Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe

Overview

General Information

Sample Name:TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
Analysis ID:682142
MD5:687eaf8fd9a58cf46574aef19dafc169
SHA1:cd557296fdbb180f7ff621740194358c35f40df2
SHA256:29dde4dac348711a623a7a26f912d95fa2049f8853fa60b2dc4b2ab1fa977302
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Creates processes with suspicious names
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Token": "5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU", "Telegram ID": "5350445922"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.272962473.000000000280A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
          • 0x3c59c:$x1: $%SMTPDV$
          • 0x3b25e:$x2: $#TheHashHere%&
          • 0x3c544:$x3: %FTPDV$
          • 0x3b240:$x4: $%TelegramDv$
          • 0x38bb1:$x5: KeyLoggerEventArgs
          • 0x38f47:$x5: KeyLoggerEventArgs
          • 0x3c5c8:$m1: | Snake Keylogger
          • 0x3c66e:$m1: | Snake Keylogger
          • 0x3c7c2:$m1: | Snake Keylogger
          • 0x3c8e8:$m1: | Snake Keylogger
          • 0x3ca42:$m1: | Snake Keylogger
          • 0x3c568:$m2: Clipboard Logs ID
          • 0x3c778:$m2: Screenshot Logs ID
          • 0x3c88c:$m2: keystroke Logs ID
          • 0x3ca78:$m3: SnakePW
          • 0x3c750:$m4: \SnakeKeylogger\
          Click to see the 21 entries
          SourceRuleDescriptionAuthorStrings
          0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x19294:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x1847d:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x188c4:$a4: \Orbitum\User Data\Default\Login Data
          • 0x19a45:$a5: \Kometa\User Data\Default\Login Data
          0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
                • 0x12925:$s1: UnHook
                • 0x1292c:$s2: SetHook
                • 0x12934:$s3: CallNextHook
                • 0x12941:$s4: _hook
                Click to see the 55 entries
                No Sigma rule has matched
                Timestamp:192.168.2.3132.226.8.16949745802842536 08/11/22-05:32:21.323901
                SID:2842536
                Source Port:49745
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeVirustotal: Detection: 16%Perma Link
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeJoe Sandbox ML: detected
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU", "Telegram ID": "5350445922"}
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E3319h4_2_067E3070
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E7CF1h4_2_067E7A48
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EFAE1h4_2_067EF838
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E62E1h4_2_067E6038
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E48D1h4_2_067E4628
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EE0A9h4_2_067EDE00
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E85A1h4_2_067E82F8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E6B91h4_2_067E68E8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E5181h4_2_067E4ED8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EE981h4_2_067EE6D8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E3771h4_2_067E34C8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E8149h4_2_067E7EA0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E6739h4_2_067E6490
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E4D29h4_2_067E4A80
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EE529h4_2_067EE280
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E4021h4_2_067E3D78
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E89F9h4_2_067E8750
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E6FE9h4_2_067E6D40
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E55D9h4_2_067E5330
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EEDD9h4_2_067EEB30
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E3BC9h4_2_067E3920
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E7899h4_2_067E75F0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EF689h4_2_067EF3E0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E5E89h4_2_067E5BE0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E4479h4_2_067E41D0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E7441h4_2_067E7198
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067E5A31h4_2_067E5788
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then jmp 067EF231h4_2_067EEF88
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_067EC020
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_067EC00F
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_067EC336

                Networking

                barindex
                Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.3:49745 -> 132.226.8.169:80
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeDNS query: name: checkip.dyndns.org
                Source: Yara matchFile source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.507243389.0000000003314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.507243389.0000000003314000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244944693.0000000005424000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wT
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241548753.0000000005424000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241643484.0000000005424000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241515901.0000000005423000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241679238.0000000005424000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241515901.0000000005423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comhcB
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeString found in binary or memory: http://philiphanson.org/medius/book/1.0
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeString found in binary or memory: http://philiphanson.org/medius/temp-transform
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244697261.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244575011.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244750060.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244459998.0000000005422000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244658087.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244697261.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244658087.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.9
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com8
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comB
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244459998.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comD
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comO
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comP
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244459998.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comTC
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244697261.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244575011.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244750060.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244658087.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comX
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244575011.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coma
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comn-ug
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comubh
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248292088.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247899736.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248013764.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249212196.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247599965.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248975877.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247971338.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249401879.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248316005.0000000005468000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html(
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249124611.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249035342.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247971338.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers5
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248292088.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249401879.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249612104.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249521915.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersC
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248975877.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersV
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249347532.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersa
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254479324.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259791263.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.255468860.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.255512656.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259750301.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259972416.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254531502.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254663310.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.255575317.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254568643.000000000544A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260234535.000000000544A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260027135.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260132985.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254400877.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259851842.000000000544A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.269537935.000000000544C000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254635868.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259562054.000000000544A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersico
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249035342.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersr
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248087830.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248047250.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248013764.000000000544D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com0
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comC
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFq
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comW.TTF.
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.269568884.0000000005420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsm
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdTTF
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.269568884.0000000005420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgretaU
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiv
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243623220.0000000005425000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243492789.000000000545D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243660543.0000000005427000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243524363.000000000545D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243744160.000000000542B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.252246557.000000000542C000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krF
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.240550270.000000000543B000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.240550270.000000000543B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.come
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr8
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krB
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krK
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krp
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243660543.0000000005427000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comY
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241679238.0000000005424000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.nete
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241679238.0000000005424000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netsiv
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnP
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnX
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cna
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnb
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cny
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                System Summary

                barindex
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_0250C2140_2_0250C214
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_0250EBB20_2_0250EBB2
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_0250EBB80_2_0250EBB8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_04F006B40_2_04F006B4
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_04F037F10_2_04F037F1
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_06C963380_2_06C96338
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E30704_2_067E3070
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E7A484_2_067E7A48
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E00404_2_067E0040
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EF8384_2_067EF838
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E60384_2_067E6038
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E46284_2_067E4628
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EDE004_2_067EDE00
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E82F84_2_067E82F8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E68E84_2_067E68E8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E4ED84_2_067E4ED8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EE6D84_2_067EE6D8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E34C84_2_067E34C8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E7EA04_2_067E7EA0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067ED0984_2_067ED098
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E64904_2_067E6490
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E4A804_2_067E4A80
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EE2804_2_067EE280
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E3D784_2_067E3D78
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EB7704_2_067EB770
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E87504_2_067E8750
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E6D404_2_067E6D40
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E53304_2_067E5330
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EEB304_2_067EEB30
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E39204_2_067E3920
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E75F04_2_067E75F0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EF3E04_2_067EF3E0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E5BE04_2_067E5BE0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E41D04_2_067E41D0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E8BA84_2_067E8BA8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EC3984_2_067EC398
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E71984_2_067E7198
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E57884_2_067E5788
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EEF884_2_067EEF88
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E4A704_2_067E4A70
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EE2714_2_067EE271
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E30604_2_067E3060
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E7A3A4_2_067E7A3A
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E00334_2_067E0033
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E602A4_2_067E602A
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EF8284_2_067EF828
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EC0204_2_067EC020
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E46184_2_067E4618
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EC00F4_2_067EC00F
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E82E84_2_067E82E8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E68D84_2_067E68D8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E4EC84_2_067E4EC8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EE6C84_2_067EE6C8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EB6C94_2_067EB6C9
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E34B84_2_067E34B8
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E7E904_2_067E7E90
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E64824_2_067E6482
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E57784_2_067E5778
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EEF794_2_067EEF79
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E3D684_2_067E3D68
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E87414_2_067E8741
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E6D304_2_067E6D30
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EEB204_2_067EEB20
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E53214_2_067E5321
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E39104_2_067E3910
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EDDF04_2_067EDDF0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E75E04_2_067E75E0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E5BDA4_2_067E5BDA
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067EF3D04_2_067EF3D0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E41C04_2_067E41C0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E71884_2_067E7188
