iiVO0hHZF2', 'nemOQIfoTa', 'xDOOnoCC10', 'VkSOXfDR16', 'IEsOyCm7sp', 'uAMOvkAcRk', 'w7KO2twMHJ', 'lwuO4RpZxE'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, tD4qspbKx1BYOSnDvw.csHigh entropy of concatenated method names: 'IRydlKkT20', 'WapdoWGkJv', 'xsqdWKT68a', 'qPLdCESZDJ', 'kYgdirWFgi', 'qo9drJK5eq', 'GZqdaKdBP9', 'wMddbv12aM', 'VkMdThxbcF', 'Pr0d5df9Jm'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, wTs4ZY8xu9yN6pANh7.csHigh entropy of concatenated method names: 'jPIp5h57VK', 'O6MptMXBAB', 'ToString', 'SJWpotwUKO', 'fvEpWmILKy', 'oiYpCIIBaP', 'GKRpiHIHdy', 'RZ1pr2yXYS', 'GL3parQcNO', 'T3ZpbgFvhR'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, gflhaORAA5y44kWvck.csHigh entropy of concatenated method names: 'A77cIK8iFQ', 'ktCcpolGtx', 'AiEccYPYwj', 'JuKceHdosm', 'QVmcSbAZ91', 'MducvQLNjP', 'Dispose', 'PAgUoCltC7', 'WXIUWaGkSH', 'xCUUCfGQnq'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, MB4KMJjykqUcLubKUk.csHigh entropy of concatenated method names: 'cVqcQbsJPM', 'OJScnanYaP', 'UBjcf85peG', 'G1McXObuMS', 'A1YcyKfLYE', 'UglcE2LBXd', 'pGVcFES8FC', 'O8ecqBoDTm', 'cPIchXWHES', 'FUYcmSHvqv'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, v64tpLhy33mL61UaAI.csHigh entropy of concatenated method names: 'iOya2dTpGU', 'vxJa4RloBd', 'vlpakAfWhI', 'YAdaJNh3W7', 'b9TaNJAXd3', 'IJUa7XIxo1', 'LmLas6hlP1', 'C9ea1L39cV', 'zvQa0ur3ZD', 'b0jaL426C7'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, PQ53gJWVd8IddGLpP8.csHigh entropy of concatenated method names: 'Dispose', 'ly43j4kWvc', 'JwbKnXPP4g', 'sMEbQJmEeX', 'zKY3V7X5Rq', 'eMD3zXsXBC', 'ProcessDialogKey', 'sbqKYB4KMJ', 'JkqK3UcLub', 'cUkKKRO210'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, irmIlg3YOoHouGGUlE5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AweOHTLD0Q', 'cGMO6QM7jk', 'lwdODjNgFv', 'ejhOBRKarT', 'qGtO9y9v51', 'oU7OMYsaOn', 'Gb4O8cU1qQ'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, C2B16ZAhZUhg5yRmrT.csHigh entropy of concatenated method names: 'bZ1pxhhNWT', 'CFypVUnHXU', 'Ge2UYBng3L', 'w4ZU3Y77Pi', 'AKmpHRp5Ut', 'DYEp6547jc', 'yFlpDAle87', 'kmkpB189Lt', 'eB7p9svVsy', 'xD6pMS97yS'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, rN64bOPEf9Hkr01Xum.csHigh entropy of concatenated method names: 'zGG3aEvnE9', 'jjn3bg9iin', 'LCS35R3Chx', 'NGP3twUPs3', 'bqE3IlvoIm', 'sKU3ZYiIJP', 'adxdvKcCPVNySLBrNK', 'c0XFLuhMCnouVtknOa', 'K4k33Xdmh4', 'Q9K3d6qpsp'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, fImcKUQYiIJP9FaN7S.csHigh entropy of concatenated method names: 'A9ZrlXsdM1', 'k2frWTRcJ4', 'T5ori19IDv', 'rvNraisHjR', 'uD7rb5UU5h', 'oxjiGjafJ0', 'KhTiAXPS8E', 'heoiRIm6X2', 'N3YixDYQw6', 'INOijlon98'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, WO210CVWKX4sdAkO93.csHigh entropy of concatenated method names: 'bYROC524wX', 'RENOiQZepX', 'BSqOrC24Ld', 'vXwOabsTkb', 'LwxOcsl1EA', 'vcROb4cdNx', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.7a70000.4.raw.unpack, SeYS0t3dd3TbwZJiPBF.csHigh entropy of concatenated method names: 'KjGeVmgVUN', 'Oq2ezeXEhK', 'UregYk0uGc', 'TZPpDOnzXUp9p0NoZbo', 'EmiNaJvUcma1Qp5nZBA', 'FkQ7DqvRv7jvAHG928W', 'GaCMbHvFhaIqwggMC5G', 'CfhhUGvaalyqV7fumI2'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, MgRD5F0CSR3ChxmGPw.csHigh entropy of concatenated method names: 'pXQCJ6sg3L', 'JaOC7FBSut', 'a5hC1W9o6Y', 'S1EC04KjHh', 'iOGCIv8CDf', 'wnpCZgdFEt', 'WlFCpOO03c', 'EXZCU00cJU', 'xkLCcPQsut', 'anECOVj7j2'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, VNGmxyFSPOIO6PDsEQ.csHigh entropy of concatenated method names: 'u7JaoKseGd', 'mh0aCqwIRq', 'IgcarhPoxV', 'kJHrVhYDrQ', 'iSPrzFoBX0', 'eZvaYInTPK', 'Ptja3oQIjL', 'HOuaK4gTjY', 'cS9adSdMxB', 'r3BaPBDh2e'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, NSMLfC3PbG5twsnDMiK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HtngcoLhNc', 'JypgOgBc6V', 'DPqgepuArh', 'nOngghxSOu', 'CGjgSFIfRH', 'jDrgwiEEG1', 'oO7gvLlpav'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, tnvY0WKeW50lbO7QYX.csHigh entropy of concatenated method names: 'vfpk55ywS', 'JZpJ3y8n3', 'pnR7AGEK5', 'uPHsj6iUj', 'e8b0tcSgE', 'odfLwriSJ', 'i8PTHeeKixEch18y9x', 'RG5cRSkACes2kwcYhU', 'UVpUZlu91', 'x1kOJOYId'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, kTLO5sDbvsBSoTU9PN.csHigh entropy of concatenated method names: 'D61u1qNsV1', 'rCfu0VQFCV', 'lRcuQH5jIQ', 'cqdunrBf6X', 'eIkuX0eMs2', 'HMtuyBcP9s', 'O9XuFNhjTb', 'j6kuqrEYb5', 'wP5umHVKYh', 'pTvuHAJpfs'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, KSotuf33PGlfx7u0ED4.csHigh entropy of concatenated method names: 'CVIOVnGy72', 'WPOOzdKyyD', 'OXQeYWOE3N', 'm4Je3nR6JZ', 'syMeKTi7NA', 'db6edgwPOm', 'qFtePk6MVw', 'gKWelB0iQ2', 'QDneop3TNv', 'tEMeWO45eU'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, R9i4nCByS3qm1rI8IG.csHigh entropy of concatenated method names: 'NfZImlDS3j', 'KukI6WijUD', 'eU8IBaGhos', 'kBvI9WfRAi', 'qGqInLgJtR', 'mu1IfKZbmE', 'IFoIXFJ5KT', 'OscIyBHbNb', 'y0XIErG5vc', 't4ZIFQpE1b'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, UEvnE91ajng9iinvJL.csHigh entropy of concatenated method names: 'CgvWBxEyqw', 'MZ4W9M5w0v', 't0tWMnPGpP', 'xGJW8yHVRG', 'bwuWGqx7Td', 'bSCWAosnoX', 'OaoWR80liR', 'LyVWxreI0w', 'j3GWj7s8Pc', 'IylWVRtT9y'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, qPs3SdLurDE863qElv.csHigh entropy of concatenated method names: 'fI6iNITxDp', 'MbsisH3oVR', 'NyfCf3Kp4Z', 'd2gCXTUT8I', 'GcrCyWXnXp', 'm5SCEvJjdv', 'RvnCFO8Oqe', 'peoCqY607d', 'ETpChEq9Lo', 'Vv0CmG9Sha'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, lkM18OzYtoGT30nYvi.csHigh entropy of concatenated method names: 'TaRO7fpNxb', 'PksO1XsYAi', 'iiVO0hHZF2', 'nemOQIfoTa', 'xDOOnoCC10', 'VkSOXfDR16', 'IEsOyCm7sp', 'uAMOvkAcRk', 'w7KO2twMHJ', 'lwuO4RpZxE'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, tD4qspbKx1BYOSnDvw.csHigh entropy of concatenated method names: 'IRydlKkT20', 'WapdoWGkJv', 'xsqdWKT68a', 'qPLdCESZDJ', 'kYgdirWFgi', 'qo9drJK5eq', 'GZqdaKdBP9', 'wMddbv12aM', 'VkMdThxbcF', 'Pr0d5df9Jm'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, wTs4ZY8xu9yN6pANh7.csHigh entropy of concatenated method names: 'jPIp5h57VK', 'O6MptMXBAB', 'ToString', 'SJWpotwUKO', 'fvEpWmILKy', 'oiYpCIIBaP', 'GKRpiHIHdy', 'RZ1pr2yXYS', 'GL3parQcNO', 'T3ZpbgFvhR'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, gflhaORAA5y44kWvck.csHigh entropy of concatenated method names: 'A77cIK8iFQ', 'ktCcpolGtx', 'AiEccYPYwj', 'JuKceHdosm', 'QVmcSbAZ91', 'MducvQLNjP', 'Dispose', 'PAgUoCltC7', 'WXIUWaGkSH', 'xCUUCfGQnq'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, MB4KMJjykqUcLubKUk.csHigh entropy of concatenated method names: 'cVqcQbsJPM', 'OJScnanYaP', 'UBjcf85peG', 'G1McXObuMS', 'A1YcyKfLYE', 'UglcE2LBXd', 'pGVcFES8FC', 'O8ecqBoDTm', 'cPIchXWHES', 'FUYcmSHvqv'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, v64tpLhy33mL61UaAI.csHigh entropy of concatenated method names: 'iOya2dTpGU', 'vxJa4RloBd', 'vlpakAfWhI', 'YAdaJNh3W7', 'b9TaNJAXd3', 'IJUa7XIxo1', 'LmLas6hlP1', 'C9ea1L39cV', 'zvQa0ur3ZD', 'b0jaL426C7'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, PQ53gJWVd8IddGLpP8.csHigh entropy of concatenated method names: 'Dispose', 'ly43j4kWvc', 'JwbKnXPP4g', 'sMEbQJmEeX', 'zKY3V7X5Rq', 'eMD3zXsXBC', 'ProcessDialogKey', 'sbqKYB4KMJ', 'JkqK3UcLub', 'cUkKKRO210'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, irmIlg3YOoHouGGUlE5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AweOHTLD0Q', 'cGMO6QM7jk', 'lwdODjNgFv', 'ejhOBRKarT', 'qGtO9y9v51', 'oU7OMYsaOn', 'Gb4O8cU1qQ'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, C2B16ZAhZUhg5yRmrT.csHigh entropy of concatenated method names: 'bZ1pxhhNWT', 'CFypVUnHXU', 'Ge2UYBng3L', 'w4ZU3Y77Pi', 'AKmpHRp5Ut', 'DYEp6547jc', 'yFlpDAle87', 'kmkpB189Lt', 'eB7p9svVsy', 'xD6pMS97yS'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, rN64bOPEf9Hkr01Xum.csHigh entropy of concatenated method names: 'zGG3aEvnE9', 'jjn3bg9iin', 'LCS35R3Chx', 'NGP3twUPs3', 'bqE3IlvoIm', 'sKU3ZYiIJP', 'adxdvKcCPVNySLBrNK', 'c0XFLuhMCnouVtknOa', 'K4k33Xdmh4', 'Q9K3d6qpsp'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, fImcKUQYiIJP9FaN7S.csHigh entropy of concatenated method names: 'A9ZrlXsdM1', 'k2frWTRcJ4', 'T5ori19IDv', 'rvNraisHjR', 'uD7rb5UU5h', 'oxjiGjafJ0', 'KhTiAXPS8E', 'heoiRIm6X2', 'N3YixDYQw6', 'INOijlon98'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, WO210CVWKX4sdAkO93.csHigh entropy of concatenated method names: 'bYROC524wX', 'RENOiQZepX', 'BSqOrC24Ld', 'vXwOabsTkb', 'LwxOcsl1EA', 'vcROb4cdNx', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 3.2.#U00d6DEME DETAYLARI 170325.exe.3ca8730.1.raw.unpack, SeYS0t3dd3TbwZJiPBF.csHigh entropy of concatenated method names: 'KjGeVmgVUN', 'Oq2ezeXEhK', 'UregYk0uGc', 'TZPpDOnzXUp9p0NoZbo', 'EmiNaJvUcma1Qp5nZBA', 'FkQ7DqvRv7jvAHG928W', 'GaCMbHvFhaIqwggMC5G', 'CfhhUGvaalyqV7fumI2'
