Loading ...

Play interactive tourEdit tour

Analysis Report Ticari Hesap #U00d6zetiniz.exe

Overview

General Information

Sample Name:Ticari Hesap #U00d6zetiniz.exe
Analysis ID:289572
MD5:9e641da7a87527dd0d430d8cddc39a38
SHA1:75a73ed680c5ebb16d3584cdf08c32b93a1eead2
SHA256:f823b4bda76194315ef0a4a46eb6be8758edaa9b7cd4246d68c206bae4a22fb1

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM_3
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "vgdXSp", "URL: ": "https://2h5L6wRh13nK.net", "To: ": "", "ByHost: ": "mail.gascuenca.es:587", "Password: ": "x4oIQEIAw09yE", "From: ": "angelmartinez@gascuenca.es"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.446233136.0000000002DE8000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.446233136.0000000002DE8000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000000.00000002.201747862.00000000043A9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.442837112.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 5 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.Ticari Hesap #U00d6zetiniz.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus / Scanner detection for submitted sampleShow sources
              Source: Ticari Hesap #U00d6zetiniz.exeAvira: detected
              Found malware configurationShow sources
              Source: Ticari Hesap #U00d6zetiniz.exe.2476.1.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "vgdXSp", "URL: ": "https://2h5L6wRh13nK.net", "To: ": "", "ByHost: ": "mail.gascuenca.es:587", "Password: ": "x4oIQEIAw09yE", "From: ": "angelmartinez@gascuenca.es"}
              Multi AV Scanner detection for domain / URLShow sources
              Source: mail.gascuenca.esVirustotal: Detection: 7%Perma Link
              Multi AV Scanner detection for submitted fileShow sources
              Source: Ticari Hesap #U00d6zetiniz.exeVirustotal: Detection: 62%Perma Link
              Source: Ticari Hesap #U00d6zetiniz.exeReversingLabs: Detection: 47%
              Machine Learning detection for sampleShow sources
              Source: Ticari Hesap #U00d6zetiniz.exeJoe Sandbox ML: detected
              Source: 1.2.Ticari Hesap #U00d6zetiniz.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
              Source: global trafficTCP traffic: 192.168.2.5:49729 -> 69.73.181.211:587
              Source: Joe Sandbox ViewIP Address: 69.73.181.211 69.73.181.211
              Source: Joe Sandbox ViewASN Name: NTHLUS NTHLUS
              Source: global trafficTCP traffic: 192.168.2.5:49729 -> 69.73.181.211:587
              Source: unknownDNS traffic detected: queries for: mail.gascuenca.es
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446046275.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446046275.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446046275.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: http://UyXDKP.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446604832.0000000002E70000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.450241745.00000000062C9000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446604832.0000000002E70000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446604832.0000000002E70000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446543635.0000000002E66000.00000004.00000001.sdmpString found in binary or memory: http://gascuenca.es
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446543635.0000000002E66000.00000004.00000001.sdmpString found in binary or memory: http://mail.gascuenca.es
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446604832.0000000002E70000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.186972778.00000000063C9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.187282647.00000000063CD000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersj
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.199800171.00000000063C0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comasom
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmp, Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.180133882.00000000063DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.180169022.00000000063DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comW
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.180133882.00000000063DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comX
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.180169022.00000000063DB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comn
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.182728004.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.c
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.182728004.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.182728004.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.182728004.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/:
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.182398437.00000000063FD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn?
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.182439019.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnr3
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.184503312.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.184503312.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Verd
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.184503312.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.184503312.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ana
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.184503312.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/c
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.184503312.00000000063C4000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/9
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmp, Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.179967115.00000000063DB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000003.181606982.00000000063C9000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krserved.l
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.209728544.0000000007662000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446233136.0000000002DE8000.00000004.00000001.sdmp, Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446782456.0000000002E9B000.00000004.00000001.sdmpString found in binary or memory: https://2h5L6wRh13nK.net
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446046275.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.442837112.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446046275.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446604832.0000000002E70000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.442837112.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.446046275.0000000002D61000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 0_2_0585A7580_2_0585A758
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 0_2_0585C3A00_2_0585C3A0
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 0_2_08127BD80_2_08127BD8
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 0_2_081200130_2_08120013
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 0_2_081200400_2_08120040
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F100401_2_00F10040
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F179581_2_00F17958
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F11BE81_2_00F11BE8
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F16D401_2_00F16D40
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F1C2681_2_00F1C268
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F2AB701_2_00F2AB70
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F22D501_2_00F22D50
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F2E6F01_2_00F2E6F0
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F21FF01_2_00F21FF0
              Source: Ticari Hesap #U00d6zetiniz.exeBinary or memory string: OriginalFilename vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEminem.dll< vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameZxkEYlrYHGjMpWPKcIAVxyeQgVHPmckgbo.exe4 vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.210225237.00000000081C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameButterFly.dll< vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000000.176392821.0000000000F9F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamekDNM.exe. vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exeBinary or memory string: OriginalFilename vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.443229500.000000000077F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamekDNM.exe. vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.444930254.0000000000F00000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.443880512.0000000000CF7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.450338976.0000000006380000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.442837112.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameZxkEYlrYHGjMpWPKcIAVxyeQgVHPmckgbo.exe4 vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.444899001.0000000000EF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exeBinary or memory string: OriginalFilenamekDNM.exe. vs Ticari Hesap #U00d6zetiniz.exe