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271717491.0000000002626000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271410326.00000000025A7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.280763595.0000000006EF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000000.236415106.00000000001C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameELEMD.exe. vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.281062016.0000000007250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.281037436.0000000007110000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260670018.0000000006B92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000000.267300036.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.502317619.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeBinary or memory string: OriginalFilenameELEMD.exe. vs TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeVirustotal: Detection: 16%
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe "C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe"
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess created: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess created: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 0.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.f0000.0.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, ??zu07b4?/zu060c???.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, u07bbufffd??ufffd/ufffd???ufffd.csCryptographic APIs: 'TransformFinalBlock'
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic file information: File size 1129472 > 1048576
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.f0000.0.unpack, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_0250DA13 push edi; retf 0_2_0250DA17
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_04F0D7A0 push es; ret 0_2_04F0D7B0
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 0_2_06C9B291 push D4070C25h; iretd 0_2_06C9B29D
                Source: initial sampleStatic PE information: section name: .text entropy: 7.350037504164019
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile created: \tufan yaz#u011ean - kredi kart#u0131 hesap #u00d6zeti - 45431108.exe
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile created: \tufan yaz#u011ean - kredi kart#u0131 hesap #u00d6zeti - 45431108.exeJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.272962473.000000000280A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTR
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.272962473.000000000280A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.272962473.000000000280A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe TID: 5680Thread sleep time: -45877s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe TID: 6048Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeThread delayed: delay time: 45877Jump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeCode function: 4_2_067E2D81 LdrInitializeThunk,4_2_067E2D81
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, u07bbufffd??ufffd/ufffd???ufffd.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
                Source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, ????U/?????.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeMemory written: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeProcess created: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTR
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3837e08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3814de8.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.374cfe8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.36ecfc8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.3549930.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 5912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe PID: 4592, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Native API
                Path Interception111
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer12
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items12
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe17%VirustotalBrowse
                TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                4.0.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                SourceDetectionScannerLabelLink
                checkip.dyndns.com0%VirustotalBrowse
                checkip.dyndns.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.sandoll.co.kr80%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://fontfabrik.comhcB0%Avira URL Cloudsafe
                http://www.fontbureau.comsiv0%URL Reputationsafe
                http://www.typography.netsiv0%Avira URL Cloudsafe
                http://en.wT0%Avira URL Cloudsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.com0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://checkip.dyndns.org40%URL Reputationsafe
                http://www.carterandcone.comB0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://www.carterandcone.comD0%URL Reputationsafe
                http://www.carterandcone.com80%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://www.fontbureau.com00%Avira URL Cloudsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.krK0%Avira URL Cloudsafe
                http://www.carterandcone.comP0%URL Reputationsafe
                http://www.carterandcone.comO0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.fontbureau.comalsm0%Avira URL Cloudsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://www.carterandcone.comn-ug0%Avira URL Cloudsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.carterandcone.como.0%URL Reputationsafe
                http://www.sajatypeworks.come0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.sandoll.co.krB0%Avira URL Cloudsafe
                http://www.fontbureau.comC0%Avira URL Cloudsafe
                http://www.carterandcone.coma0%URL Reputationsafe
                http://www.typography.nete0%URL Reputationsafe
                http://philiphanson.org/medius/book/1.00%Avira URL Cloudsafe
                http://www.carterandcone.comTC0%URL Reputationsafe
                http://www.carterandcone.comX0%URL Reputationsafe
                http://philiphanson.org/medius/temp-transform0%Avira URL Cloudsafe
                http://www.sandoll.co.krp0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cny0%Avira URL Cloudsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://www.fontbureau.coma0%URL Reputationsafe
                http://www.goodfont.co.krF0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.carterandcone.comubh0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.zhongyicts.com.cnb0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cna0%URL Reputationsafe
                http://www.fontbureau.comFq0%Avira URL Cloudsafe
                http://www.tiro.comY0%Avira URL Cloudsafe
                http://www.fontbureau.comdTTF0%URL Reputationsafe
                http://www.zhongyicts.com.cnX0%Avira URL Cloudsafe
                http://www.carterandcone.com.90%Avira URL Cloudsafe
                http://www.fontbureau.comgretaU0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.fontbureau.comW.TTF.0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cnP0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                checkip.dyndns.com
                132.226.8.169
                truetrueunknown
                checkip.dyndns.org
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/true
                • URL Reputation: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.fontbureau.com/designersGTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/frere-jones.html(TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248316005.0000000005468000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.sandoll.co.kr8TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers/?TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comhcBTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241515901.0000000005423000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.telegram.org/botTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comsivTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersCTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249401879.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249612104.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249521915.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.typography.netsivTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241679238.0000000005424000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://en.wTTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244944693.0000000005424000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersVTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248975877.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248292088.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247899736.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248013764.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249212196.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247599965.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248975877.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247971338.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244697261.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244575011.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244750060.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244459998.0000000005422000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244658087.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.240550270.000000000543B000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.org4TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comBTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/cTheTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.252246557.000000000542C000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://fontfabrik.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241548753.0000000005424000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241643484.0000000005424000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241515901.0000000005423000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241679238.0000000005424000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comDTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244459998.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersaTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249347532.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.carterandcone.com8TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.org/qTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com0TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleaseTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sandoll.co.krKTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comPTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comOTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comalsmTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://checkip.dyndns.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.507243389.0000000003314000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comn-ugTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.urwpp.deDPleaseTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.carterandcone.como.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.comeTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.240550270.000000000543B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sandoll.co.krBTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.comCTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designerssTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248087830.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248047250.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248013764.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designersrTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249035342.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.carterandcone.comaTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244575011.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.apache.org/licenses/LICENSE-2.0TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.typography.neteTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.241679238.0000000005424000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://philiphanson.org/medius/book/1.0TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exefalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.carterandcone.comTCTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244459998.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.carterandcone.comXTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244697261.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244575011.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244750060.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244658087.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://philiphanson.org/medius/temp-transformTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exefalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.sandoll.co.krpTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.zhongyicts.com.cnyTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://checkip.dyndns.orgTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.507243389.0000000003314000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000004.00000002.506122339.0000000003271000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designersicoTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254479324.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259791263.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.255468860.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.255512656.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259750301.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259972416.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254531502.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254663310.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.255575317.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254568643.000000000544A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260234535.000000000544A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260027135.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.260132985.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254400877.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259851842.000000000544A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.269537935.000000000544C000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.254635868.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.259562054.000000000544A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.comaTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.269568884.0000000005420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.goodfont.co.krFTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243244738.0000000005423000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.carterandcone.comlTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.carterandcone.comubhTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244536800.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers/cabarga.htmlNTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.founder.com.cn/cnTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243623220.0000000005425000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243492789.000000000545D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243660543.0000000005427000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243524363.000000000545D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243744160.000000000542B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/frere-jones.htmlTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.zhongyicts.com.cnbTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.zhongyicts.com.cnaTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244496679.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comFqTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.tiro.comYTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.243660543.0000000005427000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.fontbureau.comdTTFTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.zhongyicts.com.cnXTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.carterandcone.com.9TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244697261.000000000542E000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244658087.000000000542E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low
                                                    http://www.fontbureau.comgretaUTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.269568884.0000000005420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.jiyu-kobo.co.jp/TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.comW.TTF.TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249479728.0000000005422000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers8TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000002.278030887.0000000006632000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.248292088.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.zhongyicts.com.cnPTUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244406590.000000000542D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.244286104.000000000542A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers/TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249401879.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.fontbureau.com/designers5TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249124611.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.249035342.000000000544D000.00000004.00000800.00020000.00000000.sdmp, TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe, 00000000.00000003.247971338.000000000544D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          132.226.8.169