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7CAB4 GetSystemDirectoryW,memset,GetPrivateProfileStringW,RegOpenKeyExW,RegDeleteValueW,RegDeleteValueW,RegCloseKey,CmFree,11_2_00B7CAB4
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7A6EE GetPrivateProfileIntW,GetPrivateProfileIntW,GetPrivateProfileIntW,LoadStringW,LoadStringW,lstrlenW,lstrlenW,lstrlenW,LoadStringW,LoadStringW,MessageBoxW,LoadStringW,GetSystemDirectoryW,LoadStringW,MessageBoxW,11_2_00B7A6EE
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B75DEC memset,GetPrivateProfileStringW,GetModuleHandleA,GetProcAddress,GetCurrentProcess,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetProcAddress,GetProcAddress,FreeLibrary,11_2_00B75DEC
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7B634 LoadStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,GetPrivateProfileIntW,LoadStringW,MessageBoxW,CmFree,CmFree,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,LoadStringW,MessageBoxW,memset,memset,memset,RegOpenKeyExW,RegQueryValueExW,ExpandEnvironmentStringsW,lstrcmpiW,LoadStringW,MessageBoxW,RegCloseKey,LoadStringW,RegCreateKeyW,lstrlenW,RegSetValueExW,LoadStringW,MessageBoxW,RegCloseKey,RegCloseKey,memset,memset,CopyFileW,LoadStringW,MessageBoxW,GetOSVersion,GetOSMajorVersion,CmMalloc,memset,CmFree,CmMalloc,memset,GetLastError,CmFree,lstrlenW,CmMalloc,lstrlenW,CmFree,CmFree,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,LoadStringW,MessageBoxExW,CmMalloc,memset,CmFree,CmMalloc,11_2_00B7B634
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7D233 RegOpenKeyExW,GetPrivateProfileIntW,GetSystemDirectoryW,memset,GetPrivateProfileStringW,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,memset,RegEnumValueW,RegCloseKey,11_2_00B7D233
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7DD1E memset,memset,memset,memset,LoadStringW,GetPrivateProfileStringW,GetPrivateProfileStringW,RegCreateKeyExW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegCloseKey,lstrlenW,memset,lstrlenW,lstrlenW,RegSetValueExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,CmMalloc,CreateFileW,CloseHandle,CmFree,CmFree,GetPrivateProfileIntW,SetFileAttributesW,SHFileOperationW,RegCloseKey,RegCloseKey,11_2_00B7DD1E
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7A47F RegOpenKeyExW,RegQueryValueExW,GetPrivateProfileIntW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,11_2_00B7A47F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7A068 memset,memset,RegOpenKeyExW,RegQueryValueExW,lstrcmpiW,LoadStringW,MessageBoxW,RegCloseKey,GetPrivateProfileIntW,GetPrivateProfileIntW,LoadStringW,LoadStringW,LoadStringW,MessageBoxW,GetSystemDirectoryW,11_2_00B7A068

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x82 0x2E 0xEC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: #U00d6DEME DETAYLARI 170325.exe PID: 7948, type: MEMORYSTR
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI/Special instruction interceptor: Address: 7FF84F7AD324
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI/Special instruction interceptor: Address: 7FF84F7B0774
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI/Special instruction interceptor: Address: 7FF84F7B0154
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI/Special instruction interceptor: Address: 7FF84F7AD8A4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI/Special instruction interceptor: Address: 7FF84F7ADA44
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI/Special instruction interceptor: Address: 7FF84F7AD1E4
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7AD324
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7B0774
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7AD944
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7AD504
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7AD544
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7AD1E4
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7B0154
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7AD8A4
          Source: C:\Windows\SysWOW64\cmstp.exeAPI/Special instruction interceptor: Address: 7FF84F7ADA44
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeRDTSC instruction interceptor: First address: 409B6E second address: 409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 829904 second address: 82990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 829B6E second address: 829B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: 1060000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: 4A50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: 91D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: 7BF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: A1D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: B1D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00409AA0 rdtsc 9_2_00409AA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6135Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3611Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 4165Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 5755Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 876Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 868Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeWindow / User API: threadDelayed 785Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeWindow / User API: threadDelayed 9186Jump to behavior
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_10-13964
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeAPI coverage: 1.7 %
          Source: C:\Windows\SysWOW64\cmstp.exeAPI coverage: 1.5 %
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe TID: 8044Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6776Thread sleep time: -2767011611056431s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 3444Thread sleep count: 4165 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 3444Thread sleep time: -8330000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 3444Thread sleep count: 5755 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 3444Thread sleep time: -11510000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 6752Thread sleep count: 785 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 6752Thread sleep time: -1570000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 6752Thread sleep count: 9186 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 6752Thread sleep time: -18372000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Windows\SysWOW64\cmstp.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmstp.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7B3C4 memset,GetPrivateProfileStringW,FindFirstFileW,memset,FindNextFileW,11_2_00B7B3C4
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7894B memset,memset,memset,SHGetFolderPathW,memset,SHGetFolderPathW,CmFree,memset,FindFirstFileW,GetLastError,memset,memset,FindNextFileW,FindClose,11_2_00B7894B
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7F80E GetSystemInfo,GetVersionExW,11_2_00B7F80E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 0000000A.00000002.2558052578.0000000009866000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 0000000A.00000002.2558052578.0000000009716000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1305433507.0000000000DB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000A.00000002.2554340937.0000000003160000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