              Source: Ticari Hesap #U00d6zetiniz.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: Ticari Hesap #U00d6zetiniz.exe, Frupal/End.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 0.2.Ticari Hesap #U00d6zetiniz.exe.f60000.0.unpack, Frupal/End.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 0.0.Ticari Hesap #U00d6zetiniz.exe.f60000.0.unpack, Frupal/End.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 1.2.Ticari Hesap #U00d6zetiniz.exe.740000.1.unpack, Frupal/End.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 1.0.Ticari Hesap #U00d6zetiniz.exe.740000.0.unpack, Frupal/End.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ticari Hesap #U00d6zetiniz.exe.logJump to behavior
              Source: Ticari Hesap #U00d6zetiniz.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: Ticari Hesap #U00d6zetiniz.exeVirustotal: Detection: 62%
              Source: Ticari Hesap #U00d6zetiniz.exeReversingLabs: Detection: 47%
              Source: unknownProcess created: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe 'C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe'
              Source: unknownProcess created: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess created: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Ticari Hesap #U00d6zetiniz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Ticari Hesap #U00d6zetiniz.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: Ticari Hesap #U00d6zetiniz.exeStatic file information: File size 1534976 > 1048576
              Source: Ticari Hesap #U00d6zetiniz.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x176000
              Source: Ticari Hesap #U00d6zetiniz.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: Ticari Hesap #U00d6zetiniz.exe, Frupal/End.cs.Net Code: Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.2.Ticari Hesap #U00d6zetiniz.exe.f60000.0.unpack, Frupal/End.cs.Net Code: Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.0.Ticari Hesap #U00d6zetiniz.exe.f60000.0.unpack, Frupal/End.cs.Net Code: Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 1.2.Ticari Hesap #U00d6zetiniz.exe.740000.1.unpack, Frupal/End.cs.Net Code: Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 1.0.Ticari Hesap #U00d6zetiniz.exe.740000.0.unpack, Frupal/End.cs.Net Code: Core System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F1BF48 pushad ; retf 1_2_00F1BF49
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F27A37 push edi; retn 0000h1_2_00F27A39
              Source: initial sampleStatic PE information: section name: .text entropy: 7.18917737588
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.201310602.0000000003407000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Ticari Hesap #U00d6zetiniz.exe PID: 4608, type: MEMORY
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWindow / User API: threadDelayed 609Jump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 4612Thread sleep time: -56632s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 3052Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 2960Thread sleep count: 260 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 2960Thread sleep count: 609 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -58000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -55594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -55312s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -54500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -53594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -52500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -78141s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -51594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -51000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -75750s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -50094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -49000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -48094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -46312s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -46094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -45500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -42812s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -41500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -39282s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -57141s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -37000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -31094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -34500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -32250s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -30891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -90000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -59782s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -59594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -59376s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -58876s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -58688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -56688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -56500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -56282s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -55782s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -52594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -51376s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -51188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -50688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -50282s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -74391s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -49376s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -49188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -48000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -47594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -46688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -69750s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -46282s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -46000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -45594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -44688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -44500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -43188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -43000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -42500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -63141s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -61782s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -41000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -60141s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -39876s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -59532s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -59250s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -39000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -57891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -38376s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -37876s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -37688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -36594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -36376s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -35688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -35500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -34782s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -34188s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -34000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -33094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -32000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -31782s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -55000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -48688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -41688s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe TID: 5712Thread sleep time: -40594s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeLast function: Thread delayed
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.450085649.0000000006280000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000000.00000002.201238415.00000000033A1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeCode function: 1_2_00F10040 LdrInitializeThunk,1_2_00F10040
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeMemory written: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeProcess created: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeJump to behavior
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.445355588.0000000001650000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.445355588.0000000001650000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.445355588.0000000001650000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: Ticari Hesap #U00d6zetiniz.exe, 00000001.00000002.445355588.0000000001650000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Ticari Hesap #U00d6zetiniz.exe