                                                          checkip.dyndns.comUnited States
                                                          16989UTMEMUStrue
                                                          Joe Sandbox Version:35.0.0 Citrine
                                                          Analysis ID:682142
                                                          Start date and time:2022-08-11 05:31:06 +02:00
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 6m 53s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Sample file name:TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:27
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HDC Information:Failed
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 104
                                                          • Number of non-executed functions: 9
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Adjust boot time
                                                          • Enable AMSI
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                          • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          TimeTypeDescription
                                                          05:32:16API Interceptor2x Sleep call for process: TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          132.226.8.169SecuriteInfo.com.Trojan.Olock.1.18653.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          MV Africanna.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          RFQ08102022.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          Quotation Forms.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          M88jvQMmY6.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          Si - HL pdf.scrGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          CfI7gIqXm0zAzJn.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          K1MFsDQpDtGYXhK.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          ScanDoc5311.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          Shipment Particulars.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          AWB_Docs.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          DOC0808#QUO (990 KB) pdf.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          56516426-056C-4DBA-984B-979F68AB8D188.scrGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          Remittance advice.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          Payment 05-08-22.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          S345678900-87654080.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          proof of payment.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.scrGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          IMG.006.exeGet hashmaliciousBrowse
                                                          • checkip.dyndns.org/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          checkip.dyndns.comSecuriteInfo.com.Trojan.Olock.1.18653.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          ScanDoc.exeGet hashmaliciousBrowse
                                                          • 158.101.44.242
                                                          MV HONGSHENG 7 PDA.exeGet hashmaliciousBrowse
                                                          • 158.101.44.242
                                                          3ap4uBA5Zc.exeGet hashmaliciousBrowse
                                                          • 158.101.44.242
                                                          eHr1pMdB1PR9G6I.exeGet hashmaliciousBrowse
                                                          • 158.101.44.242
                                                          4V5XtMQ6cN.exeGet hashmaliciousBrowse
                                                          • 193.122.130.0
                                                          108-2955845-65.exeGet hashmaliciousBrowse
                                                          • 193.122.6.168
                                                          w85qN6knFHYW5Iu.exeGet hashmaliciousBrowse
                                                          • 193.122.130.0
                                                          Air-India-PO.exeGet hashmaliciousBrowse
                                                          • 193.122.130.0
                                                          QUOTE.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          BRNxvuDyo7.exeGet hashmaliciousBrowse
                                                          • 193.122.130.0
                                                          NEW ENQUIRY.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          PO.exeGet hashmaliciousBrowse
                                                          • 193.122.6.168
                                                          55590-8880-5555-8888-9999-6000-44440-3333-2222-0000-0000.scrGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          MV Africanna.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          invoice01352798.exeGet hashmaliciousBrowse
                                                          • 193.122.6.168
                                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          SMK_QEW220810.exeGet hashmaliciousBrowse
                                                          • 193.122.6.168
                                                          RFQ08102022.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                          • 193.122.6.168
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          UTMEMUSSecuriteInfo.com.Trojan.Olock.1.18653.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          QUOTE.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          NEW ENQUIRY.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          55590-8880-5555-8888-9999-6000-44440-3333-2222-0000-0000.scrGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          MV Africanna.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          RFQ08102022.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          PO_290054.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          7088-54625262-74635627333-233424255353-6474673684-1111.scrGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          Quotation Forms.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          NEW_PO#671928273.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          M88jvQMmY6.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          Quotation.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          Si - HL pdf.scrGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          Y6emamvi51.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          CfI7gIqXm0zAzJn.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          dS20e7SBuPzr0bn.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          K1MFsDQpDtGYXhK.exeGet hashmaliciousBrowse
                                                          • 132.226.8.169
                                                          LU72ENc81K.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          SWIFT_26,360.00.exeGet hashmaliciousBrowse
                                                          • 132.226.247.73
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1308
                                                          Entropy (8bit):5.345811588615766
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                          MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                          SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                          SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                          SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):6.932869956848806
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          File size:1129472
                                                          MD5:687eaf8fd9a58cf46574aef19dafc169
                                                          SHA1:cd557296fdbb180f7ff621740194358c35f40df2
                                                          SHA256:29dde4dac348711a623a7a26f912d95fa2049f8853fa60b2dc4b2ab1fa977302
                                                          SHA512:f1890e2bb4c5b551a450f1c8a9affd63f26f9ecda9e0465aa8829e872b177219317b9afae6b32a4b8be244b243b2c68bdcb7cfcded0ed31f027e302986718c8f
                                                          SSDEEP:24576:MvM4vwHmQl8DmpSsbcnT9FlpvurMm8go/2gi:M/D6bcjrWrfo/
                                                          TLSH:0F355CDEB194C89BDD6606B1FC1A54F02593BD98F060C40F699B7E2676B334E205FE0A
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Y.b..............0.................. ........@.. ....................................@................................
                                                          Icon Hash:aeacae8eb6a2be00
                                                          Entrypoint:0x4cca82
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x62F45915 [Thu Aug 11 01:19:17 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xcca300x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x48b24.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000xcaa880xcac00False0.6428550786066585data7.350037504164019IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xce0000x48b240x48c00False0.06349669780927836data4.768917727242542IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x1180000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountry
                                                          RT_ICON0xce3100x668data
                                                          RT_ICON0xce9780x2e8data
                                                          RT_ICON0xcec600x128GLS_BINARY_LSB_FIRST
                                                          RT_ICON0xced880xea8data
                                                          RT_ICON0xcfc300x8a8dBase III DBT, version number 0, next free block index 40
                                                          RT_ICON0xd04d80x568GLS_BINARY_LSB_FIRST
                                                          RT_ICON0xd0a400x42028dBase III DBT, version number 0, next free block index 40
                                                          RT_ICON0x112a680x25a8data
                                                          RT_ICON0x1150100x10a8data
                                                          RT_ICON0x1160b80x468GLS_BINARY_LSB_FIRST
                                                          RT_GROUP_ICON0x1165200x92data
                                                          RT_GROUP_ICON0x1165b40x14data
                                                          RT_VERSION0x1165c80x370data
                                                          RT_MANIFEST0x1169380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          192.168.2.3132.226.8.16949745802842536 08/11/22-05:32:21.323901TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4974580192.168.2.3132.226.8.169
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Aug 11, 2022 05:32:21.021357059 CEST4974580192.168.2.3132.226.8.169
                                                          Aug 11, 2022 05:32:21.323322058 CEST8049745132.226.8.169192.168.2.3
                                                          Aug 11, 2022 05:32:21.323407888 CEST4974580192.168.2.3132.226.8.169
                                                          Aug 11, 2022 05:32:21.323900938 CEST4974580192.168.2.3132.226.8.169
                                                          Aug 11, 2022 05:32:21.626029968 CEST8049745132.226.8.169192.168.2.3
                                                          Aug 11, 2022 05:32:21.626570940 CEST8049745132.226.8.169192.168.2.3
                                                          Aug 11, 2022 05:32:21.686259031 CEST4974580192.168.2.3132.226.8.169
                                                          Aug 11, 2022 05:33:26.626835108 CEST8049745132.226.8.169192.168.2.3
                                                          Aug 11, 2022 05:33:26.626939058 CEST4974580192.168.2.3132.226.8.169
                                                          Aug 11, 2022 05:34:01.650320053 CEST4974580192.168.2.3132.226.8.169
                                                          Aug 11, 2022 05:34:01.952864885 CEST8049745132.226.8.169192.168.2.3
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Aug 11, 2022 05:32:20.940514088 CEST4931653192.168.2.38.8.8.8
                                                          Aug 11, 2022 05:32:20.958225965 CEST53493168.8.8.8192.168.2.3
                                                          Aug 11, 2022 05:32:20.976407051 CEST5641753192.168.2.38.8.8.8
                                                          Aug 11, 2022 05:32:20.995256901 CEST53564178.8.8.8192.168.2.3
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Aug 11, 2022 05:32:20.940514088 CEST192.168.2.38.8.8.80xa1faStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.976407051 CEST192.168.2.38.8.8.80x12bcStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Aug 11, 2022 05:32:20.958225965 CEST8.8.8.8192.168.2.30xa1faNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.958225965 CEST8.8.8.8192.168.2.30xa1faNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.958225965 CEST8.8.8.8192.168.2.30xa1faNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.958225965 CEST8.8.8.8192.168.2.30xa1faNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.958225965 CEST8.8.8.8192.168.2.30xa1faNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.958225965 CEST8.8.8.8192.168.2.30xa1faNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.995256901 CEST8.8.8.8192.168.2.30x12bcNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.995256901 CEST8.8.8.8192.168.2.30x12bcNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.995256901 CEST8.8.8.8192.168.2.30x12bcNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.995256901 CEST8.8.8.8192.168.2.30x12bcNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.995256901 CEST8.8.8.8192.168.2.30x12bcNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                                          Aug 11, 2022 05:32:20.995256901 CEST8.8.8.8192.168.2.30x12bcNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                                          • checkip.dyndns.org
                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.349745132.226.8.16980C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Aug 11, 2022 05:32:21.323900938 CEST1026OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Aug 11, 2022 05:32:21.626570940 CEST1026INHTTP/1.1 200 OK
                                                          Date: Thu, 11 Aug 2022 03:32:21 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 105
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.143.3</body></html>


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:05:32:03
                                                          Start date:11/08/2022
                                                          Path:C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe"
                                                          Imagebase:0xf0000
                                                          File size:1129472 bytes
                                                          MD5 hash:687EAF8FD9A58CF46574AEF19DAFC169
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.272962473.000000000280A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.275679814.0000000003814000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.271499452.00000000025DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.273267189.0000000003541000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low

                                                          Target ID:4
                                                          Start time:05:32:17
                                                          Start date:11/08/2022
                                                          Path:C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.exe
                                                          Imagebase:0xdd0000
                                                          File size:1129472 bytes
                                                          MD5 hash:687EAF8FD9A58CF46574AEF19DAFC169
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000000.266954343.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:10.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:129
                                                            Total number of Limit Nodes:4