          Source: explorer.exe, 0000000A.00000002.2558052578.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2558052578.0000000009604000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.0000000009604000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.000000000976E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1324844652.0000000009716000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2558052578.0000000009716000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 0000000A.00000002.2554340937.0000000003160000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
          Source: explorer.exe, 0000000A.00000002.2558052578.0000000009866000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: #U00d6DEME DETAYLARI 170325.exe, 00000003.00000002.1305433507.0000000000DB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\|
          Source: explorer.exe, 0000000A.00000000.1312936026.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 0000000A.00000000.1312936026.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
          Source: explorer.exe, 0000000A.00000000.1324844652.000000000976E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 0000000A.00000000.1319193716.00000000071C7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00409AA0 rdtsc 9_2_00409AA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0040ACE0 LdrLoadDll,9_2_0040ACE0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov eax, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov ecx, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov eax, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov eax, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov ecx, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov eax, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov eax, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov ecx, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov eax, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E10E mov ecx, dword ptr fs:[00000030h]9_2_0107E10E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCC0F0 mov eax, dword ptr fs:[00000030h]9_2_00FCC0F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD80E9 mov eax, dword ptr fs:[00000030h]9_2_00FD80E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01090115 mov eax, dword ptr fs:[00000030h]9_2_01090115
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCA0E3 mov ecx, dword ptr fs:[00000030h]9_2_00FCA0E3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107A118 mov ecx, dword ptr fs:[00000030h]9_2_0107A118
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107A118 mov eax, dword ptr fs:[00000030h]9_2_0107A118
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107A118 mov eax, dword ptr fs:[00000030h]9_2_0107A118
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107A118 mov eax, dword ptr fs:[00000030h]9_2_0107A118
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01000124 mov eax, dword ptr fs:[00000030h]9_2_01000124
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01064144 mov eax, dword ptr fs:[00000030h]9_2_01064144
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01064144 mov eax, dword ptr fs:[00000030h]9_2_01064144
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01064144 mov ecx, dword ptr fs:[00000030h]9_2_01064144
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01064144 mov eax, dword ptr fs:[00000030h]9_2_01064144
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01064144 mov eax, dword ptr fs:[00000030h]9_2_01064144
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01068158 mov eax, dword ptr fs:[00000030h]9_2_01068158
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD208A mov eax, dword ptr fs:[00000030h]9_2_00FD208A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108C188 mov eax, dword ptr fs:[00000030h]9_2_0108C188
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108C188 mov eax, dword ptr fs:[00000030h]9_2_0108C188
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01010185 mov eax, dword ptr fs:[00000030h]9_2_01010185
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01074180 mov eax, dword ptr fs:[00000030h]9_2_01074180
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01074180 mov eax, dword ptr fs:[00000030h]9_2_01074180
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFC073 mov eax, dword ptr fs:[00000030h]9_2_00FFC073
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105019F mov eax, dword ptr fs:[00000030h]9_2_0105019F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105019F mov eax, dword ptr fs:[00000030h]9_2_0105019F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105019F mov eax, dword ptr fs:[00000030h]9_2_0105019F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105019F mov eax, dword ptr fs:[00000030h]9_2_0105019F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD2050 mov eax, dword ptr fs:[00000030h]9_2_00FD2050
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010961C3 mov eax, dword ptr fs:[00000030h]9_2_010961C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010961C3 mov eax, dword ptr fs:[00000030h]9_2_010961C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E1D0 mov eax, dword ptr fs:[00000030h]9_2_0104E1D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E1D0 mov eax, dword ptr fs:[00000030h]9_2_0104E1D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E1D0 mov ecx, dword ptr fs:[00000030h]9_2_0104E1D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E1D0 mov eax, dword ptr fs:[00000030h]9_2_0104E1D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E1D0 mov eax, dword ptr fs:[00000030h]9_2_0104E1D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCA020 mov eax, dword ptr fs:[00000030h]9_2_00FCA020
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCC020 mov eax, dword ptr fs:[00000030h]9_2_00FCC020
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE016 mov eax, dword ptr fs:[00000030h]9_2_00FEE016
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE016 mov eax, dword ptr fs:[00000030h]9_2_00FEE016
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE016 mov eax, dword ptr fs:[00000030h]9_2_00FEE016
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE016 mov eax, dword ptr fs:[00000030h]9_2_00FEE016
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A61E5 mov eax, dword ptr fs:[00000030h]9_2_010A61E5
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010001F8 mov eax, dword ptr fs:[00000030h]9_2_010001F8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01054000 mov ecx, dword ptr fs:[00000030h]9_2_01054000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01072000 mov eax, dword ptr fs:[00000030h]9_2_01072000
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01066030 mov eax, dword ptr fs:[00000030h]9_2_01066030
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056050 mov eax, dword ptr fs:[00000030h]9_2_01056050
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCA197 mov eax, dword ptr fs:[00000030h]9_2_00FCA197
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCA197 mov eax, dword ptr fs:[00000030h]9_2_00FCA197
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCA197 mov eax, dword ptr fs:[00000030h]9_2_00FCA197
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6154 mov eax, dword ptr fs:[00000030h]9_2_00FD6154
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6154 mov eax, dword ptr fs:[00000030h]9_2_00FD6154
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCC156 mov eax, dword ptr fs:[00000030h]9_2_00FCC156
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010680A8 mov eax, dword ptr fs:[00000030h]9_2_010680A8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010960B8 mov eax, dword ptr fs:[00000030h]9_2_010960B8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010960B8 mov ecx, dword ptr fs:[00000030h]9_2_010960B8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010520DE mov eax, dword ptr fs:[00000030h]9_2_010520DE
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010560E0 mov eax, dword ptr fs:[00000030h]9_2_010560E0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010120F0 mov ecx, dword ptr fs:[00000030h]9_2_010120F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A30B mov eax, dword ptr fs:[00000030h]9_2_0100A30B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A30B mov eax, dword ptr fs:[00000030h]9_2_0100A30B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A30B mov eax, dword ptr fs:[00000030h]9_2_0100A30B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE02E1 mov eax, dword ptr fs:[00000030h]9_2_00FE02E1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE02E1 mov eax, dword ptr fs:[00000030h]9_2_00FE02E1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE02E1 mov eax, dword ptr fs:[00000030h]9_2_00FE02E1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA2C3 mov eax, dword ptr fs:[00000030h]9_2_00FDA2C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA2C3 mov eax, dword ptr fs:[00000030h]9_2_00FDA2C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA2C3 mov eax, dword ptr fs:[00000030h]9_2_00FDA2C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA2C3 mov eax, dword ptr fs:[00000030h]9_2_00FDA2C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA2C3 mov eax, dword ptr fs:[00000030h]9_2_00FDA2C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01052349 mov eax, dword ptr fs:[00000030h]9_2_01052349
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01078350 mov ecx, dword ptr fs:[00000030h]9_2_01078350
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105035C mov eax, dword ptr fs:[00000030h]9_2_0105035C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105035C mov eax, dword ptr fs:[00000030h]9_2_0105035C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105035C mov eax, dword ptr fs:[00000030h]9_2_0105035C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105035C mov ecx, dword ptr fs:[00000030h]9_2_0105035C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105035C mov eax, dword ptr fs:[00000030h]9_2_0105035C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105035C mov eax, dword ptr fs:[00000030h]9_2_0105035C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109A352 mov eax, dword ptr fs:[00000030h]9_2_0109A352
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE02A0 mov eax, dword ptr fs:[00000030h]9_2_00FE02A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE02A0 mov eax, dword ptr fs:[00000030h]9_2_00FE02A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107437C mov eax, dword ptr fs:[00000030h]9_2_0107437C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC826B mov eax, dword ptr fs:[00000030h]9_2_00FC826B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4260 mov eax, dword ptr fs:[00000030h]9_2_00FD4260
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4260 mov eax, dword ptr fs:[00000030h]9_2_00FD4260
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4260 mov eax, dword ptr fs:[00000030h]9_2_00FD4260
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6259 mov eax, dword ptr fs:[00000030h]9_2_00FD6259
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCA250 mov eax, dword ptr fs:[00000030h]9_2_00FCA250
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108C3CD mov eax, dword ptr fs:[00000030h]9_2_0108C3CD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010563C0 mov eax, dword ptr fs:[00000030h]9_2_010563C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC823B mov eax, dword ptr fs:[00000030h]9_2_00FC823B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010743D4 mov eax, dword ptr fs:[00000030h]9_2_010743D4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010743D4 mov eax, dword ptr fs:[00000030h]9_2_010743D4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E3DB mov eax, dword ptr fs:[00000030h]9_2_0107E3DB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E3DB mov eax, dword ptr fs:[00000030h]9_2_0107E3DB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E3DB mov ecx, dword ptr fs:[00000030h]9_2_0107E3DB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107E3DB mov eax, dword ptr fs:[00000030h]9_2_0107E3DB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010063FF mov eax, dword ptr fs:[00000030h]9_2_010063FF
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE3F0 mov eax, dword ptr fs:[00000030h]9_2_00FEE3F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE3F0 mov eax, dword ptr fs:[00000030h]9_2_00FEE3F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE3F0 mov eax, dword ptr fs:[00000030h]9_2_00FEE3F0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE03E9 mov eax, dword ptr fs:[00000030h]9_2_00FE03E9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD83C0 mov eax, dword ptr fs:[00000030h]9_2_00FD83C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD83C0 mov eax, dword ptr fs:[00000030h]9_2_00FD83C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD83C0 mov eax, dword ptr fs:[00000030h]9_2_00FD83C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD83C0 mov eax, dword ptr fs:[00000030h]9_2_00FD83C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA3C0 mov eax, dword ptr fs:[00000030h]9_2_00FDA3C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA3C0 mov eax, dword ptr fs:[00000030h]9_2_00FDA3C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA3C0 mov eax, dword ptr fs:[00000030h]9_2_00FDA3C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA3C0 mov eax, dword ptr fs:[00000030h]9_2_00FDA3C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA3C0 mov eax, dword ptr fs:[00000030h]9_2_00FDA3C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA3C0 mov eax, dword ptr fs:[00000030h]9_2_00FDA3C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01058243 mov eax, dword ptr fs:[00000030h]9_2_01058243
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01058243 mov ecx, dword ptr fs:[00000030h]9_2_01058243
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108A250 mov eax, dword ptr fs:[00000030h]9_2_0108A250
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108A250 mov eax, dword ptr fs:[00000030h]9_2_0108A250
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC8397 mov eax, dword ptr fs:[00000030h]9_2_00FC8397
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC8397 mov eax, dword ptr fs:[00000030h]9_2_00FC8397
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC8397 mov eax, dword ptr fs:[00000030h]9_2_00FC8397
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF438F mov eax, dword ptr fs:[00000030h]9_2_00FF438F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF438F mov eax, dword ptr fs:[00000030h]9_2_00FF438F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCE388 mov eax, dword ptr fs:[00000030h]9_2_00FCE388
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCE388 mov eax, dword ptr fs:[00000030h]9_2_00FCE388
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCE388 mov eax, dword ptr fs:[00000030h]9_2_00FCE388
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01080274 mov eax, dword ptr fs:[00000030h]9_2_01080274
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E284 mov eax, dword ptr fs:[00000030h]9_2_0100E284
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E284 mov eax, dword ptr fs:[00000030h]9_2_0100E284
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01050283 mov eax, dword ptr fs:[00000030h]9_2_01050283
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01050283 mov eax, dword ptr fs:[00000030h]9_2_01050283
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01050283 mov eax, dword ptr fs:[00000030h]9_2_01050283