                                                            execution_graph 28755 25040d0 28756 25040e2 28755->28756 28757 25040ee 28756->28757 28761 25041e0 28756->28761 28766 25038a0 28757->28766 28759 250410d 28762 2504205 28761->28762 28770 25042e0 28762->28770 28774 25042d1 28762->28774 28767 25038ab 28766->28767 28782 25057e4 28767->28782 28769 2506b30 28769->28759 28771 2504307 28770->28771 28772 25043e4 28771->28772 28778 2503ea0 28771->28778 28772->28772 28775 2504307 28774->28775 28776 25043e4 28775->28776 28777 2503ea0 CreateActCtxA 28775->28777 28777->28776 28779 2505370 CreateActCtxA 28778->28779 28781 2505433 28779->28781 28783 25057ef 28782->28783 28786 25058b8 28783->28786 28785 2507215 28785->28769 28787 25058c3 28786->28787 28789 25072fa 28787->28789 28790 2506d90 28787->28790 28789->28785 28791 2506d9b 28790->28791 28794 2506dc0 28791->28794 28793 25073ea 28793->28789 28795 2506dcb 28794->28795 28797 25078a9 28795->28797 28804 2507b48 28795->28804 28796 2507b3c 28796->28793 28798 2507afe 28797->28798 28813 25098df 28797->28813 28817 25098f0 28797->28817 28798->28796 28821 250ba08 28798->28821 28826 250b9fa 28798->28826 28805 2507aec 28804->28805 28806 2507afe 28805->28806 28808 2507b53 28805->28808 28809 25098f0 3 API calls 28805->28809 28810 25098df 3 API calls 28805->28810 28807 2507b3c 28806->28807 28811 250ba08 3 API calls 28806->28811 28812 250b9fa 3 API calls 28806->28812 28807->28797 28808->28797 28809->28806 28810->28806 28811->28807 28812->28807 28831 25099e8 28813->28831 28839 25099d7 28813->28839 28814 25098ff 28814->28798 28818 25098ff 28817->28818 28819 25099d7 2 API calls 28817->28819 28820 25099e8 2 API calls 28817->28820 28818->28798 28819->28818 28820->28818 28823 250ba29 28821->28823 28822 250ba4d 28822->28796 28823->28822 28860 250bba7 28823->28860 28864 250bbb8 28823->28864 28827 250ba29 28826->28827 28828 250ba4d 28827->28828 28829 250bba7 3 API calls 28827->28829 28830 250bbb8 3 API calls 28827->28830 28828->28796 28829->28828 28830->28828 28832 25099fb 28831->28832 28833 2509a13 28832->28833 28848 2509c70 28832->28848 28852 2509c60 28832->28852 28833->28814 28834 2509a0b 28834->28833 28835 2509c10 GetModuleHandleW 28834->28835 28836 2509c3d 28835->28836 28836->28814 28840 25099e2 28839->28840 28841 2509976 28839->28841 28842 2509a13 28840->28842 28846 2509c70 LoadLibraryExW 28840->28846 28847 2509c60 LoadLibraryExW 28840->28847 28841->28814 28842->28814 28843 2509a0b 28843->28842 28844 2509c10 GetModuleHandleW 28843->28844 28845 2509c3d 28844->28845 28845->28814 28846->28843 28847->28843 28849 2509c84 28848->28849 28850 2509ca9 28849->28850 28856 2508d50 28849->28856 28850->28834 28853 2509c84 28852->28853 28854 2508d50 LoadLibraryExW 28853->28854 28855 2509ca9 28853->28855 28854->28855 28855->28834 28857 2509e50 LoadLibraryExW 28856->28857 28859 2509ec9 28857->28859 28859->28850 28862 250bbc5 28860->28862 28861 250bbff 28861->28822 28862->28861 28868 250a6cc 28862->28868 28866 250bbc5 28864->28866 28865 250bbff 28865->28822 28866->28865 28867 250a6cc 3 API calls 28866->28867 28867->28865 28869 250a6d7 28868->28869 28871 250c8f8 28869->28871 28872 250bf44 28869->28872 28871->28871 28873 250bf4f 28872->28873 28874 2506dc0 3 API calls 28873->28874 28875 250c967 28873->28875 28874->28875 28878 250e71c 28875->28878 28879 250c9a0 28878->28879 28880 250e735 28878->28880 28879->28871 28882 250eb70 LoadLibraryExW GetModuleHandleW 28880->28882 28883 250eb62 LoadLibraryExW GetModuleHandleW 28880->28883 28881 250e76d 28882->28881 28883->28881 28884 250bcd0 28885 250bd36 28884->28885 28889 250be90 28885->28889 28892 250be80 28885->28892 28886 250bde5 28895 250a754 28889->28895 28893 250bebe 28892->28893 28894 250a754 DuplicateHandle 28892->28894 28893->28886 28894->28893 28896 250c300 DuplicateHandle 28895->28896 28897 250bebe 28896->28897 28897->28886 28916 6c95158 28918 6c95186 28916->28918 28917 6c95211 28918->28917 28919 6c91b14 SetTimer 28918->28919 28919->28917 28898 4f0e9b8 28900 250e71c 2 API calls 28898->28900 28899 4f0e9c5 28900->28899 28901 6c95500 28904 6c9552d 28901->28904 28902 6c9557c 28904->28902 28905 6c91b6c 28904->28905 28906 6c91b77 28905->28906 28909 6c91b14 28906->28909 28911 6c91b1f 28909->28911 28910 6c95338 28910->28902 28911->28910 28913 6c91b44 28911->28913 28914 6c95460 SetTimer 28913->28914 28915 6c954cc 28914->28915 28915->28910
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.280697583.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6c90000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d55712e797669897ca40380171f686bfc0b49483489f3bab9ce9cd9fb6dc848
                                                            • Instruction ID: d0cff0cddebbb57b161c8e3c32608e8e41e56cd0035fe612df8ae32634d0e2fd
                                                            • Opcode Fuzzy Hash: 6d55712e797669897ca40380171f686bfc0b49483489f3bab9ce9cd9fb6dc848
                                                            • Instruction Fuzzy Hash: 36329230E112189FEF54DF79C8947AEB7F2AF89304F1481A9D409AB385DB389D45CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 4f0b8c8-4f0b8c9 1 4f0b8ba-4f0e576 0->1 2 4f0b8cb-4f0b8d1 0->2 10 4f0e686-4f0e6a3 call 4f0b8a4 1->10 11 4f0e57c 1->11 3 4f0b8c2-4f0b8c6 2->3 4 4f0b8d3-4f0b8e4 2->4 3->0 5 4f0beea-4f0beee 4->5 6 4f0b8ea-4f0b8f8 4->6 18 4f0b901-4f0b928 call 4f0b624 6->18 19 4f0b8fa 6->19 21 4f0e6a8-4f0e785 call 4f08ca8 call 4f09998 call 4f09b50 10->21 12 4f0e583-4f0e5b9 11->12 13 4f0e5fa-4f0e64a 11->13 14 4f0e64c-4f0e676 call 4f05eec 11->14 15 4f0e5be-4f0e5ca 11->15 16 4f0e5cf-4f0e5f5 11->16 17 4f0e67f-4f0e684 11->17 12->10 13->10 14->10 35 4f0e678-4f0e67d 14->35 15->10 16->10 17->10 39 4f0b931-4f0b958 call 4f0b634 18->39 40 4f0b92a 18->40 19->18 35->10 46 4f0b961-4f0b988 call 4f0b644 39->46 47 4f0b95a 39->47 40->39 52 4f0b991-4f0b9b8 46->52 53 4f0b98a 46->53 47->46 57 4f0b9c1-4f0b9e8 call 4f0b654 52->57 58 4f0b9ba 52->58 53->52 63 4f0b9f1-4f0ba18 call 4f0b664 57->63 64 4f0b9ea 57->64 58->57 69 4f0ba21-4f0ba48 63->69 70 4f0ba1a 63->70 64->63 74 4f0ba51-4f0ba78 call 4f0b674 69->74 75 4f0ba4a 69->75 70->69 80 4f0ba81-4f0baa8 call 4f0b684 74->80 81 4f0ba7a 74->81 75->74 86 4f0bab1-4f0bad8 call 4f0b694 80->86 87 4f0baaa 80->87 81->80 92 4f0bae1-4f0bb08 call 4f0b6a4 86->92 93 4f0bada 86->93 87->86 98 4f0bb11-4f0bb38 call 4f0b6b4 92->98 99 4f0bb0a 92->99 93->92 104 4f0bb41-4f0bb68 call 4f0b6c4 98->104 105 4f0bb3a 98->105 99->98 110 4f0bb71-4f0bb98 call 4f0b6d4 104->110 111 4f0bb6a 104->111 105->104 116 4f0bba1-4f0bbc8 call 4f0b6e4 110->116 117 4f0bb9a 110->117 111->110 122 4f0bbd1-4f0bbf8 call 4f0b6f4 116->122 123 4f0bbca 116->123 117->116 128 4f0bc01-4f0bc28 call 4f0b704 122->128 129 4f0bbfa 122->129 123->122 134 4f0bc31-4f0bc58 call 4f0b714 128->134 135 4f0bc2a 128->135 129->128 140 4f0bc61-4f0bc88 134->140 141 4f0bc5a 134->141 135->134 145 4f0bc91-4f0bcb8 call 4f0b724 140->145 146 4f0bc8a 140->146 141->140 151 4f0bcc1-4f0bce8 call 4f0b734 145->151 152 4f0bcba 145->152 146->145 157 4f0bcf1-4f0bd18 call 4f0b744 151->157 158 4f0bcea 151->158 152->151 163 4f0bd21-4f0bd48 157->163 164 4f0bd1a 157->164 158->157 168 4f0bd51-4f0bd78 call 4f0b754 163->168 169 4f0bd4a 163->169 164->163 174 4f0bd81-4f0bda8 call 4f0b764 168->174 175 4f0bd7a 168->175 169->168 180 4f0bdb1-4f0bdd8 call 4f0b774 174->180 181 4f0bdaa 174->181 175->174 186 4f0bde1-4f0be08 call 4f0b784 180->186 187 4f0bdda 180->187 181->180 192 4f0be11-4f0be38 call 4f0b794 186->192 193 4f0be0a 186->193 187->186 198 4f0be41-4f0bee3 call 4f0b7a4 call 4f0b7b4 192->198 199 4f0be3a 192->199 193->192 198->5 215 4f0bee5 call 4f0b7c4 198->215 199->198 215->5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k
                                                            • API String ID: 0-2385108095
                                                            • Opcode ID: 458924850f29cd5ce6f081077c17e71d65b31f13e2adc983eaf8da6affdd5ae6
                                                            • Instruction ID: c45ffe084e07785faaf4af9d3ab7e9538f220e41a05d7529e1a9637b9cceecba
                                                            • Opcode Fuzzy Hash: 458924850f29cd5ce6f081077c17e71d65b31f13e2adc983eaf8da6affdd5ae6
                                                            • Instruction Fuzzy Hash: C4324D70B006018BDF15FFB8989059DB3A39FC5308754C969980AAF396EF78FD499B90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 216 25099e8-25099f0 217 25099fb-25099fd 216->217 218 25099f6 call 2508cec 216->218 219 2509a13-2509a17 217->219 220 25099ff 217->220 218->217 221 2509a19-2509a23 219->221 222 2509a2b-2509a6c 219->222 271 2509a05 call 2509c70 220->271 272 2509a05 call 2509c60 220->272 221->222 227 2509a79-2509a87 222->227 228 2509a6e-2509a76 222->228 223 2509a0b-2509a0d 223->219 224 2509b48-2509c08 223->224 264 2509c10-2509c3b GetModuleHandleW 224->264 265 2509c0a-2509c0d 224->265 230 2509a89-2509a8e 227->230 231 2509aab-2509aad 227->231 228->227 232 2509a90-2509a97 call 2508cf8 230->232 233 2509a99 230->233 234 2509ab0-2509ab7 231->234 236 2509a9b-2509aa9 232->236 233->236 237 2509ac4-2509acb 234->237 238 2509ab9-2509ac1 234->238 236->234 241 2509ad8-2509ae1 call 2508d08 237->241 242 2509acd-2509ad5 237->242 238->237 247 2509ae3-2509aeb 241->247 248 2509aee-2509af3 241->248 242->241 247->248 249 2509b11-2509b15 248->249 250 2509af5-2509afc 248->250 269 2509b18 call 2509f40 249->269 270 2509b18 call 2509f68 249->270 250->249 252 2509afe-2509b0e call 2508d18 call 2508d28 250->252 252->249 253 2509b1b-2509b1e 257 2509b20-2509b3e 253->257 258 2509b41-2509b47 253->258 257->258 266 2509c44-2509c58 264->266 267 2509c3d-2509c43 264->267 265->264 267->266 269->253 270->253 271->223 272->223
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02509C2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID: 8P|$8P|
                                                            • API String ID: 4139908857-3496795504
                                                            • Opcode ID: 4db8f3efe5616025e8f6167830f4f6db9c84b12184d88833b20593f3aaa2bd08
                                                            • Instruction ID: a05b9ec2f2a0de65cd26f5128fa0cb4f4b95be837feb9116fa99334499f071c8
                                                            • Opcode Fuzzy Hash: 4db8f3efe5616025e8f6167830f4f6db9c84b12184d88833b20593f3aaa2bd08
                                                            • Instruction Fuzzy Hash: 02713470A00B058FD724DF2AD88479ABBF1BF88704F10892DD44ADBA94D735E845CF95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1377 2505364-2505431 CreateActCtxA 1379 2505433-2505439 1377->1379 1380 250543a-2505494 1377->1380 1379->1380 1387 25054a3-25054a7 1380->1387 1388 2505496-2505499 1380->1388 1389 25054b8 1387->1389 1390 25054a9-25054b5 1387->1390 1388->1387 1392 25054b9 1389->1392 1390->1389 1392->1392
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02505421
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: fe4a922ac97cf908dc5313e7359b2ac233aeb163f79ed77bfba675ea5ce2b19a
                                                            • Instruction ID: 4288ea3503852eb517c057e8573be86d6d8da14a0e7e81a7dd34ba6f57118ffb
                                                            • Opcode Fuzzy Hash: fe4a922ac97cf908dc5313e7359b2ac233aeb163f79ed77bfba675ea5ce2b19a
                                                            • Instruction Fuzzy Hash: A441C1B1D00618CEDB24DFA9D984BCEBBB1FF48308F60806AD408AB651D775694ACF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1360 2503ea0-2505431 CreateActCtxA 1363 2505433-2505439 1360->1363 1364 250543a-2505494 1360->1364 1363->1364 1371 25054a3-25054a7 1364->1371 1372 2505496-2505499 1364->1372 1373 25054b8 1371->1373 1374 25054a9-25054b5 1371->1374 1372->1371 1376 25054b9 1373->1376 1374->1373 1376->1376
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02505421
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 25e1366ccf67772012309829779db514e10defe87f9001e933f7365096919201
                                                            • Instruction ID: 4f685bcd83c415735dc178a109c610d7929fd54f91f69279091dbec979ed530c
                                                            • Opcode Fuzzy Hash: 25e1366ccf67772012309829779db514e10defe87f9001e933f7365096919201
                                                            • Instruction Fuzzy Hash: 3741B2B1C00618CBDB24DFA9C984BDEBBB5FF48308F608469D409BB651D7756949CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1393 250a754-250c394 DuplicateHandle 1395 250c396-250c39c 1393->1395 1396 250c39d-250c3ba 1393->1396 1395->1396
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0250BEBE,?,?,?,?,?), ref: 0250C387
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 0b9d19ee2f6f8c1071ab18bcaa450313e6f46a3de7c259751940460b413f73c8
                                                            • Instruction ID: 543a8c425c14a5162fd0490311764d0934d000cd3fa899cea90d1806f8e57473
                                                            • Opcode Fuzzy Hash: 0b9d19ee2f6f8c1071ab18bcaa450313e6f46a3de7c259751940460b413f73c8
                                                            • Instruction Fuzzy Hash: E521E5B5910208AFDB10CF99D984BDEBBF4FB48324F14841AE914A7750D374A954CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1399 250c2f8-250c394 DuplicateHandle 1400 250c396-250c39c 1399->1400 1401 250c39d-250c3ba 1399->1401 1400->1401
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0250BEBE,?,?,?,?,?), ref: 0250C387
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 64789d3376ae2ca0c43b738b13eb87abcfd3aeb0e46f4968a0a44394cd51a6ef
                                                            • Instruction ID: b5b6f7c1c7ecaad89573f4bb743a93636e6b1c5c531d568b6174f8af23222b71
                                                            • Opcode Fuzzy Hash: 64789d3376ae2ca0c43b738b13eb87abcfd3aeb0e46f4968a0a44394cd51a6ef
                                                            • Instruction Fuzzy Hash: E321E4B5D11208AFDB10CFA9D984ADEBBF4FF48324F14801AE918A7750D374A955CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1404 2508d38-2509e90 1407 2509e92-2509e95 1404->1407 1408 2509e98-2509ec7 LoadLibraryExW 1404->1408 1407->1408 1409 2509ed0-2509eed 1408->1409 1410 2509ec9-2509ecf 1408->1410 1410->1409
                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02509CA9,00000800,00000000,00000000), ref: 02509EBA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 5a9ff83bca8392dffd540cad84381504b45a237fbdcc20fb729fee1844187d39
                                                            • Instruction ID: dddbf693806484c0404ef23f40f75409e917f00bd708ff40b4aac29dcb53d74e
                                                            • Opcode Fuzzy Hash: 5a9ff83bca8392dffd540cad84381504b45a237fbdcc20fb729fee1844187d39
                                                            • Instruction Fuzzy Hash: D32148B28053489FCB11CFA9D944BDABFF4AB49324F14846ED455A7641C374A908CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02509CA9,00000800,00000000,00000000), ref: 02509EBA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 8da120b43d8b93af20f2d5ba2518ad833b1b5fd5b3d52f8d3b7de213e1b3ed24
                                                            • Instruction ID: 98bc361afaeb0a4d86600702b7453c8f3dc4c26f2737a44498d779cb1a3cb37d
                                                            • Opcode Fuzzy Hash: 8da120b43d8b93af20f2d5ba2518ad833b1b5fd5b3d52f8d3b7de213e1b3ed24
                                                            • Instruction Fuzzy Hash: 8211F2B29002099FDB10CF9AD984BDEFBF4AB88724F14842AE419A7640C374A945CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02509CA9,00000800,00000000,00000000), ref: 02509EBA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 3112437e87f68eed1c8b46fcc860d35b9e63ef6a49e0791d254e1ac441c4c7c1
                                                            • Instruction ID: 6be718a3d7502afae3f8289a6405d621ff3df5ee05d6df2cd9098b490aa62011
                                                            • Opcode Fuzzy Hash: 3112437e87f68eed1c8b46fcc860d35b9e63ef6a49e0791d254e1ac441c4c7c1
                                                            • Instruction Fuzzy Hash: 2D1136B69002488FCB10CFA9D984BDEFBF4AF88314F14842ED415A7640C374A949CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetTimer.USER32(?,049E6190,?,?,?,?,?,?,?,06C95338,00000000,?,00000000), ref: 06C954BD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.280697583.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6c90000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: Timer
                                                            • String ID:
                                                            • API String ID: 2870079774-0
                                                            • Opcode ID: 5c4f3c0664b42394932dfb77f882e9119eb0c10978ef7bd2ecd26ff45caaf5a1
                                                            • Instruction ID: 187938a3a21320ecfd7dc9d874e6fc3913209726839fedafd460df2a840c6bc4
                                                            • Opcode Fuzzy Hash: 5c4f3c0664b42394932dfb77f882e9119eb0c10978ef7bd2ecd26ff45caaf5a1
                                                            • Instruction Fuzzy Hash: 9111F2B58003489FDB60DF99D889BDEFBF8EB48324F20841AE555A7610D374AA44CFB1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetTimer.USER32(?,049E6190,?,?,?,?,?,?,?,06C95338,00000000,?,00000000), ref: 06C954BD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.280697583.0000000006C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6c90000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: Timer
                                                            • String ID:
                                                            • API String ID: 2870079774-0
                                                            • Opcode ID: abc077311710d4f2eb2c793520131865b2c6bf5877d21420e48b9ffdb13db06c
                                                            • Instruction ID: a142f5a8e3474e7b4818e2dc179d9adf6740dcd62fdb90307513edc820f3586e
                                                            • Opcode Fuzzy Hash: abc077311710d4f2eb2c793520131865b2c6bf5877d21420e48b9ffdb13db06c
                                                            • Instruction Fuzzy Hash: B71103B58003499FDB50DF9AD889BDEBBF8EB48324F50841AE519A7700C378A954CFB1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02509C2E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: b17ae1832e67f5f6d73b421121d09aeb1e2238f5eac535de5ed0e0fc164395db
                                                            • Instruction ID: 70055fa48076f56a899cad4cd9f701cb19ef1ef0e83762b1e438d98aa542ceb4
                                                            • Opcode Fuzzy Hash: b17ae1832e67f5f6d73b421121d09aeb1e2238f5eac535de5ed0e0fc164395db