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010662A0 mov eax, dword ptr fs:[00000030h]9_2_010662A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010662A0 mov ecx, dword ptr fs:[00000030h]9_2_010662A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010662A0 mov eax, dword ptr fs:[00000030h]9_2_010662A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010662A0 mov eax, dword ptr fs:[00000030h]9_2_010662A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010662A0 mov eax, dword ptr fs:[00000030h]9_2_010662A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010662A0 mov eax, dword ptr fs:[00000030h]9_2_010662A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCC310 mov ecx, dword ptr fs:[00000030h]9_2_00FCC310
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF0310 mov ecx, dword ptr fs:[00000030h]9_2_00FF0310
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01066500 mov eax, dword ptr fs:[00000030h]9_2_01066500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4500 mov eax, dword ptr fs:[00000030h]9_2_010A4500
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD04E5 mov ecx, dword ptr fs:[00000030h]9_2_00FD04E5
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD64AB mov eax, dword ptr fs:[00000030h]9_2_00FD64AB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100656A mov eax, dword ptr fs:[00000030h]9_2_0100656A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100656A mov eax, dword ptr fs:[00000030h]9_2_0100656A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100656A mov eax, dword ptr fs:[00000030h]9_2_0100656A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01004588 mov eax, dword ptr fs:[00000030h]9_2_01004588
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFA470 mov eax, dword ptr fs:[00000030h]9_2_00FFA470
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFA470 mov eax, dword ptr fs:[00000030h]9_2_00FFA470
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFA470 mov eax, dword ptr fs:[00000030h]9_2_00FFA470
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E59C mov eax, dword ptr fs:[00000030h]9_2_0100E59C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC645D mov eax, dword ptr fs:[00000030h]9_2_00FC645D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010505A7 mov eax, dword ptr fs:[00000030h]9_2_010505A7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010505A7 mov eax, dword ptr fs:[00000030h]9_2_010505A7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010505A7 mov eax, dword ptr fs:[00000030h]9_2_010505A7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF245A mov eax, dword ptr fs:[00000030h]9_2_00FF245A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E5CF mov eax, dword ptr fs:[00000030h]9_2_0100E5CF
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E5CF mov eax, dword ptr fs:[00000030h]9_2_0100E5CF
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A5D0 mov eax, dword ptr fs:[00000030h]9_2_0100A5D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A5D0 mov eax, dword ptr fs:[00000030h]9_2_0100A5D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCC427 mov eax, dword ptr fs:[00000030h]9_2_00FCC427
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCE420 mov eax, dword ptr fs:[00000030h]9_2_00FCE420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCE420 mov eax, dword ptr fs:[00000030h]9_2_00FCE420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCE420 mov eax, dword ptr fs:[00000030h]9_2_00FCE420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C5ED mov eax, dword ptr fs:[00000030h]9_2_0100C5ED
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C5ED mov eax, dword ptr fs:[00000030h]9_2_0100C5ED
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01008402 mov eax, dword ptr fs:[00000030h]9_2_01008402
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01008402 mov eax, dword ptr fs:[00000030h]9_2_01008402
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01008402 mov eax, dword ptr fs:[00000030h]9_2_01008402
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE5E7 mov eax, dword ptr fs:[00000030h]9_2_00FFE5E7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD25E0 mov eax, dword ptr fs:[00000030h]9_2_00FD25E0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01056420 mov eax, dword ptr fs:[00000030h]9_2_01056420
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD65D0 mov eax, dword ptr fs:[00000030h]9_2_00FD65D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A430 mov eax, dword ptr fs:[00000030h]9_2_0100A430
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100E443 mov eax, dword ptr fs:[00000030h]9_2_0100E443
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF45B1 mov eax, dword ptr fs:[00000030h]9_2_00FF45B1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF45B1 mov eax, dword ptr fs:[00000030h]9_2_00FF45B1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108A456 mov eax, dword ptr fs:[00000030h]9_2_0108A456
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105C460 mov ecx, dword ptr fs:[00000030h]9_2_0105C460
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD2582 mov eax, dword ptr fs:[00000030h]9_2_00FD2582
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD2582 mov ecx, dword ptr fs:[00000030h]9_2_00FD2582
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0108A49A mov eax, dword ptr fs:[00000030h]9_2_0108A49A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8550 mov eax, dword ptr fs:[00000030h]9_2_00FD8550
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8550 mov eax, dword ptr fs:[00000030h]9_2_00FD8550
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010044B0 mov ecx, dword ptr fs:[00000030h]9_2_010044B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105A4B0 mov eax, dword ptr fs:[00000030h]9_2_0105A4B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE53E mov eax, dword ptr fs:[00000030h]9_2_00FFE53E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE53E mov eax, dword ptr fs:[00000030h]9_2_00FFE53E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE53E mov eax, dword ptr fs:[00000030h]9_2_00FFE53E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE53E mov eax, dword ptr fs:[00000030h]9_2_00FFE53E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE53E mov eax, dword ptr fs:[00000030h]9_2_00FFE53E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0535 mov eax, dword ptr fs:[00000030h]9_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0535 mov eax, dword ptr fs:[00000030h]9_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0535 mov eax, dword ptr fs:[00000030h]9_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0535 mov eax, dword ptr fs:[00000030h]9_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0535 mov eax, dword ptr fs:[00000030h]9_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0535 mov eax, dword ptr fs:[00000030h]9_2_00FE0535
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C700 mov eax, dword ptr fs:[00000030h]9_2_0100C700
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01000710 mov eax, dword ptr fs:[00000030h]9_2_01000710
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C720 mov eax, dword ptr fs:[00000030h]9_2_0100C720
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C720 mov eax, dword ptr fs:[00000030h]9_2_0100C720
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104C730 mov eax, dword ptr fs:[00000030h]9_2_0104C730
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100273C mov eax, dword ptr fs:[00000030h]9_2_0100273C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100273C mov ecx, dword ptr fs:[00000030h]9_2_0100273C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100273C mov eax, dword ptr fs:[00000030h]9_2_0100273C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100674D mov esi, dword ptr fs:[00000030h]9_2_0100674D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100674D mov eax, dword ptr fs:[00000030h]9_2_0100674D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100674D mov eax, dword ptr fs:[00000030h]9_2_0100674D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01054755 mov eax, dword ptr fs:[00000030h]9_2_01054755
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012750 mov eax, dword ptr fs:[00000030h]9_2_01012750
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012750 mov eax, dword ptr fs:[00000030h]9_2_01012750
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105E75D mov eax, dword ptr fs:[00000030h]9_2_0105E75D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4690 mov eax, dword ptr fs:[00000030h]9_2_00FD4690
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4690 mov eax, dword ptr fs:[00000030h]9_2_00FD4690
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107678E mov eax, dword ptr fs:[00000030h]9_2_0107678E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010847A0 mov eax, dword ptr fs:[00000030h]9_2_010847A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEC640 mov eax, dword ptr fs:[00000030h]9_2_00FEC640
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010507C3 mov eax, dword ptr fs:[00000030h]9_2_010507C3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD262C mov eax, dword ptr fs:[00000030h]9_2_00FD262C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FEE627 mov eax, dword ptr fs:[00000030h]9_2_00FEE627
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105E7E1 mov eax, dword ptr fs:[00000030h]9_2_0105E7E1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE260B mov eax, dword ptr fs:[00000030h]9_2_00FE260B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD47FB mov eax, dword ptr fs:[00000030h]9_2_00FD47FB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD47FB mov eax, dword ptr fs:[00000030h]9_2_00FD47FB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E609 mov eax, dword ptr fs:[00000030h]9_2_0104E609
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF27ED mov eax, dword ptr fs:[00000030h]9_2_00FF27ED
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF27ED mov eax, dword ptr fs:[00000030h]9_2_00FF27ED
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF27ED mov eax, dword ptr fs:[00000030h]9_2_00FF27ED
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01012619 mov eax, dword ptr fs:[00000030h]9_2_01012619
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01006620 mov eax, dword ptr fs:[00000030h]9_2_01006620
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01008620 mov eax, dword ptr fs:[00000030h]9_2_01008620
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDC7C0 mov eax, dword ptr fs:[00000030h]9_2_00FDC7C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD07AF mov eax, dword ptr fs:[00000030h]9_2_00FD07AF
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A660 mov eax, dword ptr fs:[00000030h]9_2_0100A660
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A660 mov eax, dword ptr fs:[00000030h]9_2_0100A660
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109866E mov eax, dword ptr fs:[00000030h]9_2_0109866E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109866E mov eax, dword ptr fs:[00000030h]9_2_0109866E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01002674 mov eax, dword ptr fs:[00000030h]9_2_01002674
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8770 mov eax, dword ptr fs:[00000030h]9_2_00FD8770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0770 mov eax, dword ptr fs:[00000030h]9_2_00FE0770
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C6A6 mov eax, dword ptr fs:[00000030h]9_2_0100C6A6
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0750 mov eax, dword ptr fs:[00000030h]9_2_00FD0750
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010066B0 mov eax, dword ptr fs:[00000030h]9_2_010066B0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A6C7 mov ebx, dword ptr fs:[00000030h]9_2_0100A6C7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A6C7 mov eax, dword ptr fs:[00000030h]9_2_0100A6C7
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0710 mov eax, dword ptr fs:[00000030h]9_2_00FD0710
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010506F1 mov eax, dword ptr fs:[00000030h]9_2_010506F1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010506F1 mov eax, dword ptr fs:[00000030h]9_2_010506F1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E6F2 mov eax, dword ptr fs:[00000030h]9_2_0104E6F2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E6F2 mov eax, dword ptr fs:[00000030h]9_2_0104E6F2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E6F2 mov eax, dword ptr fs:[00000030h]9_2_0104E6F2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E6F2 mov eax, dword ptr fs:[00000030h]9_2_0104E6F2
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E908 mov eax, dword ptr fs:[00000030h]9_2_0104E908
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104E908 mov eax, dword ptr fs:[00000030h]9_2_0104E908
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105C912 mov eax, dword ptr fs:[00000030h]9_2_0105C912
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0106892B mov eax, dword ptr fs:[00000030h]9_2_0106892B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105892A mov eax, dword ptr fs:[00000030h]9_2_0105892A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFE8C0 mov eax, dword ptr fs:[00000030h]9_2_00FFE8C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01050946 mov eax, dword ptr fs:[00000030h]9_2_01050946
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0101096E mov eax, dword ptr fs:[00000030h]9_2_0101096E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0101096E mov edx, dword ptr fs:[00000030h]9_2_0101096E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0101096E mov eax, dword ptr fs:[00000030h]9_2_0101096E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105C97C mov eax, dword ptr fs:[00000030h]9_2_0105C97C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0887 mov eax, dword ptr fs:[00000030h]9_2_00FD0887
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01074978 mov eax, dword ptr fs:[00000030h]9_2_01074978
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01074978 mov eax, dword ptr fs:[00000030h]9_2_01074978
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4859 mov eax, dword ptr fs:[00000030h]9_2_00FD4859
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD4859 mov eax, dword ptr fs:[00000030h]9_2_00FD4859
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010589B3 mov esi, dword ptr fs:[00000030h]9_2_010589B3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010589B3 mov eax, dword ptr fs:[00000030h]9_2_010589B3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010589B3 mov eax, dword ptr fs:[00000030h]9_2_010589B3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE2840 mov ecx, dword ptr fs:[00000030h]9_2_00FE2840
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010669C0 mov eax, dword ptr fs:[00000030h]9_2_010669C0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2835 mov eax, dword ptr fs:[00000030h]9_2_00FF2835
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2835 mov eax, dword ptr fs:[00000030h]9_2_00FF2835
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2835 mov eax, dword ptr fs:[00000030h]9_2_00FF2835
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2835 mov ecx, dword ptr fs:[00000030h]9_2_00FF2835
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2835 mov eax, dword ptr fs:[00000030h]9_2_00FF2835
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF2835 mov eax, dword ptr fs:[00000030h]9_2_00FF2835
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010049D0 mov eax, dword ptr fs:[00000030h]9_2_010049D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109A9D3 mov eax, dword ptr fs:[00000030h]9_2_0109A9D3
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105E9E0 mov eax, dword ptr fs:[00000030h]9_2_0105E9E0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010029F9 mov eax, dword ptr fs:[00000030h]9_2_010029F9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010029F9 mov eax, dword ptr fs:[00000030h]9_2_010029F9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105C810 mov eax, dword ptr fs:[00000030h]9_2_0105C810