                                                            • Instruction Fuzzy Hash: 661102B2D002498FCB10CF9AC844BDEFBF4BF88224F14842AD419A7610C374A545CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba178db22f5a9916787aec58636cd223cb65060a2e84e98e2d65957efef19d7c
                                                            • Instruction ID: 0a1af30eb364cfc1d1ed4d3e428d8d8e2d32b25a4dbeee0a1a3f095a6211cc2d
                                                            • Opcode Fuzzy Hash: ba178db22f5a9916787aec58636cd223cb65060a2e84e98e2d65957efef19d7c
                                                            • Instruction Fuzzy Hash: 5681FB31E2070A8FCB10DF69C980999F7F1FF99300F21C756E519BB251EB70AA958B80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf348918a61615fddc402d7d907e8334b5918088d9a346c1e05c7155398a3c0b
                                                            • Instruction ID: 04e830c1c48d81444f373c9633c985b0a63c8d22066050823f80328ad62d90b6
                                                            • Opcode Fuzzy Hash: bf348918a61615fddc402d7d907e8334b5918088d9a346c1e05c7155398a3c0b
                                                            • Instruction Fuzzy Hash: D381EE31E2070A8FCB14DF69C990599F7B1FF99300F21C756E519BB251EB70AA95CB80
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0b574db27fd30228b7a1bff918b1c86c0f239e944e9752bb4129d5933712da5a
                                                            • Instruction ID: c22f2f1069740b9f072ff6e4512adc4f951841f97c0553f875e36802bfbc222d
                                                            • Opcode Fuzzy Hash: 0b574db27fd30228b7a1bff918b1c86c0f239e944e9752bb4129d5933712da5a
                                                            • Instruction Fuzzy Hash: 9171E474E002099FDB14DFA9D484ADEBBF1FF88315F14C469E415A7390DB35A84ADB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 673b96f930636ecfc136631e5ac69d9d96bbb26e27db85ce3fcae51cc345b4d8
                                                            • Instruction ID: a9daa475aa4b29a45d5c22c2a652f05379109689e668cc9e02c779040ed6fa43
                                                            • Opcode Fuzzy Hash: 673b96f930636ecfc136631e5ac69d9d96bbb26e27db85ce3fcae51cc345b4d8
                                                            • Instruction Fuzzy Hash: EB610635D00609DEDB05EFA8C8509EDFBB1FF89300F00C65AE5556B265EB70AA86DB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6633d4dc90e6402b9bfad47ec2740dc1d147cd4df053d33066e35c22e683f82
                                                            • Instruction ID: 9a52bdf22cf7853d2304517c2b769c88bde461eba76fc2d13d86a14690280c64
                                                            • Opcode Fuzzy Hash: b6633d4dc90e6402b9bfad47ec2740dc1d147cd4df053d33066e35c22e683f82
                                                            • Instruction Fuzzy Hash: A6610635D00609DEDB05EFE8C8449EEFBB1FF89300F00C65AE5556B265EB70AA85DB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a87496a6816704a16d55c271713449fe9b9502263ce0eafe70b051564854086c
                                                            • Instruction ID: 529c5fdd91dbdeb64a4c9020d51b95dbf27fef8e5dd904fae359ca80464bdde6
                                                            • Opcode Fuzzy Hash: a87496a6816704a16d55c271713449fe9b9502263ce0eafe70b051564854086c
                                                            • Instruction Fuzzy Hash: 3A514C35F006088FDB14DFA8C88499DBBF6FF89704B148569E509AB361DB71ED46DB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1d688147debf63cf9f08145360d2b67058f2d0fe67026179ad5a4e1ee9b0406f
                                                            • Instruction ID: 502d0d05fb3d4380638a675bce9ea6b5527dcf35cdd2e9f157121c0a59d4e625
                                                            • Opcode Fuzzy Hash: 1d688147debf63cf9f08145360d2b67058f2d0fe67026179ad5a4e1ee9b0406f
                                                            • Instruction Fuzzy Hash: 01515A35F006048FDB14EFA8C88499DBBF6FF89304B1585A9E509AB361EB71ED46DB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c8259787bb2adb9f85c9370f4e3bd3a22b88c3a23cb0235da4eae346615f321
                                                            • Instruction ID: 372b5cfaec986728eefc89fbc805bd43896023ecaac1f217730c274ce39ee43d
                                                            • Opcode Fuzzy Hash: 8c8259787bb2adb9f85c9370f4e3bd3a22b88c3a23cb0235da4eae346615f321
                                                            • Instruction Fuzzy Hash: F051C375E0020ADFCF14DFA8D58099EB7F1FF89314F10C96AE815AB240E730A955DBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b8e9fbe2d701a5f4fd1127923da586bf483f12bcf5cd12b75753cf900397b308
                                                            • Instruction ID: 943a021c1e144f7da3c3caa1cedbda768c719ebf0881de7af9d0e53867fa4a22
                                                            • Opcode Fuzzy Hash: b8e9fbe2d701a5f4fd1127923da586bf483f12bcf5cd12b75753cf900397b308
                                                            • Instruction Fuzzy Hash: 573159307006109FDB24EB79C8549AE7BF9EFC6664B1044A9E406CB3A1DF74EC06D761
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dab2c32f4a58e7511c4ccb20f2858650a0646af113b30c3630947ccdf90abee0
                                                            • Instruction ID: ad8676ea168b6d05d27fdfebdf1fb0809a1661c484290808af48fb12d4dc5785
                                                            • Opcode Fuzzy Hash: dab2c32f4a58e7511c4ccb20f2858650a0646af113b30c3630947ccdf90abee0
                                                            • Instruction Fuzzy Hash: 9F319034B001018FDB64EF69C894A6AB7F6FFC5308B648569D905CB3A5DB71EC06CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fbc05cda41993e69cf019897df430537e29ee790d47e4b0a0cbf183b5664b8fc
                                                            • Instruction ID: f366eb9fab3e57d9a53766e7b6b617029168ce893da8a1b1caaedde6fc6d423b
                                                            • Opcode Fuzzy Hash: fbc05cda41993e69cf019897df430537e29ee790d47e4b0a0cbf183b5664b8fc
                                                            • Instruction Fuzzy Hash: 6931B339700201CFDB24EF68C894A69B7B6FFC5308B1485B9D405CB2A2CB71EC06DB60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eb75d7f717061ba153c45dd6597f54f3b1d24d1e744af7ff73eeedea83850b4b
                                                            • Instruction ID: 07d58711c7c889ded9b0595c78d97d9277e54dcebb9c1a5a49ed3e9ce21f6e89
                                                            • Opcode Fuzzy Hash: eb75d7f717061ba153c45dd6597f54f3b1d24d1e744af7ff73eeedea83850b4b
                                                            • Instruction Fuzzy Hash: 84119435B005108BDB149B6DE44446DB3D7EFC8626718887AD00AC73A0CF35EC83E741
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d82fbb163d69cdd38a57b79f9dc9b1ee130e62e0e517d7fa24e93ea148d05d2d
                                                            • Instruction ID: 9d54c1fd2b8de529c359544cffb5b6cf6b8866806f25c95cad39967c07a39bb9
                                                            • Opcode Fuzzy Hash: d82fbb163d69cdd38a57b79f9dc9b1ee130e62e0e517d7fa24e93ea148d05d2d
                                                            • Instruction Fuzzy Hash: 1D21C3302053808FE724EB34C454ADA77E1AF8A269F0484ADD54E8B361CF75FC4AD7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a22a8fe29e725339ba9ed7bd65a7d5367b6c3bdb4456495b6f05c728bf7956c2
                                                            • Instruction ID: 6466eb0498ad42e577826397b6e7d1dcea43428f1c1eb38dfa462ad5e788cc96
                                                            • Opcode Fuzzy Hash: a22a8fe29e725339ba9ed7bd65a7d5367b6c3bdb4456495b6f05c728bf7956c2
                                                            • Instruction Fuzzy Hash: 0C01C032B0112687DB26B6A989601EEB3B79FC8710F14446ACA01A7380DEB96D8347A5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccce585615286ad402894b31e7f5982cf78db29ef11e1f05cef62915c1818d5a
                                                            • Instruction ID: 01c39a17efcd2d2c8b0c89580f6a8a6c0a344441fe95d4baa23ec3e8c6217202
                                                            • Opcode Fuzzy Hash: ccce585615286ad402894b31e7f5982cf78db29ef11e1f05cef62915c1818d5a
                                                            • Instruction Fuzzy Hash: AC01D432B0122487DF2566A985205EFB6BB9FC8601F14406ACA01A73C0DFB56D4246A5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06572fe6649ad5dfe88d477ce63dfbad10da08c0c7cc3f5a4f2042be33e36f74
                                                            • Instruction ID: a0501cdd4cea421ebc83b2553dda5622331d66d7a6683ac7f17d98d9604c3fd9
                                                            • Opcode Fuzzy Hash: 06572fe6649ad5dfe88d477ce63dfbad10da08c0c7cc3f5a4f2042be33e36f74
                                                            • Instruction Fuzzy Hash: 6FF0F63378192747FB3976AC79840ED77C5CBC1776344896AD10DC64D1CA09A9836282
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3a9e2ffa954a497cd28504e8dc966f189e6754e51cf7abf9bed0dcc01fb947e
                                                            • Instruction ID: 07edb68609d17aead0a7bd2db8f5135bcc72b0f2b65e2c6f3a2dc4c9d3fa7078
                                                            • Opcode Fuzzy Hash: d3a9e2ffa954a497cd28504e8dc966f189e6754e51cf7abf9bed0dcc01fb947e
                                                            • Instruction Fuzzy Hash: 240169B9208601AFE710EF59D88099ABBE6EB8D224310C42AE44EC7762D634E8128790
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c3b9f3032ad3113b89a5ef2cfde3ea714468d8a6beef12adab58b8d469e6958
                                                            • Instruction ID: 87c7d9d322e4a49bfd9c54c9d58282f678cb117cbd733b7b42e39decb8bf2811
                                                            • Opcode Fuzzy Hash: 9c3b9f3032ad3113b89a5ef2cfde3ea714468d8a6beef12adab58b8d469e6958
                                                            • Instruction Fuzzy Hash: 17F02B2074837217FB2926A6AC113AE379A5FC5708F04841EC582C71C3CF58B843A7CB
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f943f23830a8472c671c5b0e5cc342d43b076ff0451f4f738cf8c474e6b8a4cd
                                                            • Instruction ID: 087ee7342601a7c400effd03dd05342a6400ef58b69d78e29c2030cb3d822dc2
                                                            • Opcode Fuzzy Hash: f943f23830a8472c671c5b0e5cc342d43b076ff0451f4f738cf8c474e6b8a4cd
                                                            • Instruction Fuzzy Hash: ECF06D7A300600AFA714EF5ED88095BBBEAEF88328310C82AF54ED7760D630FC119790
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec621478a2321de823715f5a57e8f9ecdb079e897724333a27273e18e0c93ae0
                                                            • Instruction ID: 350cfaea156b6d7094ec38232165ff0ed6739c3d07701ab75f13e6ac5637c30e
                                                            • Opcode Fuzzy Hash: ec621478a2321de823715f5a57e8f9ecdb079e897724333a27273e18e0c93ae0
                                                            • Instruction Fuzzy Hash: C0F027383541504FD305A72CD84CC9C77EAEFCAA7471980BAE409CB363CE64AC038790
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d78357b531082361c24c2d81c7a96ef6dd61523720ba31da417e92087f53459
                                                            • Instruction ID: 4113d960553aebd5febc22f01f2c94ffe210bd63656fe0e36c6e0318999c9e69
                                                            • Opcode Fuzzy Hash: 7d78357b531082361c24c2d81c7a96ef6dd61523720ba31da417e92087f53459
                                                            • Instruction Fuzzy Hash: AEF0A72070462257EB6926AA9C1536F318A5FC5704F04C81DD546866C1DF58BC43A7DB
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 357f52bd49dba5749d351bbec190a935220182383a50f1766edb89be4ecdddfa
                                                            • Instruction ID: 241b53b601a947f0e070c881750561f56f3cf3da686d5b3b6515db944491c610
                                                            • Opcode Fuzzy Hash: 357f52bd49dba5749d351bbec190a935220182383a50f1766edb89be4ecdddfa
                                                            • Instruction Fuzzy Hash: D0F065763441106F9514A76DD888D6BB7EDEFC9A7931105AAF609C73B1CA60AC01C6B4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d158e921ea1e328ea30d75765b99445f4806888c267f57b53c930ff1207288f
                                                            • Instruction ID: 78afd6d3c03b06997aeb45e6b0412f5e95f7c35b0a4010144b835cad92774169
                                                            • Opcode Fuzzy Hash: 7d158e921ea1e328ea30d75765b99445f4806888c267f57b53c930ff1207288f
                                                            • Instruction Fuzzy Hash: 73F049342006108FD764DF38D444B9A73E6EF89728F008868E51E9B360CF71FC498B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5abcd22f000d2a3d4be6e9ba368b59c456a029f0f1791f4b640ea7fd0391a72a
                                                            • Instruction ID: 758516ab2a516a1853c6dc0014d386d0b797e74187be0b8ffdc2ee0aa50001e7
                                                            • Opcode Fuzzy Hash: 5abcd22f000d2a3d4be6e9ba368b59c456a029f0f1791f4b640ea7fd0391a72a
                                                            • Instruction Fuzzy Hash: 8AE04C4169E6D34FE30273AA19951C45FE249734A039D409BC141CB157E84D49879313
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2498a2b7b1a09a41f98efcd5627b88c923121f33782cc3f5433274f7422ca79
                                                            • Instruction ID: d1715e6a97b44532730a51502978fc4a6a33ce004d01d1f6c7142cc7eab6223a
                                                            • Opcode Fuzzy Hash: b2498a2b7b1a09a41f98efcd5627b88c923121f33782cc3f5433274f7422ca79
                                                            • Instruction Fuzzy Hash: 3DF0A0306493018FE724AB7490545D837E19F4A259B0840BEC40ACB276DAB6AC42D751
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba0d33e417d43f198292909b33a03ad7b7acb0ab518a2c7260b5c458245715ec
                                                            • Instruction ID: 695ce1d215f53e0c4e40445ef12b7450ed0721dad19334934fcd9154b31bdc73
                                                            • Opcode Fuzzy Hash: ba0d33e417d43f198292909b33a03ad7b7acb0ab518a2c7260b5c458245715ec
                                                            • Instruction Fuzzy Hash: 1EE092303403008BDB28AB78E0549E973E5EF8835AF0400BED40EC7260CF71AC41DB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e4264490d64bb92f48384161ceae3ea941b9cbd0770699c3b82c3fbb80a3f877
                                                            • Instruction ID: 3b0ca2940735638c9d1246ddf3ddaa559725805c46dfe869e14de1178262025e
                                                            • Opcode Fuzzy Hash: e4264490d64bb92f48384161ceae3ea941b9cbd0770699c3b82c3fbb80a3f877
                                                            • Instruction Fuzzy Hash: 1BE012393104108FC704AB5DD448C69B7EAEBCD63571580BAE509C7361CE70AC028B90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 925da474ebcb7c6df7b2e922fc6374dac4993fe3532a40f3f20661738404ea73
                                                            • Instruction ID: 9b39f84bcc52efce7406584bc155854d960f44ba070de7e29bb44dd75cca79be
                                                            • Opcode Fuzzy Hash: 925da474ebcb7c6df7b2e922fc6374dac4993fe3532a40f3f20661738404ea73
                                                            • Instruction Fuzzy Hash: 21E0EC35248691CFD705DB28E49CF647F91EFC2229F1941FED1488B66BCB26640AC704
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e8c30e9a713d52c59cc7c0c1eaad14f81aa1d6765829efb0098d4f2c0287dd7
                                                            • Instruction ID: fb23df363cec10e3ec5ee4a5c694f8d571ae246af6f86a79ec33ae57054d4814
                                                            • Opcode Fuzzy Hash: 5e8c30e9a713d52c59cc7c0c1eaad14f81aa1d6765829efb0098d4f2c0287dd7
                                                            • Instruction Fuzzy Hash: 80C04C4559D7831AF71276A16C612A07B516B52149BCD00A580D14545BD84C12464211
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8df5117e4f9d18334eb873454a3bf914d14251f87346d3b792824faa9ec06c4c
                                                            • Instruction ID: 2d322dccd9a46f44e6b7727a397ab6e2c3905229b95ce7999904896bbb765bc6
                                                            • Opcode Fuzzy Hash: 8df5117e4f9d18334eb873454a3bf914d14251f87346d3b792824faa9ec06c4c
                                                            • Instruction Fuzzy Hash: 88B092204082C2CAFE1066E1E4982C92BA1DBD0388F545131C543905908E2FA843C085
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4ac676cdc2f0f34a853016d28e6aadbcd249dab923288d57f879f86a98f21d1a
                                                            • Instruction ID: 02d0f1537d1f46dc7ab36d72b68026054d2621576a7bc58d71fade00ab4b8767
                                                            • Opcode Fuzzy Hash: 4ac676cdc2f0f34a853016d28e6aadbcd249dab923288d57f879f86a98f21d1a
                                                            • Instruction Fuzzy Hash: 54A21A31E006198FDB15EF68C8546EDB7B2FF89304F1482A9D90AB7251EB74AE85CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 871ec05a1d1b7ff9e9e6d0368cfa56cf41e3ba5e03cd4e015872ac3321d97c2f
                                                            • Instruction ID: b985143bb65e89925956ad21805c7e0f42aa391ccfdc57294dff78985e876884
                                                            • Opcode Fuzzy Hash: 871ec05a1d1b7ff9e9e6d0368cfa56cf41e3ba5e03cd4e015872ac3321d97c2f