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA9D0 mov eax, dword ptr fs:[00000030h]9_2_00FDA9D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA9D0 mov eax, dword ptr fs:[00000030h]9_2_00FDA9D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA9D0 mov eax, dword ptr fs:[00000030h]9_2_00FDA9D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA9D0 mov eax, dword ptr fs:[00000030h]9_2_00FDA9D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA9D0 mov eax, dword ptr fs:[00000030h]9_2_00FDA9D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDA9D0 mov eax, dword ptr fs:[00000030h]9_2_00FDA9D0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100A830 mov eax, dword ptr fs:[00000030h]9_2_0100A830
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107483A mov eax, dword ptr fs:[00000030h]9_2_0107483A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107483A mov eax, dword ptr fs:[00000030h]9_2_0107483A
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD09AD mov eax, dword ptr fs:[00000030h]9_2_00FD09AD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD09AD mov eax, dword ptr fs:[00000030h]9_2_00FD09AD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01000854 mov eax, dword ptr fs:[00000030h]9_2_01000854
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE29A0 mov eax, dword ptr fs:[00000030h]9_2_00FE29A0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01066870 mov eax, dword ptr fs:[00000030h]9_2_01066870
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01066870 mov eax, dword ptr fs:[00000030h]9_2_01066870
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105E872 mov eax, dword ptr fs:[00000030h]9_2_0105E872
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105E872 mov eax, dword ptr fs:[00000030h]9_2_0105E872
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105C89D mov eax, dword ptr fs:[00000030h]9_2_0105C89D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF6962 mov eax, dword ptr fs:[00000030h]9_2_00FF6962
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF6962 mov eax, dword ptr fs:[00000030h]9_2_00FF6962
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF6962 mov eax, dword ptr fs:[00000030h]9_2_00FF6962
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC8918 mov eax, dword ptr fs:[00000030h]9_2_00FC8918
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FC8918 mov eax, dword ptr fs:[00000030h]9_2_00FC8918
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109A8E4 mov eax, dword ptr fs:[00000030h]9_2_0109A8E4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C8F9 mov eax, dword ptr fs:[00000030h]9_2_0100C8F9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100C8F9 mov eax, dword ptr fs:[00000030h]9_2_0100C8F9
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104EB1D mov eax, dword ptr fs:[00000030h]9_2_0104EB1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01098B28 mov eax, dword ptr fs:[00000030h]9_2_01098B28
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01098B28 mov eax, dword ptr fs:[00000030h]9_2_01098B28
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0AD0 mov eax, dword ptr fs:[00000030h]9_2_00FD0AD0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01084B4B mov eax, dword ptr fs:[00000030h]9_2_01084B4B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01084B4B mov eax, dword ptr fs:[00000030h]9_2_01084B4B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01078B42 mov eax, dword ptr fs:[00000030h]9_2_01078B42
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01066B40 mov eax, dword ptr fs:[00000030h]9_2_01066B40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01066B40 mov eax, dword ptr fs:[00000030h]9_2_01066B40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0109AB40 mov eax, dword ptr fs:[00000030h]9_2_0109AB40
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107EB50 mov eax, dword ptr fs:[00000030h]9_2_0107EB50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8AA0 mov eax, dword ptr fs:[00000030h]9_2_00FD8AA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8AA0 mov eax, dword ptr fs:[00000030h]9_2_00FD8AA0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FDEA80 mov eax, dword ptr fs:[00000030h]9_2_00FDEA80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0A5B mov eax, dword ptr fs:[00000030h]9_2_00FE0A5B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0A5B mov eax, dword ptr fs:[00000030h]9_2_00FE0A5B
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD6A50 mov eax, dword ptr fs:[00000030h]9_2_00FD6A50
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01084BB0 mov eax, dword ptr fs:[00000030h]9_2_01084BB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01084BB0 mov eax, dword ptr fs:[00000030h]9_2_01084BB0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF4A35 mov eax, dword ptr fs:[00000030h]9_2_00FF4A35
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF4A35 mov eax, dword ptr fs:[00000030h]9_2_00FF4A35
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFEA2E mov eax, dword ptr fs:[00000030h]9_2_00FFEA2E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107EBD0 mov eax, dword ptr fs:[00000030h]9_2_0107EBD0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105CBF0 mov eax, dword ptr fs:[00000030h]9_2_0105CBF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFEBFC mov eax, dword ptr fs:[00000030h]9_2_00FFEBFC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8BF0 mov eax, dword ptr fs:[00000030h]9_2_00FD8BF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8BF0 mov eax, dword ptr fs:[00000030h]9_2_00FD8BF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD8BF0 mov eax, dword ptr fs:[00000030h]9_2_00FD8BF0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0105CA11 mov eax, dword ptr fs:[00000030h]9_2_0105CA11
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100CA24 mov eax, dword ptr fs:[00000030h]9_2_0100CA24
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0BCD mov eax, dword ptr fs:[00000030h]9_2_00FD0BCD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0BCD mov eax, dword ptr fs:[00000030h]9_2_00FD0BCD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FD0BCD mov eax, dword ptr fs:[00000030h]9_2_00FD0BCD
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF0BCB mov eax, dword ptr fs:[00000030h]9_2_00FF0BCB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF0BCB mov eax, dword ptr fs:[00000030h]9_2_00FF0BCB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF0BCB mov eax, dword ptr fs:[00000030h]9_2_00FF0BCB
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100CA38 mov eax, dword ptr fs:[00000030h]9_2_0100CA38
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0BBE mov eax, dword ptr fs:[00000030h]9_2_00FE0BBE
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FE0BBE mov eax, dword ptr fs:[00000030h]9_2_00FE0BBE
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0107EA60 mov eax, dword ptr fs:[00000030h]9_2_0107EA60
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100CA6F mov eax, dword ptr fs:[00000030h]9_2_0100CA6F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100CA6F mov eax, dword ptr fs:[00000030h]9_2_0100CA6F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100CA6F mov eax, dword ptr fs:[00000030h]9_2_0100CA6F
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104CA72 mov eax, dword ptr fs:[00000030h]9_2_0104CA72
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0104CA72 mov eax, dword ptr fs:[00000030h]9_2_0104CA72
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCCB7E mov eax, dword ptr fs:[00000030h]9_2_00FCCB7E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_010A4A80 mov eax, dword ptr fs:[00000030h]9_2_010A4A80
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01008A90 mov edx, dword ptr fs:[00000030h]9_2_01008A90
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01026AA4 mov eax, dword ptr fs:[00000030h]9_2_01026AA4
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01026ACC mov eax, dword ptr fs:[00000030h]9_2_01026ACC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01026ACC mov eax, dword ptr fs:[00000030h]9_2_01026ACC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01026ACC mov eax, dword ptr fs:[00000030h]9_2_01026ACC