                                                            • Instruction Fuzzy Hash: EE822931E002598FDB15EF68C8546EDB7B2FF89304F1482A9D90AB7291EB746E85CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e8cfb35ed01b22d76d2e4ebee5aa9c1cbe4a09da7539b7980a2767551201233b
                                                            • Instruction ID: 6bb85341705f96eb5dd1244d395893d8142ca53b910c64c2402104721a9595db
                                                            • Opcode Fuzzy Hash: e8cfb35ed01b22d76d2e4ebee5aa9c1cbe4a09da7539b7980a2767551201233b
                                                            • Instruction Fuzzy Hash: A512D4F141A746EBD310CFA6E9882893FA1F74433CB964228D2611FAD1D7BC194AEF54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 83b64dcf98a681172b97a8f8a9b6d4b1530ff29563410adbd71c95078ee3267e
                                                            • Instruction ID: 7ad3c74bf4f8318f8d997553e25b7eeb6ee8a140f040e72469ecd2e4277729a4
                                                            • Opcode Fuzzy Hash: 83b64dcf98a681172b97a8f8a9b6d4b1530ff29563410adbd71c95078ee3267e
                                                            • Instruction Fuzzy Hash: E2A14F32E0061ACFCF05DFA5C8845DDBBB2FF89304B25856AE905AB2A1DB35E955CF40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.271027413.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2500000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4ebb6460a07548fdb1da1f5dbfc8eac3feb11ca729ec4c03b8fb8d8f835657c3
                                                            • Instruction ID: 9b46c5c68da21865ddc36ea343b50c797933d1d0933e44f27a8c200d9a26a3b3
                                                            • Opcode Fuzzy Hash: 4ebb6460a07548fdb1da1f5dbfc8eac3feb11ca729ec4c03b8fb8d8f835657c3
                                                            • Instruction Fuzzy Hash: 71C118B181A746EBD710CFA6E8881893F61FB8433CF524228D2616F6D0D7BC194ADF54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.277571508.0000000004F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4f00000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k$$%k
                                                            • API String ID: 0-2385108095
                                                            • Opcode ID: 02d26d1c09f19e13675d26ef8c1192d51dde76a967423863832e15426bcddb9e
                                                            • Instruction ID: 296800e4d9b44fcc5b71409445a678f68606d82df9ccb666f21a67173ebc07e1
                                                            • Opcode Fuzzy Hash: 02d26d1c09f19e13675d26ef8c1192d51dde76a967423863832e15426bcddb9e
                                                            • Instruction Fuzzy Hash: 0EE12F70B006019B9F15BFB958A11ADA2938FC0348354C87D980AAF7CBDF78FD0A9791
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:11.1%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:15%
                                                            Total number of Nodes:20
                                                            Total number of Limit Nodes:1
                                                            execution_graph 7472 67e3060 7473 67e3070 KiUserExceptionDispatcher 7472->7473 7477 67e314c 7473->7477 7475 67e3471 7476 67e2ad8 KiUserExceptionDispatcher 7476->7477 7477->7475 7477->7476 7514 67e2ecc 7515 67e2eab 7514->7515 7516 67e2de1 LdrInitializeThunk 7515->7516 7517 67e2dee 7515->7517 7516->7517 7530 67e2ac9 7531 67e2aff 7530->7531 7532 67e2c2a KiUserExceptionDispatcher 7531->7532 7533 67e2c1b 7531->7533 7532->7533 7336 67e2f2c 7337 67e2eab 7336->7337 7339 67e2dee 7336->7339 7338 67e2de1 LdrInitializeThunk 7337->7338 7337->7339 7338->7339 7636 67e2d81 7637 67e2db8 LdrInitializeThunk 7636->7637 7639 67e2dee 7637->7639

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 483 67e3070-67e3090 485 67e3097-67e3144 KiUserExceptionDispatcher 483->485 486 67e3092 483->486 491 67e314c-67e315a 485->491 486->485 492 67e3472-67e34a4 491->492 493 67e3160-67e3177 call 67e2958 491->493 497 67e317e-67e3187 493->497 498 67e3179 493->498 499 67e3465-67e346b 497->499 498->497 500 67e318c-67e3202 call 67e2ad8 * 3 call 67e2fd8 499->500 501 67e3471 499->501 510 67e32be-67e3318 call 67e2ad8 500->510 511 67e3208-67e3276 500->511 501->492 523 67e3319-67e3367 510->523 521 67e3278-67e32b8 511->521 522 67e32b9-67e32bc 511->522 521->522 522->523 528 67e336d-67e344f 523->528 529 67e3450-67e345b 523->529 528->529 530 67e345d 529->530 531 67e3462 529->531 530->531 531->499
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E313B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 4d197f6cf6168484a1d56a4e99412880f241fe4a254966924ee39e2126d26171
                                                            • Instruction ID: c2eb6ba486f4fd658b9878593969379f853b373aac377917ddec494f59b844a5
                                                            • Opcode Fuzzy Hash: 4d197f6cf6168484a1d56a4e99412880f241fe4a254966924ee39e2126d26171
                                                            • Instruction Fuzzy Hash: 1DC1B174E00218CFDB64DFA5D884BADBBB2FB89304F2080A9D409AB354DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E7B13
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 793a6042e9c14a6112947101c81a24be0a936b3a1635777b94737bad894f36c0
                                                            • Instruction ID: c99ce0db57769e836610be3dd301879c259a8e630747a5b3960cfd9e01f6ef74
                                                            • Opcode Fuzzy Hash: 793a6042e9c14a6112947101c81a24be0a936b3a1635777b94737bad894f36c0
                                                            • Instruction Fuzzy Hash: 8CC1A074E01218CFDB64DFA9D994B9DBBB2FB89304F2080A9D409AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1145 67e6038-67e6058 1146 67e605f-67e610c KiUserExceptionDispatcher 1145->1146 1147 67e605a 1145->1147 1152 67e6114-67e6122 1146->1152 1147->1146 1153 67e643a-67e646c 1152->1153 1154 67e6128-67e613f call 67e2958 1152->1154 1158 67e6146-67e614f 1154->1158 1159 67e6141 1154->1159 1160 67e642d-67e6433 1158->1160 1159->1158 1161 67e6439 1160->1161 1162 67e6154-67e61ca call 67e2ad8 * 3 call 67e2fd8 1160->1162 1161->1153 1171 67e6286-67e62e0 call 67e2ad8 1162->1171 1172 67e61d0-67e623e 1162->1172 1184 67e62e1-67e632f 1171->1184 1182 67e6240-67e6280 1172->1182 1183 67e6281-67e6284 1172->1183 1182->1183 1183->1184 1189 67e6418-67e6423 1184->1189 1190 67e6335-67e6417 1184->1190 1192 67e642a 1189->1192 1193 67e6425 1189->1193 1190->1189 1192->1160 1193->1192
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E6103
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 9a8d6d82a79cd7ca83f7aa55091d6ed30de5d60cf407d77d4a47e4fd317232e5
                                                            • Instruction ID: 887396c0f8ab4ce52349c5fddd99aa499f27181e3a03b9f4d0783d1edb8c8bd1
                                                            • Opcode Fuzzy Hash: 9a8d6d82a79cd7ca83f7aa55091d6ed30de5d60cf407d77d4a47e4fd317232e5
                                                            • Instruction Fuzzy Hash: C1C19F74E01218CFDB64DFA5D994BADBBB2EF89304F2080A9D409AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EF903
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 39161982d17fa0beb720552aa6e761b8886b6f09e7ce221831e9d6be140455fc
                                                            • Instruction ID: cf01bdd5b35559b445bd0c79959ae047d25f63daa860641c3bced55a4173d8e8
                                                            • Opcode Fuzzy Hash: 39161982d17fa0beb720552aa6e761b8886b6f09e7ce221831e9d6be140455fc
                                                            • Instruction Fuzzy Hash: EFC1A174E01218CFDB64DFA5D984B9DBBB2FB89304F2081A9D809AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 785 67e4628-67e4648 786 67e464f-67e46fc KiUserExceptionDispatcher 785->786 787 67e464a 785->787 792 67e4704-67e4712 786->792 787->786 793 67e4a2a-67e4a5c 792->793 794 67e4718-67e472f call 67e2958 792->794 798 67e4736-67e473f 794->798 799 67e4731 794->799 800 67e4a1d-67e4a23 798->800 799->798 801 67e4a29 800->801 802 67e4744-67e47ba call 67e2ad8 * 3 call 67e2fd8 800->802 801->793 811 67e4876-67e48d0 call 67e2ad8 802->811 812 67e47c0-67e482e 802->812 824 67e48d1-67e491f 811->824 822 67e4830-67e4870 812->822 823 67e4871-67e4874 812->823 822->823 823->824 829 67e4a08-67e4a13 824->829 830 67e4925-67e4a07 824->830 832 67e4a1a 829->832 833 67e4a15 829->833 830->829 832->800 833->832
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E46F3
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: fd247f1782d762d6028516fc4cf0c13ff5533b16e161bf589687127d1080d20a
                                                            • Instruction ID: 89b1d3b8c8b1ef92e8badbde6da83b330d5ad50e1a7b86bb07d1b86fca390e48
                                                            • Opcode Fuzzy Hash: fd247f1782d762d6028516fc4cf0c13ff5533b16e161bf589687127d1080d20a
                                                            • Instruction Fuzzy Hash: 36C19F74E01218CFDB64DFA5D994BADBBB2FB89304F2080A9D419AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EDECB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: e33eec0de464726a6a990cdb4c6fd340fde918de388d488e1b9fe30597174966
                                                            • Instruction ID: 2b2f408b3c88e19f3e59fd9584ffd1939164b277836b3e5fd428c4a2c67868e6
                                                            • Opcode Fuzzy Hash: e33eec0de464726a6a990cdb4c6fd340fde918de388d488e1b9fe30597174966
                                                            • Instruction Fuzzy Hash: 93C19F74E00218CFDB64DFA5D994B9DBBB2EF89304F2080A9D419AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E83C3
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 8f9dbe652913dc3bc7ceb18950409a79255ed7ccf1fce45e0313cb9dc0c05f2b
                                                            • Instruction ID: 89f059ad381e1614fa5150a968e31b23f5d37f4094462f235806e8cef13a6b6d
                                                            • Opcode Fuzzy Hash: 8f9dbe652913dc3bc7ceb18950409a79255ed7ccf1fce45e0313cb9dc0c05f2b
                                                            • Instruction Fuzzy Hash: ACC1B074E00218CFDB64DFA5D994BADBBB2FB89304F2080A9D409AB355DB385E85CF11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1265 67e68e8-67e6908 1266 67e690f-67e69bc KiUserExceptionDispatcher 1265->1266 1267 67e690a 1265->1267 1272 67e69c4-67e69d2 1266->1272 1267->1266 1273 67e6cea-67e6d1c 1272->1273 1274 67e69d8-67e69ef call 67e2958 1272->1274 1278 67e69f6-67e69ff 1274->1278 1279 67e69f1 1274->1279 1280 67e6cdd-67e6ce3 1278->1280 1279->1278 1281 67e6ce9 1280->1281 1282 67e6a04-67e6a7a call 67e2ad8 * 3 call 67e2fd8 1280->1282 1281->1273 1291 67e6b36-67e6b90 call 67e2ad8 1282->1291 1292 67e6a80-67e6aee 1282->1292 1304 67e6b91-67e6bdf 1291->1304 1302 67e6af0-67e6b30 1292->1302 1303 67e6b31-67e6b34 1292->1303 1302->1303 1303->1304 1309 67e6cc8-67e6cd3 1304->1309 1310 67e6be5-67e6cc7 1304->1310 1311 67e6cda 1309->1311 1312 67e6cd5 1309->1312 1310->1309 1311->1280 1312->1311
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E69B3
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 24cffde6cc475b1412f0fd622cc61cf529746f75b41e5e3244a783b07f1e07d4
                                                            • Instruction ID: 91a94d3ce91858b0ac980888af1b738f1d828728c71a8fd1e812c70ae31fd2b3
                                                            • Opcode Fuzzy Hash: 24cffde6cc475b1412f0fd622cc61cf529746f75b41e5e3244a783b07f1e07d4
                                                            • Instruction Fuzzy Hash: 60C1A074E01218CFDB64DFA5D994BADBBB2FB89304F2081A9D409AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EE7A3
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 7508a746a0b17662c48f0b8a23d6e489428a0bd11c15a8e9648f3e6f200ea99e
                                                            • Instruction ID: bbfb8da8a503c09a51bd2f62a1fb4e345c58a39ed9e38a3357e5a472ff00ccf4
                                                            • Opcode Fuzzy Hash: 7508a746a0b17662c48f0b8a23d6e489428a0bd11c15a8e9648f3e6f200ea99e
                                                            • Instruction Fuzzy Hash: 14C19174E01218CFDB64DFA5D984BADBBB2FB89304F2080A9D409AB355DB355E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 905 67e4ed8-67e4ef8 906 67e4eff-67e4fac KiUserExceptionDispatcher 905->906 907 67e4efa 905->907 912 67e4fb4-67e4fc2 906->912 907->906 913 67e52da-67e530c 912->913 914 67e4fc8-67e4fdf call 67e2958 912->914 918 67e4fe6-67e4fef 914->918 919 67e4fe1 914->919 920 67e52cd-67e52d3 918->920 919->918 921 67e52d9 920->921 922 67e4ff4-67e506a call 67e2ad8 * 3 call 67e2fd8 920->922 921->913 931 67e5126-67e5180 call 67e2ad8 922->931 932 67e5070-67e50de 922->932 944 67e5181-67e51cf 931->944 942 67e50e0-67e5120 932->942 943 67e5121-67e5124 932->943 942->943 943->944 949 67e52b8-67e52c3 944->949 950 67e51d5-67e52b7 944->950 952 67e52ca 949->952 953 67e52c5 949->953 950->949 952->920 953->952
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E4FA3
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 7945fc2d86d124967bdcc10664cabe64cb667f41ab33275a51c9289dc30f75df
                                                            • Instruction ID: 61f55889a5b22ca04a6732817e7f60ee982555bb951caadc3e73918b714a2352
                                                            • Opcode Fuzzy Hash: 7945fc2d86d124967bdcc10664cabe64cb667f41ab33275a51c9289dc30f75df
                                                            • Instruction Fuzzy Hash: 95C1AF74E01218CFDB64DFA5D994BADBBB2FB89304F2080A9D409AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 544 67e34c8-67e34e8 545 67e34ef-67e359c KiUserExceptionDispatcher 544->545 546 67e34ea 544->546 551 67e35a4-67e35b2 545->551 546->545 552 67e38ca-67e38fc 551->552 553 67e35b8-67e35cf call 67e2958 551->553 557 67e35d6-67e35df 553->557 558 67e35d1 553->558 559 67e38bd-67e38c3 557->559 558->557 560 67e38c9 559->560 561 67e35e4-67e365a call 67e2ad8 * 3 call 67e2fd8 559->561 560->552 570 67e3716-67e3770 call 67e2ad8 561->570 571 67e3660-67e36ce 561->571 583 67e3771-67e37bf 570->583 581 67e36d0-67e3710 571->581 582 67e3711-67e3714 571->582 581->582 582->583 588 67e38a8-67e38b3 583->588 589 67e37c5-67e38a7 583->589 591 67e38ba 588->591 592 67e38b5 588->592 589->588 591->559 592->591
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E3593
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 1c75d5b5b9b19ead98cfb3cca85d8009789886f72fb27cc8ebb2b4993054d7ae
                                                            • Instruction ID: 5f5ad8d37d2270a6a9a0fcf55b3cad7098ff352c84bd048a3b68808be5361a97
                                                            • Opcode Fuzzy Hash: 1c75d5b5b9b19ead98cfb3cca85d8009789886f72fb27cc8ebb2b4993054d7ae
                                                            • Instruction Fuzzy Hash: 88C1B274E00218CFDB64DFA5D884BADBBB2FB89314F2080A9D409AB355DB345E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E7F6B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 7d67da203f2df9c5528e5d43fd9e67609918ed26b2187b206dcf051e2550d6b5
                                                            • Instruction ID: ad6eebae492e9f00b1c5b49892ef09dc8eddc18899a4423459c055171e203321
                                                            • Opcode Fuzzy Hash: 7d67da203f2df9c5528e5d43fd9e67609918ed26b2187b206dcf051e2550d6b5
                                                            • Instruction Fuzzy Hash: 90C1A074E01218CFDB64DFA5D994BADBBB2FB89304F2080A9D419AB354DB385E85CF11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1205 67e6490-67e64b0 1206 67e64b7-67e6564 KiUserExceptionDispatcher 1205->1206 1207 67e64b2 1205->1207 1212 67e656c-67e657a 1206->1212 1207->1206 1213 67e6892-67e68c4 1212->1213 1214 67e6580-67e6597 call 67e2958 1212->1214 1218 67e659e-67e65a7 1214->1218 1219 67e6599 1214->1219 1220 67e6885-67e688b 1218->1220 1219->1218 1221 67e65ac-67e6622 call 67e2ad8 * 3 call 67e2fd8 1220->1221 1222 67e6891 1220->1222 1231 67e66de-67e6738 call 67e2ad8 1221->1231 1232 67e6628-67e6696 1221->1232 1222->1213 1244 67e6739-67e6787 1231->1244 1242 67e6698-67e66d8 1232->1242 1243 67e66d9-67e66dc 1232->1243 1242->1243 1243->1244 1249 67e678d-67e686f 1244->1249 1250 67e6870-67e687b 1244->1250 1249->1250 1251 67e687d 1250->1251 1252 67e6882 1250->1252 1251->1252 1252->1220
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E655B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 42b8ce640d2b5938a2bccb6ccd8e8af0d33e3f6803149e7c7db0bca2628f50b7
                                                            • Instruction ID: d88b4f8ad0df871091996881f7b5c7e24e98422d1f619a1ebfd7ae1bd2b2551c
                                                            • Opcode Fuzzy Hash: 42b8ce640d2b5938a2bccb6ccd8e8af0d33e3f6803149e7c7db0bca2628f50b7
                                                            • Instruction Fuzzy Hash: 02C1AF74E00218CFDB64DFA5D994B9DBBB2FB89304F2080A9D419AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 845 67e4a80-67e4aa0 846 67e4aa7-67e4b54 KiUserExceptionDispatcher 845->846 847 67e4aa2 845->847 852 67e4b5c-67e4b6a 846->852 847->846 853 67e4e82-67e4eb4 852->853 854 67e4b70-67e4b87 call 67e2958 852->854 858 67e4b8e-67e4b97 854->858 859 67e4b89 854->859 860 67e4e75-67e4e7b 858->860 859->858 861 67e4b9c-67e4c12 call 67e2ad8 * 3 call 67e2fd8 860->861 862 67e4e81 860->862 871 67e4cce-67e4d28 call 67e2ad8 861->871 872 67e4c18-67e4c86 861->872 862->853 884 67e4d29-67e4d77 871->884 882 67e4c88-67e4cc8 872->882 883 67e4cc9-67e4ccc 872->883 882->883 883->884 889 67e4d7d-67e4e5f 884->889 890 67e4e60-67e4e6b 884->890 889->890 891 67e4e6d 890->891 892 67e4e72 890->892 891->892 892->860
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E4B4B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 5c8e710a193c94ab423ded37e6be8adc9ad25bc7518bfece501f5dfce1a8be93
                                                            • Instruction ID: 9daca1817f67b29bc4a6cc609e47b12e7f3218783c745af1438823ed2810f1a3
                                                            • Opcode Fuzzy Hash: 5c8e710a193c94ab423ded37e6be8adc9ad25bc7518bfece501f5dfce1a8be93
                                                            • Instruction Fuzzy Hash: A9C1AF74E00218CFDB64DFA5D994BADBBB2FB89304F2081A9D409AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EE34B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 6e48345751a6d44d026201c469e3b20572148b5368650e9a4d6e9206eda832b9
                                                            • Instruction ID: 371869892646aa1e11b94474154b827e435d710ea5cbb985feceddc8304941d6
                                                            • Opcode Fuzzy Hash: 6e48345751a6d44d026201c469e3b20572148b5368650e9a4d6e9206eda832b9
                                                            • Instruction Fuzzy Hash: 7BC1A074E01218CFDB64DFA5D994B9DBBB2FB89304F2080A9D409AB354DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 664 67e3d78-67e3d98 665 67e3d9f-67e3e4c KiUserExceptionDispatcher 664->665 666 67e3d9a 664->666 671 67e3e54-67e3e62 665->671 666->665 672 67e417a-67e41ac 671->672 673 67e3e68-67e3e7f call 67e2958 671->673 677 67e3e86-67e3e8f 673->677 678 67e3e81 673->678 679 67e416d-67e4173 677->679 678->677 680 67e4179 679->680 681 67e3e94-67e3f0a call 67e2ad8 * 3 call 67e2fd8 679->681 680->672 690 67e3fc6-67e4020 call 67e2ad8 681->690 691 67e3f10-67e3f7e 681->691 703 67e4021-67e406f 690->703 701 67e3f80-67e3fc0 691->701 702 67e3fc1-67e3fc4 691->702 701->702 702->703 708 67e4158-67e4163 703->708 709 67e4075-67e4157 703->709 711 67e416a 708->711 712 67e4165 708->712 709->708 711->679 712->711
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E3E43
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: c126ac5531e2b02497ed7a07c2b495f333c6b63b523e46f195d764f1827accab
                                                            • Instruction ID: be00464f1a4b5c5fc4eba2a529c6d82542b3164f246c504f753a99e2aa622fe9
                                                            • Opcode Fuzzy Hash: c126ac5531e2b02497ed7a07c2b495f333c6b63b523e46f195d764f1827accab
                                                            • Instruction Fuzzy Hash: 33C19F74E00218CFDB64DFA9D994B9DBBB2FB89304F2080A9D419AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E881B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: b6409e06ac93fcb12c97970a83d6c61ca090d3eee70b9d3cbba0535e45995dde
                                                            • Instruction ID: b030f7e3be365cef1dbe406585ab7a22595720ee8b0121a88d93c867610f954e
                                                            • Opcode Fuzzy Hash: b6409e06ac93fcb12c97970a83d6c61ca090d3eee70b9d3cbba0535e45995dde
                                                            • Instruction Fuzzy Hash: 37C1A074E01218CFDB64DFA9D894B9DBBB2FB89304F2081A9D409AB354DB395E85CF11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E6E0B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: b6200029fbabac936e9c1feee9c73bc7d46434b9ea6bead659d925ba4bd89e93
                                                            • Instruction ID: 555aaeb3aa9fa70d01886d1386791d8ca3be454ee5bcba7cea121ae2b05b66a6
                                                            • Opcode Fuzzy Hash: b6200029fbabac936e9c1feee9c73bc7d46434b9ea6bead659d925ba4bd89e93
                                                            • Instruction Fuzzy Hash: E4C1A074E00218CFDB64DFA5D894B9DBBB2FB89304F2080A9D419AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 965 67e5330-67e5350 966 67e5357-67e5404 KiUserExceptionDispatcher 965->966 967 67e5352 965->967 972 67e540c-67e541a 966->972 967->966 973 67e5732-67e5764 972->973 974 67e5420-67e5437 call 67e2958 972->974 978 67e543e-67e5447 974->978 979 67e5439 974->979 980 67e5725-67e572b 978->980 979->978 981 67e544c-67e54c2 call 67e2ad8 * 3 call 67e2fd8 980->981 982 67e5731 980->982 991 67e557e-67e55d8 call 67e2ad8 981->991 992 67e54c8-67e5536 981->992 982->973 1004 67e55d9-67e5627 991->1004 1002 67e5538-67e5578 992->1002 1003 67e5579-67e557c 992->1003 1002->1003 1003->1004 1009 67e562d-67e570f 1004->1009 1010 67e5710-67e571b 1004->1010 1009->1010 1012 67e571d 1010->1012 1013 67e5722 1010->1013 1012->1013 1013->980
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E53FB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: ddeec232463fb9f328c8c442b1e017617d00721474379bfbc9e4a45797e5bb78
                                                            • Instruction ID: c7cc39a391ea88bf530d5e60fe3607721c8c49e55b340aaecd7a5321c948fcb8
                                                            • Opcode Fuzzy Hash: ddeec232463fb9f328c8c442b1e017617d00721474379bfbc9e4a45797e5bb78
                                                            • Instruction Fuzzy Hash: 77C1AF74E00218CFDB64DFA5D994BADBBB2FB89304F2080A9D419AB354DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EEBFB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: d94776f663ea16fd50cf00b733a97dfd4152c754df8c84ff3a0a4ba425d1c392
                                                            • Instruction ID: 9fe2e01366058599f5550a550dfbc1f5eb949b4421a8ca4de8d71d672a5d37ca
                                                            • Opcode Fuzzy Hash: d94776f663ea16fd50cf00b733a97dfd4152c754df8c84ff3a0a4ba425d1c392
                                                            • Instruction Fuzzy Hash: F1C19F74E01218CFDB64DFA9D984B9DBBB2EB89304F2080A9D419AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 604 67e3920-67e3940 605 67e3947-67e39f4 KiUserExceptionDispatcher 604->605 606 67e3942 604->606 611 67e39fc-67e3a0a 605->611 606->605 612 67e3d22-67e3d54 611->612 613 67e3a10-67e3a27 call 67e2958 611->613 617 67e3a2e-67e3a37 613->617 618 67e3a29 613->618 619 67e3d15-67e3d1b 617->619 618->617 620 67e3a3c-67e3ab2 call 67e2ad8 * 3 call 67e2fd8 619->620 621 67e3d21 619->621 630 67e3b6e-67e3bc8 call 67e2ad8 620->630 631 67e3ab8-67e3b26 620->631 621->612 643 67e3bc9-67e3c17 630->643 641 67e3b28-67e3b68 631->641 642 67e3b69-67e3b6c 631->642 641->642 642->643 648 67e3c1d-67e3cff 643->648 649 67e3d00-67e3d0b 643->649 648->649 651 67e3d0d 649->651 652 67e3d12 649->652 651->652 652->619
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E39EB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 1fa7c6c1c134c4861a9386f2e727153cdcae14866d85f727592cf540c45b6411
                                                            • Instruction ID: 320daf8567a6c56c3163cca20234bf51001440859aa7ae87df93e3a2bf891dd5
                                                            • Opcode Fuzzy Hash: 1fa7c6c1c134c4861a9386f2e727153cdcae14866d85f727592cf540c45b6411
                                                            • Instruction Fuzzy Hash: 6FC1A074E00218CFDB64DFA5D994BADBBB2FB89314F2080A9D409AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E76BB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: b4aa473db0e9d2e88a6ccb3d07792f50991c77e2440e12144546bc167edd9c3d
                                                            • Instruction ID: 8f1eddedea8a8ffeb53b4205ac00beb8a162379b2ea02e2f778157be45a3e935
                                                            • Opcode Fuzzy Hash: b4aa473db0e9d2e88a6ccb3d07792f50991c77e2440e12144546bc167edd9c3d
                                                            • Instruction Fuzzy Hash: 59C1A074E01218CFDB64DFA9D894B9DBBB2EF89304F2080A9D409AB354DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1085 67e5be0-67e5c00 1086 67e5c07-67e5cb4 KiUserExceptionDispatcher 1085->1086 1087 67e5c02 1085->1087 1092 67e5cbc-67e5cca 1086->1092 1087->1086 1093 67e5fe2-67e6014 1092->1093 1094 67e5cd0-67e5ce7 call 67e2958 1092->1094 1098 67e5cee-67e5cf7 1094->1098 1099 67e5ce9 1094->1099 1100 67e5fd5-67e5fdb 1098->1100 1099->1098 1101 67e5cfc-67e5d72 call 67e2ad8 * 3 call 67e2fd8 1100->1101 1102 67e5fe1 1100->1102 1111 67e5e2e-67e5e88 call 67e2ad8 1101->1111 1112 67e5d78-67e5de6 1101->1112 1102->1093 1124 67e5e89-67e5ed7 1111->1124 1122 67e5de8-67e5e28 1112->1122 1123 67e5e29-67e5e2c 1112->1123 1122->1123 1123->1124 1129 67e5edd-67e5fbf 1124->1129 1130 67e5fc0-67e5fcb 1124->1130 1129->1130 1131 67e5fcd 1130->1131 1132 67e5fd2 1130->1132 1131->1132 1132->1100
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E5CAB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: f44a7c310d9d8b36778f7aa70422e76f844896db36dc5d2bf524d94d06c91f1b
                                                            • Instruction ID: 7b7f956fb789e9ec4dcfd4391b5c1fa0aa2e0aedca76d6445dfd324e3630c901
                                                            • Opcode Fuzzy Hash: f44a7c310d9d8b36778f7aa70422e76f844896db36dc5d2bf524d94d06c91f1b
                                                            • Instruction Fuzzy Hash: FEC19074E00218CFDB64DFA5D994BADBBB2FB89304F2080A9D409AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EF4AB
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 380c5996135e8436b872172716a1b2374d631c5ca70202c663c502020efa952b
                                                            • Instruction ID: 14a29a5d1ca31d513b2aee7abc27fe0cbec4190e4129c3e87aaa080b4490483b
                                                            • Opcode Fuzzy Hash: 380c5996135e8436b872172716a1b2374d631c5ca70202c663c502020efa952b
                                                            • Instruction Fuzzy Hash: BBC1A074E01218CFDB64DFA9D994B9DBBB2FB89304F2080A9D409AB354DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 724 67e41d0-67e41f0 726 67e41f7-67e42a4 KiUserExceptionDispatcher 724->726 727 67e41f2 724->727 732 67e42ac-67e42ba 726->732 727->726 733 67e45d2-67e4604 732->733 734 67e42c0-67e42d7 call 67e2958 732->734 738 67e42de-67e42e7 734->738 739 67e42d9 734->739 740 67e45c5-67e45cb 738->740 739->738 741 67e42ec-67e4362 call 67e2ad8 * 3 call 67e2fd8 740->741 742 67e45d1 740->742 751 67e441e-67e4478 call 67e2ad8 741->751 752 67e4368-67e43d6 741->752 742->733 764 67e4479-67e44c7 751->764 762 67e43d8-67e4418 752->762 763 67e4419-67e441c 752->763 762->763 763->764 769 67e44cd-67e45af 764->769 770 67e45b0-67e45bb 764->770 769->770 772 67e45bd 770->772 773 67e45c2 770->773 772->773 773->740
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E429B
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 2873bdb09d0d7a1f2bfaa31e2e65e5d9c2163bd16e40cf12fc6e54377e1de4e4
                                                            • Instruction ID: 2d3c8ee0fea823ad3b3ce80c08019b7df4f1451becbff7bbd6f4ee411a47aaa2
                                                            • Opcode Fuzzy Hash: 2873bdb09d0d7a1f2bfaa31e2e65e5d9c2163bd16e40cf12fc6e54377e1de4e4
                                                            • Instruction Fuzzy Hash: 22C1AF74E00218CFDB64DFA5D994BADBBB2FB89304F2081A9D419AB355DB385E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E7263
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 75dbd6b5ec54d0eda7d9811f8c39d5fa1d48fcd5197e06c6911ae499959ed08c
                                                            • Instruction ID: 24f09ecb3502bf21b58abfdce5a28170124f66857b1aa5785282b54d3771d7bd
                                                            • Opcode Fuzzy Hash: 75dbd6b5ec54d0eda7d9811f8c39d5fa1d48fcd5197e06c6911ae499959ed08c
                                                            • Instruction Fuzzy Hash: 58C1A074E01218CFDB64DFA5D994B9DBBB2FB89304F2080A9D419AB355DB385E85CF20
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EF053
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 1e5cb796b25381cac3c3fa7bfe7feab994269b6a8215d72be969e6981ea29f4a
                                                            • Instruction ID: f267b3dd18c89986c282bcc7202bda9a177db85406097157fd984dab27f7d582
                                                            • Opcode Fuzzy Hash: 1e5cb796b25381cac3c3fa7bfe7feab994269b6a8215d72be969e6981ea29f4a
                                                            • Instruction Fuzzy Hash: F8C1AF74E01218CFDB64DFA5D984B9DBBB2FB89304F2080A9D409AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1025 67e5788-67e57a8 1026 67e57af-67e585c KiUserExceptionDispatcher 1025->1026 1027 67e57aa 1025->1027 1032 67e5864-67e5872 1026->1032 1027->1026 1033 67e5b8a-67e5bbc 1032->1033 1034 67e5878-67e588f call 67e2958 1032->1034 1038 67e5896-67e589f 1034->1038 1039 67e5891 1034->1039 1040 67e5b7d-67e5b83 1038->1040 1039->1038 1041 67e5b89 1040->1041 1042 67e58a4-67e591a call 67e2ad8 * 3 call 67e2fd8 1040->1042 1041->1033 1051 67e59d6-67e5a30 call 67e2ad8 1042->1051 1052 67e5920-67e598e 1042->1052 1064 67e5a31-67e5a7f 1051->1064 1062 67e5990-67e59d0 1052->1062 1063 67e59d1-67e59d4 1052->1063 1062->1063 1063->1064 1069 67e5b68-67e5b73 1064->1069 1070 67e5a85-67e5b67 1064->1070 1071 67e5b7a 1069->1071 1072 67e5b75 1069->1072 1070->1069 1071->1040 1072->1071
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E5853
                                                              • Part of subcall function 067E2AD8: KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 60512b4ca31b45d4bb67af3b2868948a1020efbaf390f97f901ae908f0438b4b
                                                            • Instruction ID: abae89a38cbc2559efcbb039e25869194a91becade50831c4da217b4d859e8b1
                                                            • Opcode Fuzzy Hash: 60512b4ca31b45d4bb67af3b2868948a1020efbaf390f97f901ae908f0438b4b
                                                            • Instruction Fuzzy Hash: B6C19F74E01218CFDB64DFA9D994B9DBBB2FB89304F2080A9D409AB355DB395E85CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EF903
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 2423c6b156cd0c69f11484b3a4faede4c29af2f56f0fa62feb70f6fceea7b255
                                                            • Instruction ID: df3fd45309339dd4bd47cdc6df2a0b45649196f665feec92cc908a497522ce1a
                                                            • Opcode Fuzzy Hash: 2423c6b156cd0c69f11484b3a4faede4c29af2f56f0fa62feb70f6fceea7b255
                                                            • Instruction Fuzzy Hash: 28410570E01208CBDB58DFAAD8446EEFBB2BF89300F20D12AC414BB254DB395946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EE7A3
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: a7a6fd0d31239c877ef23b3a7d79eebcfa33b31147ec9dcd6befb412943005ca
                                                            • Instruction ID: a156549645d355e12fb4969787c9ea749d1940996f083d907661f0967503ac78
                                                            • Opcode Fuzzy Hash: a7a6fd0d31239c877ef23b3a7d79eebcfa33b31147ec9dcd6befb412943005ca
                                                            • Instruction Fuzzy Hash: 2141F470E00208CBDB58DFAAD8446EEFBB2BF89304F20C13AC514AB254EB345946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EF053
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: b2ee6c30a8c8d957c9ec95f7c8af6e9f8c530ca273ef52a378ce9bae76a85825
                                                            • Instruction ID: 8758018f6dfbc945bc8787b6d8e761759407bfa9b97211f36781713f53958846
                                                            • Opcode Fuzzy Hash: b2ee6c30a8c8d957c9ec95f7c8af6e9f8c530ca273ef52a378ce9bae76a85825
                                                            • Instruction Fuzzy Hash: FD41F574E012488BDB58DFBAD4446EEFBB2AF89300F24C12AC414BB255DB385946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EDECB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: f22d0c4fcdea87fd03f0def8706e4024dea86bfd85e68116da99e8bc15ec5e89
                                                            • Instruction ID: 933a721203b3e3d4c7a086646a1c4febb1fa044a2246ad86a28195dfc336bedf
                                                            • Opcode Fuzzy Hash: f22d0c4fcdea87fd03f0def8706e4024dea86bfd85e68116da99e8bc15ec5e89
                                                            • Instruction Fuzzy Hash: 9441E270E01648CBDB58DFAAD9446EEFBF2BF89304F24C12AC414AB259DB395946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EF4AB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 23a4c80d192b06b6f23f4b09671bc7573eccb92a21206d2b0699eb90ddfe74a8
                                                            • Instruction ID: 84a183a03152f0f63ce9d5e1023f8420e7136b6d399f4448cdc742ed158134fb
                                                            • Opcode Fuzzy Hash: 23a4c80d192b06b6f23f4b09671bc7573eccb92a21206d2b0699eb90ddfe74a8
                                                            • Instruction Fuzzy Hash: 5941E370E01208CBDB58DFAAD55469EFBF2BF89304F20D12AC414AB255DB395906CF51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EE34B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: dc78ec047a2f1b3bbcbb8c5e4cd0461cc95808b857e8f544923e4bccbfcd768a
                                                            • Instruction ID: 584f3a51621a397b1f4303a772e7ce66ba32bb493c4a780de8e42f5168b880db
                                                            • Opcode Fuzzy Hash: dc78ec047a2f1b3bbcbb8c5e4cd0461cc95808b857e8f544923e4bccbfcd768a
                                                            • Instruction Fuzzy Hash: 5741E271E01608CBDB58DFAAD9446AEFBB2BF89304F20C12AC414BB254EB385906CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E83C3
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 28082f24bd76078cfeba7186707e9283fd948972934e1f1b1c59d551153a2f02
                                                            • Instruction ID: f94a48a55cbcc27e65aa4af239a1d43fceaec2dd8b81dea204413c98ac031981
                                                            • Opcode Fuzzy Hash: 28082f24bd76078cfeba7186707e9283fd948972934e1f1b1c59d551153a2f02