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01004AD0 mov eax, dword ptr fs:[00000030h]9_2_01004AD0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01004AD0 mov eax, dword ptr fs:[00000030h]9_2_01004AD0
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFEB20 mov eax, dword ptr fs:[00000030h]9_2_00FFEB20
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FFEB20 mov eax, dword ptr fs:[00000030h]9_2_00FFEB20
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100AAEE mov eax, dword ptr fs:[00000030h]9_2_0100AAEE
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_0100AAEE mov eax, dword ptr fs:[00000030h]9_2_0100AAEE
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01088D10 mov eax, dword ptr fs:[00000030h]9_2_01088D10
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01088D10 mov eax, dword ptr fs:[00000030h]9_2_01088D10
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01004D1D mov eax, dword ptr fs:[00000030h]9_2_01004D1D
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_01058D20 mov eax, dword ptr fs:[00000030h]9_2_01058D20
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FCCCC8 mov eax, dword ptr fs:[00000030h]9_2_00FCCCC8
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF8CB1 mov eax, dword ptr fs:[00000030h]9_2_00FF8CB1
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeCode function: 9_2_00FF8CB1 mov eax, dword ptr fs:[00000030h]9_2_00FF8CB1
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B80FE7 GetProcessHeap,HeapAlloc,GetLastError,GetProcessHeap,HeapFree,11_2_00B80FE7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B814D0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00B814D0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B81720 SetUnhandledExceptionFilter,11_2_00B81720
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 13.248.169.48 80Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeNtQueueApcThread: Indirect: 0xDCA4F2Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeNtClose: Indirect: 0xDCA56C
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeMemory written: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeThread register set: target process: 3084Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeThread register set: target process: 3084Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeSection unmapped: C:\Windows\SysWOW64\cmstp.exe base address: B70000Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeProcess created: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B78DB2 AllocateAndInitializeSid,GetModuleHandleA,LoadLibraryExA,GetProcAddress,FreeSid,FreeLibrary,11_2_00B78DB2
          Source: explorer.exe, 0000000A.00000000.1316169278.00000000011A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.2553471704.00000000011A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 0000000A.00000000.1318890344.0000000004630000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1316169278.00000000011A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.2553471704.00000000011A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 0000000A.00000000.1316169278.00000000011A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.2553471704.00000000011A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000A.00000002.2552370081.0000000000A20000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000A.00000000.1312936026.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000A.00000000.1316169278.00000000011A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000A.00000002.2553471704.00000000011A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 0000000A.00000000.1324844652.0000000009895000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000A.00000002.2558052578.0000000009866000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd*
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeQueries volume information: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B81945 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,11_2_00B81945
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 11_2_00B7F80E GetSystemInfo,GetVersionExW,11_2_00B7F80E
          Source: C:\Users\user\Desktop\#U00d6DEME DETAYLARI 170325.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.#U00d6DEME DETAYLARI 170325.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000B.00000002.2553090331.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2551980400.0000000000820000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1382937942.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.2552999766.0000000004530000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1315912461.0000000003A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          11
          Disable or Modify Tools
          1
          Credential API Hooking
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Shared Modules
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory2
          File and Directory Discovery
          Remote Desktop Protocol1
          Credential API Hooking
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts3
          Command and Scripting Interpreter
          Logon Script (Windows)1
          Access Token Manipulation
          1
          Abuse Elevation Control Mechanism
          Security Account Manager235
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook612
          Process Injection
          4
          Obfuscated Files or Information
          NTDS241
          Security Software Discovery
          Distributed Component Object ModelInput Capture12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
          Software Packing
          LSA Secrets2
          Process Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain Credentials51
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Rootkit
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Masquerading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron51
          Virtualization/Sandbox Evasion
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
          Access Token Manipulation
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task612
          Process Injection
          KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640442 Sample: #U00d6DEME DETAYLARI 170325.exe Startdate: 17/03/2025 Architecture: WINDOWS Score: 100 32 www.riminal-mischief.cfd 2->32 34 www.rg-txtagstorefrontfze.world 2->34 36 3 other IPs or domains 2->36 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 11 other signatures 2->46 11 #U00d6DEME DETAYLARI 170325.exe 4 2->11         started        signatures3 process4 signatures5 58 Adds a directory exclusion to Windows Defender 11->58 60 Injects a PE file into a foreign processes 11->60 14 #U00d6DEME DETAYLARI 170325.exe 11->14         started        17 powershell.exe 23 11->17         started        process6 signatures7 62 Modifies the context of a thread in another process (thread injection) 14->62 64 Maps a DLL or memory area into another process 14->64 66 Sample uses process hollowing technique 14->66 70 2 other signatures 14->70 19 explorer.exe 39 7 14->19 injected 68 Loading BitLocker PowerShell Module 17->68 23 conhost.exe 17->23         started        process8 dnsIp9 38 www.camtech.online 13.248.169.48, 49733, 80 AMAZON-02US United States 19->38 48 System process connects to network (likely due to code injection or exploit) 19->48 25 cmstp.exe 19->25         started        signatures10 process11 signatures12 50 Modifies the context of a thread in another process (thread injection) 25->50 52 Maps a DLL or memory area into another process 25->52 54 Tries to detect virtualization through RDTSC time measurements 25->54 56 Switches to a custom stack to bypass stack traces 25->56 28 cmd.exe 1 25->28         started        process13 process14 30 conhost.exe 28->30         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.