                                                            • Instruction Fuzzy Hash: 9841E570E00208CBDB58DFEAD9546DDFBB2AF89304F24C12AC414BB255EB355906CF55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067EEBFB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: b17db22838926e9b25f8e4c845b5805b920cabe4c926d7424a4e774a101ec2f9
                                                            • Instruction ID: 078a3d2a6eb77431c70c2163b3e8809662ba772a7ed690fd590b44b7b30df756
                                                            • Opcode Fuzzy Hash: b17db22838926e9b25f8e4c845b5805b920cabe4c926d7424a4e774a101ec2f9
                                                            • Instruction Fuzzy Hash: 9B41E270E01208CFEB58DFBAD9546EEBBB2BF89300F24C12AC414AB255DB394946CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E429B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: b853879ba28fe096617a5c540c769022e65527bf820f1db407f771b868b6335e
                                                            • Instruction ID: f5e1e4ba39ce40cff301c54c840dbed97d6a1de2e10ce63d2b6d287bb56d68d7
                                                            • Opcode Fuzzy Hash: b853879ba28fe096617a5c540c769022e65527bf820f1db407f771b868b6335e
                                                            • Instruction Fuzzy Hash: E841C371E01208CBDB58DFEAD95569EFBF6AF89300F24D12AC414BB258DB385945CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 9a094f4ac2554511d58aa893af809b2d1ec1447a0a5cb7b5bc97e05edf48defa
                                                            • Instruction ID: a46a0e3a6ab95f2148581e9e630d1eaf75b89345fb8956a658b1b1f36a689e50
                                                            • Opcode Fuzzy Hash: 9a094f4ac2554511d58aa893af809b2d1ec1447a0a5cb7b5bc97e05edf48defa
                                                            • Instruction Fuzzy Hash: CB416AB4E00119DFDB14CFA9D484AEDFBB6BF88304F258119D4046B286C775AA8ACF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E69B3
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 8afa271d118d125b436b3f3c3e60e1706ebeca70b6247fc03aa7025a154c2f4d
                                                            • Instruction ID: de253863e70a5e207b30239c624a884040ad3c0991bc4577482da92aece67124
                                                            • Opcode Fuzzy Hash: 8afa271d118d125b436b3f3c3e60e1706ebeca70b6247fc03aa7025a154c2f4d
                                                            • Instruction Fuzzy Hash: 1C41F8B1E01208CBDB58DFEAD5546EEFBB2BF99304F24C12AC414AB254DB385946CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E3E43
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 8420d27234373f4eef13097c827c3742ad2b8f580d1c92e90e90208b85f5339d
                                                            • Instruction ID: b641669d42368a1296d10ec1a0ade5da4715b249841d0611b1608bd70b2cd1ef
                                                            • Opcode Fuzzy Hash: 8420d27234373f4eef13097c827c3742ad2b8f580d1c92e90e90208b85f5339d
                                                            • Instruction Fuzzy Hash: 7F41E771D01208CBDB58DFEAD8556DDFBF2AF89300F24C12AC414AB254DB384906CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E4B4B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: f402b7094d7311b8abf6acf1fe8caf8e0010c3d90e99e0ce165de768ffbb55ef
                                                            • Instruction ID: 2e30a3abc28190328f0104cb726defa63b8d9ee759d480df3d2a1f9cc737d2d0
                                                            • Opcode Fuzzy Hash: f402b7094d7311b8abf6acf1fe8caf8e0010c3d90e99e0ce165de768ffbb55ef
                                                            • Instruction Fuzzy Hash: 8241CF71E01648CBDB58DFAAD8546EEBBF2BF89304F24D12AC414AB258EB385945CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E6103
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 939c4fb21701d840d8ed8e3691140673a4cdd5c598cc8c9c9b0535b5f24de82c
                                                            • Instruction ID: 375af5b5d612392c29e0283031200d483a7c6d1154d773d9d18cb9798988fd1e
                                                            • Opcode Fuzzy Hash: 939c4fb21701d840d8ed8e3691140673a4cdd5c598cc8c9c9b0535b5f24de82c
                                                            • Instruction Fuzzy Hash: 8341E470E01208CBDB58DFAAD9546EEFBF2BF99304F24C12AC414AB259DB385946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E3593
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 59aeac201248240a7839e3cde3f6d3eb8cd7b38bb048e260a9f9ff61a990e5f3
                                                            • Instruction ID: e64eccd03ea05824072391748ff23c166832ddbb077c87de215f84a43a65fc21
                                                            • Opcode Fuzzy Hash: 59aeac201248240a7839e3cde3f6d3eb8cd7b38bb048e260a9f9ff61a990e5f3
                                                            • Instruction Fuzzy Hash: FD41E370E01208CBDB58CFAAD9546EEFBF2BF89310F24C12AC414AB254DB395946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E7F6B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: e1ad7c6bdfbee695d89f748b548c0041dcf01e7b59c501223492c7a67b1a44d8
                                                            • Instruction ID: 040230f08686ffa6b310c5651d5983a775426b487e53b4ee2b5fbe734a122527
                                                            • Opcode Fuzzy Hash: e1ad7c6bdfbee695d89f748b548c0041dcf01e7b59c501223492c7a67b1a44d8
                                                            • Instruction Fuzzy Hash: EC41C170E016088BEB58DFFAD9546EEBBB2AF89300F24C12AC414AB254DB384946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E5853
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 9c3c39d3d52c4c5824d81639fb78091f34645645ae4e08366263a5c9459d331d
                                                            • Instruction ID: bb0344159b648b1f4c26e0aea976d7e879bf16aaf16d25893dc2d26ec7eda5b0
                                                            • Opcode Fuzzy Hash: 9c3c39d3d52c4c5824d81639fb78091f34645645ae4e08366263a5c9459d331d
                                                            • Instruction Fuzzy Hash: 4A41C570E01208CFEB58DFAAD9546EEBBB2BF89304F20D12AC414AB255DB395946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E881B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 2a0fa3f8ae96b6ee8b304288c4ee476d4894c58f22e7524cbaa9a5bd957707f4
                                                            • Instruction ID: 22f52c39f8afdcc325fe3b21fd3910ff01405a394f598834f7d3d35344327215
                                                            • Opcode Fuzzy Hash: 2a0fa3f8ae96b6ee8b304288c4ee476d4894c58f22e7524cbaa9a5bd957707f4
                                                            • Instruction Fuzzy Hash: F141C571E01208CBEB58DFEAD84569DBBB2BF89300F24C12AC414AB254DB355945CF51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E6E0B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 4e6f82dbd3ab15e5089951aaf0265d078a836058d260352202bce4cc8c4039ee
                                                            • Instruction ID: 03dde35dd36d4f74f715ddcc707298db4b1177eaea574c028780b495e98592c9
                                                            • Opcode Fuzzy Hash: 4e6f82dbd3ab15e5089951aaf0265d078a836058d260352202bce4cc8c4039ee
                                                            • Instruction Fuzzy Hash: AB41C370E01608CBDB58DFFAD9556ADBBB2BF89300F24C12AC415AB294DB385946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E76BB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 04a3b4452e96f4eee7497c02bedcd8a9c43da5681bbc418db0047d9d744dd305
                                                            • Instruction ID: 9e60a19081083a52c001b19cd1182048b262c2b2c4d1e55d20ba15e626c3eb73
                                                            • Opcode Fuzzy Hash: 04a3b4452e96f4eee7497c02bedcd8a9c43da5681bbc418db0047d9d744dd305
                                                            • Instruction Fuzzy Hash: 8241C371E01208CBDB58DFAAD9546EEFBB2BF89304F24C12AC415BB258DB385945CF54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E7263
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: c3f5f14adbc9992354d96f982d90dc179493e887abba3bc92838f2fa748ac9dd
                                                            • Instruction ID: c4b039a3ff3a096b722ad364d0b271ca6e942a966266359ce22cf6bf52fd5089
                                                            • Opcode Fuzzy Hash: c3f5f14adbc9992354d96f982d90dc179493e887abba3bc92838f2fa748ac9dd
                                                            • Instruction Fuzzy Hash: B041D471E01248CBDB58DFEAD8546EDBBB2BF89300F24D12AC414AB258DB385946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E313B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 06386d06f87c364df746a3ea2d3200c2549d8bd1906b5a8688546f0546c2e58b
                                                            • Instruction ID: 477267d54f9ce9b823d12ac0e6fff68c9b8f7db762bf1a75362f8cb62639e177
                                                            • Opcode Fuzzy Hash: 06386d06f87c364df746a3ea2d3200c2549d8bd1906b5a8688546f0546c2e58b
                                                            • Instruction Fuzzy Hash: DE41E270E012488BEB58DFEAD9546EEFBB2BF89314F24C12AC414BB258DB395945CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E7B13
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 482511d8011ba229834fb0873d7cc2a427c61792926e3734f1df05ef6cc6c64b
                                                            • Instruction ID: 96221dc3f8159b6f2bc8502d95cd20cbf89a50a8ce32db41f969347e1ae46079
                                                            • Opcode Fuzzy Hash: 482511d8011ba229834fb0873d7cc2a427c61792926e3734f1df05ef6cc6c64b
                                                            • Instruction Fuzzy Hash: AC41C270E01608CBDB58DFEAD8556DDBBB2BF89304F24D12AC414AB258EB385A46CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E46F3
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: df74cb5dc9c197530ca53d8b76974e8bcef5cbf1eda2d06b975d8dd1d7dc2adc
                                                            • Instruction ID: 19aefffe7c299f98ab0e6a45906e9331eaebdbe1b2c9503bff6a5593111ac4c9
                                                            • Opcode Fuzzy Hash: df74cb5dc9c197530ca53d8b76974e8bcef5cbf1eda2d06b975d8dd1d7dc2adc
                                                            • Instruction Fuzzy Hash: 0141E470E00248CBDB58DFAAD9446EEBBF2BF89300F24D12AC414BB258DB385946CF54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E4FA3
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 96f31e7e7e3ec17a168e41165247971cbedcc3204f6b88dc97f9b22319f8b852
                                                            • Instruction ID: 0e3849eecb9be6d3c5c9f09c2caa3835e02dcb8b8664fc90fa3798ccc9e722dd
                                                            • Opcode Fuzzy Hash: 96f31e7e7e3ec17a168e41165247971cbedcc3204f6b88dc97f9b22319f8b852
                                                            • Instruction Fuzzy Hash: 5841D270E01648CFEB58DFAAD8546EDBBF2AF99304F24C12AC414BB258DB395946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E655B
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: d148043b47f3a846e18ccddea3f8212ac8f63e883f202275f646b22a5dc35e99
                                                            • Instruction ID: 5701a6c3cd5e65832fd1ca6885f44d7e15977c369203b7b09e61029560666174
                                                            • Opcode Fuzzy Hash: d148043b47f3a846e18ccddea3f8212ac8f63e883f202275f646b22a5dc35e99
                                                            • Instruction Fuzzy Hash: 4741B471E01208CBDB58DFAAD9546EEFBB2BF99300F24C12AC414BB255EB385946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E39EB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 46010d3cec7235ed1fc61b099b6f932831d672419439c995413f64418f84691f
                                                            • Instruction ID: a6743f0e85e2141fdf59dd3db6c75cadcd4c6bcc4bad3161191bcd51c29cf5fc
                                                            • Opcode Fuzzy Hash: 46010d3cec7235ed1fc61b099b6f932831d672419439c995413f64418f84691f
                                                            • Instruction Fuzzy Hash: D441D470E01208CBEB58DFAAD5447EEBBB2BF89310F20D12AC414BB255DB385945CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E53FB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 5b045ba2f4c05e0908a79c96af5844e149c683eafcd41a678c1594b5441d203a
                                                            • Instruction ID: be5ec9ad64c1eb6b439479c1bdf4c9e1924b93a6448148e0be9e350f0dfbac09
                                                            • Opcode Fuzzy Hash: 5b045ba2f4c05e0908a79c96af5844e149c683eafcd41a678c1594b5441d203a
                                                            • Instruction Fuzzy Hash: 3141D374E01208CFEB18DFAAD85469EFBB2BF89304F24D12AC414AB254EB395945CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 067E5CAB
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 99f7c9944b6e1974c741613a7aa260fefce2bb1c8fafbab1766d98c1c74e6e96
                                                            • Instruction ID: accfde37d099053a900d952e7b9d085577144f83469f1283854befef50aa4b88
                                                            • Opcode Fuzzy Hash: 99f7c9944b6e1974c741613a7aa260fefce2bb1c8fafbab1766d98c1c74e6e96
                                                            • Instruction Fuzzy Hash: 1441A270E01208CBEB58DFAAD5546EEFBB2BF89304F24D12AC414AB254DB395946CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL(000000FF), ref: 067E2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 0976ed2db4b2d0ee7844deaa2e46e94033ab77ed8fdac4fe492599d73ef7e06a
                                                            • Instruction ID: b039320695ac8cc0fc8f376a53806faf3f9f60a15b0918003abde243c3bf329f
                                                            • Opcode Fuzzy Hash: 0976ed2db4b2d0ee7844deaa2e46e94033ab77ed8fdac4fe492599d73ef7e06a
                                                            • Instruction Fuzzy Hash: 725113B4E00218CFDB18DFAAD8446DEBBB6BF88314F14C129D424AB295DB749949CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 129f3334a8b90273863d1e3a21d4ba3649b25836ccce4f13398f8ac54e909299
                                                            • Instruction ID: 11c0c15c2bbb99cce4841f0540154d8d147e1c0d1b4fa4feffb2589953a38ec1
                                                            • Opcode Fuzzy Hash: 129f3334a8b90273863d1e3a21d4ba3649b25836ccce4f13398f8ac54e909299
                                                            • Instruction Fuzzy Hash: 48513374E00208CFDB54DFA8D4846EDBBB6BF49324F208229D425BB2A1D7749A89CF10
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 72d6670cf286515316ab06ecc1d02d7f842911d9659aa554ba0c16b3913fe344
                                                            • Instruction ID: 42450c89e3c36e64ede5b778a389fac2a166821a4f4ed0f5e8fdbc6a5fa65f37
                                                            • Opcode Fuzzy Hash: 72d6670cf286515316ab06ecc1d02d7f842911d9659aa554ba0c16b3913fe344
                                                            • Instruction Fuzzy Hash: 0E418E74A04519CFDB14CFA8D484ADCF7B6FF4C314F649119E029AB282C7359A8ACF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bfcce8ae9f7d78aa0da5673a441ca5c5241132ccff01972bbdc8d6451e6941ac
                                                            • Instruction ID: 624753b05faeda9973b1a1e251924d8739e0f98e6a31deb22815b255747b9a19
                                                            • Opcode Fuzzy Hash: bfcce8ae9f7d78aa0da5673a441ca5c5241132ccff01972bbdc8d6451e6941ac
                                                            • Instruction Fuzzy Hash: 44412774E04519CFDB54CFA8D484AECF7B6FB4C314F258158E425AB282C7359A8ACF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cc7d3eb9f824faaefe10d2057cacd6d39bda003ad0b633e12191b8fa26b923d0
                                                            • Instruction ID: fbe7d18a3f5694629feebc91de872e74c09ad0941042c8fb824b9f16d79f0f66
                                                            • Opcode Fuzzy Hash: cc7d3eb9f824faaefe10d2057cacd6d39bda003ad0b633e12191b8fa26b923d0
                                                            • Instruction Fuzzy Hash: 49B1A674E00218CFDB54DFA9D884A9DBBB2FF89314F2081A9D819AB365DB34AD45CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 01cfa96f84c5626a32bc95c0c608888377b3d5791ea795e08c0b082964d03ebb
                                                            • Instruction ID: 17dfc09a3a6141ff48c1428155b1b72c9da7b69c51e4a7fb4f6e318af7d93970
                                                            • Opcode Fuzzy Hash: 01cfa96f84c5626a32bc95c0c608888377b3d5791ea795e08c0b082964d03ebb
                                                            • Instruction Fuzzy Hash: 2251A474E006088FDB58DFAAD984A9DBBF2FF8D300F248169D418AB365DB349946CF51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.509360964.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_67e0000_TUFAN YAZ#U011eAN - Kredi Kart#U0131 Hesap #U00d6zeti - 45431108.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bfaae5db4ec23fa266b1e7210a02653da59f80b7f816cff7e5f9f39b65664d25
                                                            • Instruction ID: 6c7d73fa57df2543a861fc664edd011bd5f0aaaa58b09fb517dfd86ff8b9c3f9
                                                            • Opcode Fuzzy Hash: bfaae5db4ec23fa266b1e7210a02653da59f80b7f816cff7e5f9f39b65664d25
                                                            • Instruction Fuzzy Hash: B6D09E34D4425A8ECB21EFA4D9503EDB776BBD6200F0061D5811DB7250D7305E548E96
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%